By type
2023-01-09 03:19:40,232 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2023-01-09 03:19:41,671 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2023-01-09 03:19:42.504 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Jan 09, 2023 3:19:44 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jan 09, 2023 3:19:44 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jan 09, 2023 3:19:44 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jan 09, 2023 3:19:44 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2023-01-09 03:19:45.063 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2023-01-09 03:19:45.391 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2023-01-09 03:19:45.560 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2023-01-09 03:19:46.388 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2023-01-09 03:19:46.393 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2023-01-09 03:19:46.394 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2023-01-09 03:19:46.400 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2023-01-09 03:19:46.449 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2023-01-09 03:19:46.453 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2023-01-09 03:19:46.627 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2023-01-09 03:19:47.555 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jan 09, 2023 3:19:48 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2023-01-09 03:19:48.522 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 9.175 seconds (JVM running for 11.059) Jan 09, 2023 3:20:10 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2023-01-09 03:20:37.844 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-09 03:20:37.852 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-09 03:20:37.891 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2023-01-09 03:20:37.895 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-09 03:20:37.914 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2023-01-09 03:20:37.917 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-09 03:20:37.918 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-09 03:20:37.919 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-09 03:20:37.919 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-09 03:20:37.924 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-09 03:20:37.933 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-09 03:20:37.937 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-09 03:20:38.000 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-09 03:20:38.012 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-09 03:20:38.012 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-09 03:20:38.017 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-09 03:20:39.289 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-09 03:20:39.292 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-09 03:20:39.293 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-09 03:20:39.294 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-09 03:20:39.312 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-09 03:20:39.313 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-09 03:20:39.314 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 03:20:39.315 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-09 03:20:39.316 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-09 03:20:39.342 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 03:20:39.343 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-09 03:20:39.344 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-09 03:20:39.354 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 03:20:39.354 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-09 03:20:39.355 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-09 03:20:39.357 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-09 03:20:39.393 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 562942738559669878030832421375045642922985564089 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jan 09 03:17:00 UTC 2023 Final Date: Sat Jan 08 03:16:59 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f8:76:7e:b7:e8:11:35:4b:9f:f0:1f:bd:5e:b4:15:a8:53:85:cb:32],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0e986f2a2ded7047f9eff208c63ffc0a91e840f5 863c0667d0c4b3d066e542e3bbf48961eadf057f 098b2b64de04a74e5f6d3e7c4cce0f83a9a28611 1465e38e1597cc3e3b3195e1aa5fc47887c9f4c8 e819e3991476872d947bb7717958ca3dcb916340 25537e936aacb3ca8149788e4881eb80346e2b5f 349d0eeaf1cadc406058655c561d7847cad22aad 22bd01cbfd6832f90053be42fe8bb16fe4440fd2 64079652343410d74b6ad12db706d32bb5756691 70c0c992ffa782efdaa3f59cbdf508ed3320ba3b aeae1b07345627f62d6ae16a184ec24d7705c69f e732031142ba8f11c1c9b511fa112de52eda8a87 2d6baf078caa0620d08f9fe0ad8d43ec633b0a01 264ad11da3cc3aab20cd5bbbcba18458bb404b37 3bbb8325483ec7ae714d84763a430b81f8ed622c b4103e4c6f22b7db8500ab98a90030f832c11869 d4580cddc40044f40c03c351d7b8eca080700cee 9c5fa75bab788711b4546fbfb7d02487d13b3e90 21ff1f6bac401fa4123059e0073f97265de01ccd 9c7adb60 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [14:54:20:94:0a:b1:c8:79:c8:49:c2:7a:0a:22:12:78:2d:e2:ec:eb],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-09 05:05:21.903 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-09 05:05:21.906 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-09 05:05:21.909 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-09 05:05:21.911 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-09 05:05:21.914 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-09 05:05:21.916 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-09 05:05:21.916 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-09 05:05:21.917 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-09 05:05:21.918 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-09 05:05:21.918 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-09 05:05:21.924 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-09 05:05:21.925 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-09 05:05:21.925 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-09 05:05:21.925 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-09 05:05:22.132 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-09 05:05:22.133 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-09 05:05:22.133 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-09 05:05:22.134 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-09 05:05:22.137 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-09 05:05:22.138 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-09 05:05:22.138 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 05:05:22.139 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-09 05:05:22.139 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-09 05:05:22.141 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 05:05:22.141 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-09 05:05:22.142 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-09 05:05:22.143 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 05:05:22.143 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-09 05:05:22.144 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-09 05:05:22.145 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-09 05:05:22.152 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 562942738559669878030832421375045642922985564089 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jan 09 03:17:00 UTC 2023 Final Date: Sat Jan 08 03:16:59 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f8:76:7e:b7:e8:11:35:4b:9f:f0:1f:bd:5e:b4:15:a8:53:85:cb:32],[56:66:d1:a4] modulus: a595783ba68d447e8766ba0f8b749a6123448f0899de732529abef5012a62453f6747f7d47af8e143f7bd5056da0c46c9be414e32efd93191080b58be517582836303ad08006c0124bd778b24b55ee4b1c9ed7ad255f43d2cb190715e1cf4d1b7394cd50c998342b4708c69d66d1d4e18030303d511b9b2d10aecc5e35ec0faf306fbeb9574044f8e3c97e0f083f95bab7359bffeab4f44f750a32af4ace0c22b9482936696aa001bbf150c54d910cbb6ee6ace0ebc43eab489dedf635a0220a66524de78410c6727cac113d8c2c16c3a7f9677a84b700466f15bf328517e69738d9f544310f7cbf464ee9835e04364d82af037fea3f88a7770410623b6fdb4df03ced2c270e3c79f2defc5fbb227f1dd2da7d29f39261d579eb38656a53dbb7b64b9a0f856a9ed86fd2ea13b6205bd43c97a4f56b81aee8c795afcfd5c520261fc807e61e7325ee95379552eb10cd08729a8233a4fef5ec723f5ffbe19d6622a8197266dd3c2da70d76d967c89374a926196a514f329e70482915a8d536e173 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0e986f2a2ded7047f9eff208c63ffc0a91e840f5 863c0667d0c4b3d066e542e3bbf48961eadf057f 098b2b64de04a74e5f6d3e7c4cce0f83a9a28611 1465e38e1597cc3e3b3195e1aa5fc47887c9f4c8 e819e3991476872d947bb7717958ca3dcb916340 25537e936aacb3ca8149788e4881eb80346e2b5f 349d0eeaf1cadc406058655c561d7847cad22aad 22bd01cbfd6832f90053be42fe8bb16fe4440fd2 64079652343410d74b6ad12db706d32bb5756691 70c0c992ffa782efdaa3f59cbdf508ed3320ba3b aeae1b07345627f62d6ae16a184ec24d7705c69f e732031142ba8f11c1c9b511fa112de52eda8a87 2d6baf078caa0620d08f9fe0ad8d43ec633b0a01 264ad11da3cc3aab20cd5bbbcba18458bb404b37 3bbb8325483ec7ae714d84763a430b81f8ed622c b4103e4c6f22b7db8500ab98a90030f832c11869 d4580cddc40044f40c03c351d7b8eca080700cee 9c5fa75bab788711b4546fbfb7d02487d13b3e90 21ff1f6bac401fa4123059e0073f97265de01ccd 9c7adb60 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [db:12:50:2c:a5:a3:ee:fc:ad:50:28:50:f7:1a:9c:ba:4c:f6:c2:71],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-09 05:07:10.681 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-09 05:07:10.683 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-09 05:07:10.688 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2023-01-09 05:07:10.691 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-09 05:07:10.692 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2023-01-09 05:07:10.694 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-09 05:07:10.695 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-09 05:07:10.697 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-09 05:07:10.703 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-09 05:07:10.705 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-09 05:07:10.714 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-09 05:07:10.716 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-09 05:07:10.716 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-09 05:07:10.717 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-09 05:07:10.886 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-09 05:07:10.890 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-09 05:07:10.892 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-09 05:07:10.909 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-09 05:07:10.913 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-09 05:07:10.916 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-09 05:07:10.922 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 05:07:10.923 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-09 05:07:10.923 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-09 05:07:10.925 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 05:07:10.926 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-09 05:07:10.927 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-09 05:07:10.928 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 05:07:10.928 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-09 05:07:10.928 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-09 05:07:10.930 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-09 05:07:10.935 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 562942738559669878030832421375045642922985564089 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jan 09 03:17:00 UTC 2023 Final Date: Sat Jan 08 03:16:59 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f8:76:7e:b7:e8:11:35:4b:9f:f0:1f:bd:5e:b4:15:a8:53:85:cb:32],[56:66:d1:a4] modulus: a595783ba68d447e8766ba0f8b749a6123448f0899de732529abef5012a62453f6747f7d47af8e143f7bd5056da0c46c9be414e32efd93191080b58be517582836303ad08006c0124bd778b24b55ee4b1c9ed7ad255f43d2cb190715e1cf4d1b7394cd50c998342b4708c69d66d1d4e18030303d511b9b2d10aecc5e35ec0faf306fbeb9574044f8e3c97e0f083f95bab7359bffeab4f44f750a32af4ace0c22b9482936696aa001bbf150c54d910cbb6ee6ace0ebc43eab489dedf635a0220a66524de78410c6727cac113d8c2c16c3a7f9677a84b700466f15bf328517e69738d9f544310f7cbf464ee9835e04364d82af037fea3f88a7770410623b6fdb4df03ced2c270e3c79f2defc5fbb227f1dd2da7d29f39261d579eb38656a53dbb7b64b9a0f856a9ed86fd2ea13b6205bd43c97a4f56b81aee8c795afcfd5c520261fc807e61e7325ee95379552eb10cd08729a8233a4fef5ec723f5ffbe19d6622a8197266dd3c2da70d76d967c89374a926196a514f329e70482915a8d536e173 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0e986f2a2ded7047f9eff208c63ffc0a91e840f5 863c0667d0c4b3d066e542e3bbf48961eadf057f 098b2b64de04a74e5f6d3e7c4cce0f83a9a28611 1465e38e1597cc3e3b3195e1aa5fc47887c9f4c8 e819e3991476872d947bb7717958ca3dcb916340 25537e936aacb3ca8149788e4881eb80346e2b5f 349d0eeaf1cadc406058655c561d7847cad22aad 22bd01cbfd6832f90053be42fe8bb16fe4440fd2 64079652343410d74b6ad12db706d32bb5756691 70c0c992ffa782efdaa3f59cbdf508ed3320ba3b aeae1b07345627f62d6ae16a184ec24d7705c69f e732031142ba8f11c1c9b511fa112de52eda8a87 2d6baf078caa0620d08f9fe0ad8d43ec633b0a01 264ad11da3cc3aab20cd5bbbcba18458bb404b37 3bbb8325483ec7ae714d84763a430b81f8ed622c b4103e4c6f22b7db8500ab98a90030f832c11869 d4580cddc40044f40c03c351d7b8eca080700cee 9c5fa75bab788711b4546fbfb7d02487d13b3e90 21ff1f6bac401fa4123059e0073f97265de01ccd 9c7adb60 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [30:9c:6e:d7:17:42:e9:bd:3a:f6:0e:e3:7d:43:b6:ee:a6:c1:4b:bd],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-09 05:09:12.360 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-09 05:09:12.362 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-09 05:09:12.364 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2023-01-09 05:09:12.365 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-09 05:09:12.366 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2023-01-09 05:09:12.367 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-09 05:09:12.367 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-09 05:09:12.368 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-09 05:09:12.368 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-09 05:09:12.369 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-09 05:09:12.373 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-09 05:09:12.374 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-09 05:09:12.374 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-09 05:09:12.375 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-09 05:09:12.528 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-09 05:09:12.529 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-09 05:09:12.530 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-09 05:09:12.530 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-09 05:09:12.531 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-09 05:09:12.532 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-09 05:09:12.532 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 05:09:12.533 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-09 05:09:12.533 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-09 05:09:12.534 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 05:09:12.534 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-09 05:09:12.534 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-09 05:09:12.535 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 05:09:12.535 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-09 05:09:12.536 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-09 05:09:12.538 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-09 05:09:12.543 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 562942738559669878030832421375045642922985564089 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jan 09 03:17:00 UTC 2023 Final Date: Sat Jan 08 03:16:59 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f8:76:7e:b7:e8:11:35:4b:9f:f0:1f:bd:5e:b4:15:a8:53:85:cb:32],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0e986f2a2ded7047f9eff208c63ffc0a91e840f5 863c0667d0c4b3d066e542e3bbf48961eadf057f 098b2b64de04a74e5f6d3e7c4cce0f83a9a28611 1465e38e1597cc3e3b3195e1aa5fc47887c9f4c8 e819e3991476872d947bb7717958ca3dcb916340 25537e936aacb3ca8149788e4881eb80346e2b5f 349d0eeaf1cadc406058655c561d7847cad22aad 22bd01cbfd6832f90053be42fe8bb16fe4440fd2 64079652343410d74b6ad12db706d32bb5756691 70c0c992ffa782efdaa3f59cbdf508ed3320ba3b aeae1b07345627f62d6ae16a184ec24d7705c69f e732031142ba8f11c1c9b511fa112de52eda8a87 2d6baf078caa0620d08f9fe0ad8d43ec633b0a01 264ad11da3cc3aab20cd5bbbcba18458bb404b37 3bbb8325483ec7ae714d84763a430b81f8ed622c b4103e4c6f22b7db8500ab98a90030f832c11869 d4580cddc40044f40c03c351d7b8eca080700cee 9c5fa75bab788711b4546fbfb7d02487d13b3e90 21ff1f6bac401fa4123059e0073f97265de01ccd 9c7adb60 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [12:c9:82:1c:4e:2c:65:58:05:91:b6:46:38:a4:12:7d:1d:bf:37:26],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-09 05:12:04.668 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-09 05:12:04.670 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-09 05:12:04.672 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-09 05:12:04.673 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-09 05:12:04.674 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-09 05:12:04.675 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-09 05:12:04.677 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-09 05:12:04.678 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-09 05:12:04.678 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-09 05:12:04.679 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-09 05:12:04.683 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-09 05:12:04.685 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-09 05:12:04.685 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-09 05:12:04.686 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-09 05:12:04.875 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-09 05:12:04.876 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-09 05:12:04.877 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-09 05:12:04.877 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-09 05:12:04.878 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-09 05:12:04.879 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-09 05:12:04.879 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 05:12:04.880 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-09 05:12:04.880 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-09 05:12:04.881 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 05:12:04.882 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-09 05:12:04.882 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-09 05:12:04.882 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 05:12:04.883 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-09 05:12:04.883 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-09 05:12:04.884 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-09 05:12:04.886 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 562942738559669878030832421375045642922985564089 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jan 09 03:17:00 UTC 2023 Final Date: Sat Jan 08 03:16:59 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f8:76:7e:b7:e8:11:35:4b:9f:f0:1f:bd:5e:b4:15:a8:53:85:cb:32],[56:66:d1:a4] modulus: a595783ba68d447e8766ba0f8b749a6123448f0899de732529abef5012a62453f6747f7d47af8e143f7bd5056da0c46c9be414e32efd93191080b58be517582836303ad08006c0124bd778b24b55ee4b1c9ed7ad255f43d2cb190715e1cf4d1b7394cd50c998342b4708c69d66d1d4e18030303d511b9b2d10aecc5e35ec0faf306fbeb9574044f8e3c97e0f083f95bab7359bffeab4f44f750a32af4ace0c22b9482936696aa001bbf150c54d910cbb6ee6ace0ebc43eab489dedf635a0220a66524de78410c6727cac113d8c2c16c3a7f9677a84b700466f15bf328517e69738d9f544310f7cbf464ee9835e04364d82af037fea3f88a7770410623b6fdb4df03ced2c270e3c79f2defc5fbb227f1dd2da7d29f39261d579eb38656a53dbb7b64b9a0f856a9ed86fd2ea13b6205bd43c97a4f56b81aee8c795afcfd5c520261fc807e61e7325ee95379552eb10cd08729a8233a4fef5ec723f5ffbe19d6622a8197266dd3c2da70d76d967c89374a926196a514f329e70482915a8d536e173 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0e986f2a2ded7047f9eff208c63ffc0a91e840f5 863c0667d0c4b3d066e542e3bbf48961eadf057f 098b2b64de04a74e5f6d3e7c4cce0f83a9a28611 1465e38e1597cc3e3b3195e1aa5fc47887c9f4c8 e819e3991476872d947bb7717958ca3dcb916340 25537e936aacb3ca8149788e4881eb80346e2b5f 349d0eeaf1cadc406058655c561d7847cad22aad 22bd01cbfd6832f90053be42fe8bb16fe4440fd2 64079652343410d74b6ad12db706d32bb5756691 70c0c992ffa782efdaa3f59cbdf508ed3320ba3b aeae1b07345627f62d6ae16a184ec24d7705c69f e732031142ba8f11c1c9b511fa112de52eda8a87 2d6baf078caa0620d08f9fe0ad8d43ec633b0a01 264ad11da3cc3aab20cd5bbbcba18458bb404b37 3bbb8325483ec7ae714d84763a430b81f8ed622c b4103e4c6f22b7db8500ab98a90030f832c11869 d4580cddc40044f40c03c351d7b8eca080700cee 9c5fa75bab788711b4546fbfb7d02487d13b3e90 21ff1f6bac401fa4123059e0073f97265de01ccd 9c7adb60 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b5:40:23:bb:47:60:c1:37:8e:4b:bd:65:07:15:71:49:4f:1a:11:3d],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-09 05:19:57.639 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-09 05:19:57.643 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-09 05:19:57.645 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-09 05:19:57.646 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-09 05:19:57.647 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-09 05:19:57.648 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-09 05:19:57.648 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-09 05:19:57.649 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-09 05:19:57.649 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-09 05:19:57.649 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-09 05:19:57.657 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-09 05:19:57.658 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-09 05:19:57.658 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-09 05:19:57.659 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-09 05:19:57.850 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-09 05:19:57.850 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-09 05:19:57.851 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-09 05:19:57.851 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-09 05:19:57.852 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-09 05:19:57.853 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-09 05:19:57.853 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 05:19:57.853 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-09 05:19:57.854 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-09 05:19:57.854 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 05:19:57.855 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-09 05:19:57.855 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-09 05:19:57.856 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 05:19:57.856 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-09 05:19:57.857 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-09 05:19:57.858 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-09 05:19:57.862 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 562942738559669878030832421375045642922985564089 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jan 09 03:17:00 UTC 2023 Final Date: Sat Jan 08 03:16:59 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f8:76:7e:b7:e8:11:35:4b:9f:f0:1f:bd:5e:b4:15:a8:53:85:cb:32],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0e986f2a2ded7047f9eff208c63ffc0a91e840f5 863c0667d0c4b3d066e542e3bbf48961eadf057f 098b2b64de04a74e5f6d3e7c4cce0f83a9a28611 1465e38e1597cc3e3b3195e1aa5fc47887c9f4c8 e819e3991476872d947bb7717958ca3dcb916340 25537e936aacb3ca8149788e4881eb80346e2b5f 349d0eeaf1cadc406058655c561d7847cad22aad 22bd01cbfd6832f90053be42fe8bb16fe4440fd2 64079652343410d74b6ad12db706d32bb5756691 70c0c992ffa782efdaa3f59cbdf508ed3320ba3b aeae1b07345627f62d6ae16a184ec24d7705c69f e732031142ba8f11c1c9b511fa112de52eda8a87 2d6baf078caa0620d08f9fe0ad8d43ec633b0a01 264ad11da3cc3aab20cd5bbbcba18458bb404b37 3bbb8325483ec7ae714d84763a430b81f8ed622c b4103e4c6f22b7db8500ab98a90030f832c11869 d4580cddc40044f40c03c351d7b8eca080700cee 9c5fa75bab788711b4546fbfb7d02487d13b3e90 21ff1f6bac401fa4123059e0073f97265de01ccd 9c7adb60 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7a:3b:cd:ff:93:72:68:ba:82:83:02:12:25:84:58:f1:26:90:27:b1],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-09 05:26:13.703 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-09 05:26:13.705 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-09 05:26:13.707 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-09 05:26:13.708 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-09 05:26:13.708 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-09 05:26:13.709 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-09 05:26:13.710 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-09 05:26:13.710 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-09 05:26:13.711 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-09 05:26:13.711 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-09 05:26:13.716 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-09 05:26:13.716 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-09 05:26:13.717 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-09 05:26:13.717 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-09 05:26:13.880 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-09 05:26:13.881 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-09 05:26:13.882 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-09 05:26:13.882 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-09 05:26:13.884 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-09 05:26:13.884 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-09 05:26:13.884 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 05:26:13.885 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-09 05:26:13.885 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-09 05:26:13.885 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 05:26:13.886 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-09 05:26:13.886 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-09 05:26:13.887 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 05:26:13.887 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-09 05:26:13.887 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-09 05:26:13.888 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-09 05:26:13.891 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 562942738559669878030832421375045642922985564089 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jan 09 03:17:00 UTC 2023 Final Date: Sat Jan 08 03:16:59 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f8:76:7e:b7:e8:11:35:4b:9f:f0:1f:bd:5e:b4:15:a8:53:85:cb:32],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0e986f2a2ded7047f9eff208c63ffc0a91e840f5 863c0667d0c4b3d066e542e3bbf48961eadf057f 098b2b64de04a74e5f6d3e7c4cce0f83a9a28611 1465e38e1597cc3e3b3195e1aa5fc47887c9f4c8 e819e3991476872d947bb7717958ca3dcb916340 25537e936aacb3ca8149788e4881eb80346e2b5f 349d0eeaf1cadc406058655c561d7847cad22aad 22bd01cbfd6832f90053be42fe8bb16fe4440fd2 64079652343410d74b6ad12db706d32bb5756691 70c0c992ffa782efdaa3f59cbdf508ed3320ba3b aeae1b07345627f62d6ae16a184ec24d7705c69f e732031142ba8f11c1c9b511fa112de52eda8a87 2d6baf078caa0620d08f9fe0ad8d43ec633b0a01 264ad11da3cc3aab20cd5bbbcba18458bb404b37 3bbb8325483ec7ae714d84763a430b81f8ed622c b4103e4c6f22b7db8500ab98a90030f832c11869 d4580cddc40044f40c03c351d7b8eca080700cee 9c5fa75bab788711b4546fbfb7d02487d13b3e90 21ff1f6bac401fa4123059e0073f97265de01ccd 9c7adb60 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b8:29:de:a1:6f:52:cf:65:a6:96:69:34:3e:c2:fe:05:29:84:f6:b4],[56:66:d1:a4] modulus: e5536fd4522b0d9daa119bd5a9e295a16d6afed70d09acd0ffbd64cca31bacc28c9eb644341beefaa44a494dde9080b9eb541b639b3317d60141ede86f4be99b5c889f736be6b1055838bd6e1eb17b47f155d048a6d5dc85fe0d58307eda17517d5dccd3e1fc71a9c47e08b584998ed89a450c73fe566400642ca89f05656a8662b4d5901d730e4aef714aab8f79965e3ec4faa7c799e25fc86805927049ab0b89d368848d3dd3cf006970bddbd31cd1f61057564c4fc9edad3347642d1e26998fe2a1dfbd8ec859a3ed52bafede8de946aa76f920cbef746c00eeaf5dcdb3674d8da1d5b38b187da7cc6711e5ca21076f0c3e7a150d505a439247e505e50771 public exponent: 10001 ] 2023-01-09 05:33:54.742 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-09 05:33:54.744 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-09 05:33:54.746 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-09 05:33:54.748 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-09 05:33:54.748 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-09 05:33:54.749 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-09 05:33:54.750 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-09 05:33:54.750 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-09 05:33:54.751 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-09 05:33:54.752 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-09 05:33:54.756 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-09 05:33:54.757 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-09 05:33:54.757 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-09 05:33:54.758 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-09 05:33:54.896 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-09 05:33:54.896 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-09 05:33:54.897 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-09 05:33:54.897 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-09 05:33:54.898 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-09 05:33:54.899 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-09 05:33:54.899 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 05:33:54.899 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-09 05:33:54.900 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-09 05:33:54.900 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 05:33:54.901 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-09 05:33:54.901 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-09 05:33:54.901 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 05:33:54.902 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-09 05:33:54.902 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-09 05:33:54.903 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-09 05:33:54.906 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 562942738559669878030832421375045642922985564089 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jan 09 03:17:00 UTC 2023 Final Date: Sat Jan 08 03:16:59 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f8:76:7e:b7:e8:11:35:4b:9f:f0:1f:bd:5e:b4:15:a8:53:85:cb:32],[56:66:d1:a4] modulus: a595783ba68d447e8766ba0f8b749a6123448f0899de732529abef5012a62453f6747f7d47af8e143f7bd5056da0c46c9be414e32efd93191080b58be517582836303ad08006c0124bd778b24b55ee4b1c9ed7ad255f43d2cb190715e1cf4d1b7394cd50c998342b4708c69d66d1d4e18030303d511b9b2d10aecc5e35ec0faf306fbeb9574044f8e3c97e0f083f95bab7359bffeab4f44f750a32af4ace0c22b9482936696aa001bbf150c54d910cbb6ee6ace0ebc43eab489dedf635a0220a66524de78410c6727cac113d8c2c16c3a7f9677a84b700466f15bf328517e69738d9f544310f7cbf464ee9835e04364d82af037fea3f88a7770410623b6fdb4df03ced2c270e3c79f2defc5fbb227f1dd2da7d29f39261d579eb38656a53dbb7b64b9a0f856a9ed86fd2ea13b6205bd43c97a4f56b81aee8c795afcfd5c520261fc807e61e7325ee95379552eb10cd08729a8233a4fef5ec723f5ffbe19d6622a8197266dd3c2da70d76d967c89374a926196a514f329e70482915a8d536e173 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0e986f2a2ded7047f9eff208c63ffc0a91e840f5 863c0667d0c4b3d066e542e3bbf48961eadf057f 098b2b64de04a74e5f6d3e7c4cce0f83a9a28611 1465e38e1597cc3e3b3195e1aa5fc47887c9f4c8 e819e3991476872d947bb7717958ca3dcb916340 25537e936aacb3ca8149788e4881eb80346e2b5f 349d0eeaf1cadc406058655c561d7847cad22aad 22bd01cbfd6832f90053be42fe8bb16fe4440fd2 64079652343410d74b6ad12db706d32bb5756691 70c0c992ffa782efdaa3f59cbdf508ed3320ba3b aeae1b07345627f62d6ae16a184ec24d7705c69f e732031142ba8f11c1c9b511fa112de52eda8a87 2d6baf078caa0620d08f9fe0ad8d43ec633b0a01 264ad11da3cc3aab20cd5bbbcba18458bb404b37 3bbb8325483ec7ae714d84763a430b81f8ed622c b4103e4c6f22b7db8500ab98a90030f832c11869 d4580cddc40044f40c03c351d7b8eca080700cee 9c5fa75bab788711b4546fbfb7d02487d13b3e90 21ff1f6bac401fa4123059e0073f97265de01ccd 9c7adb60 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b6:dd:5a:47:87:d4:c6:f1:f4:f2:1c:b1:81:3f:83:35:08:ee:36:ad],[56:66:d1:a4] modulus: bf97daa1aa569bac1bfc54224a5d675c9b20279f9602c91ec0342f09254f80eb1cb08a49d455c6c64c0c8613d6a7980999588d968bb3006d5d0672fb524565d62a184075eff5e616bd258839b1f559efafbd2d4326dab6f089a9f899282b22fb606dc855050aabc6544de15f7212087306020c37ab55ca77b740e7fb3c400cc092027d5d42ab3496d2c6713b5d334c2d52e7fcbc535a0b7c41900bc1082e5193806ea150a79bb62faf9cff612f82d31e8c588207c04a95bd3f77514bf3b9cadd1c962e6dafb2a6973f6473f0ece6ff4ea9bfa947d8cdb088c9dc6850b6199b5f1a987e34f9342c9f47c39e1e5cb5687b85fb4b82e7ff7bb2854026e5b986ffdd public exponent: 10001 ] 2023-01-09 05:39:25.093 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-09 05:39:25.096 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-09 05:39:25.102 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-09 05:39:25.103 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-09 05:39:25.103 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-09 05:39:25.104 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-09 05:39:25.104 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-09 05:39:25.105 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-09 05:39:25.107 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-09 05:39:25.107 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-09 05:39:25.113 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-09 05:39:25.115 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-09 05:39:25.115 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-09 05:39:25.116 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-09 05:39:25.274 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-09 05:39:25.275 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-09 05:39:25.275 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-09 05:39:25.276 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-09 05:39:25.277 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-09 05:39:25.278 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-09 05:39:25.278 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 05:39:25.279 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-09 05:39:25.279 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-09 05:39:25.280 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 05:39:25.281 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-09 05:39:25.281 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-09 05:39:25.282 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 05:39:25.282 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-09 05:39:25.283 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-09 05:39:25.283 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-09 05:39:25.287 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 562942738559669878030832421375045642922985564089 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jan 09 03:17:00 UTC 2023 Final Date: Sat Jan 08 03:16:59 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f8:76:7e:b7:e8:11:35:4b:9f:f0:1f:bd:5e:b4:15:a8:53:85:cb:32],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0e986f2a2ded7047f9eff208c63ffc0a91e840f5 863c0667d0c4b3d066e542e3bbf48961eadf057f 098b2b64de04a74e5f6d3e7c4cce0f83a9a28611 1465e38e1597cc3e3b3195e1aa5fc47887c9f4c8 e819e3991476872d947bb7717958ca3dcb916340 25537e936aacb3ca8149788e4881eb80346e2b5f 349d0eeaf1cadc406058655c561d7847cad22aad 22bd01cbfd6832f90053be42fe8bb16fe4440fd2 64079652343410d74b6ad12db706d32bb5756691 70c0c992ffa782efdaa3f59cbdf508ed3320ba3b aeae1b07345627f62d6ae16a184ec24d7705c69f e732031142ba8f11c1c9b511fa112de52eda8a87 2d6baf078caa0620d08f9fe0ad8d43ec633b0a01 264ad11da3cc3aab20cd5bbbcba18458bb404b37 3bbb8325483ec7ae714d84763a430b81f8ed622c b4103e4c6f22b7db8500ab98a90030f832c11869 d4580cddc40044f40c03c351d7b8eca080700cee 9c5fa75bab788711b4546fbfb7d02487d13b3e90 21ff1f6bac401fa4123059e0073f97265de01ccd 9c7adb60 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [22:e2:f6:ea:18:91:6d:e7:58:f0:a4:96:8f:3c:f2:09:0a:53:c8:7b],[56:66:d1:a4] modulus: cf73d80ef800daa6f6346f9f48caf2016d11d09e9fd8d80c13e82b741721320e87a1dbe4e5ff7372e5847cb71ed2fc48579edfed4e23a4cfaf2ee09a260964da63ef836d1f65333c2935257df1fe1b482c075bb8e5d1799792fa8539e35a2e92c5b8f60376d66c1e4199a3f4b1ba5a7e892eac9af7987dbd30ff4d7b1358c42d0c24cc303277abfb75351dbec28c5b88ef7940fd552e6ab101f42d815a3661236af2fe96e390bfad00fddeea7d030074da668d44d38ff3e803171e36926256b05dde55e942287fb3fc8e228eb766f2630527bbc8c09f2a24bcb9858af7285d6fc686027185f1d34fabe077e1f3cd366250f41a84ce1069550b416638f49c8d63 public exponent: 10001 ] 2023-01-09 05:46:41.879 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-09 05:46:41.882 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-09 05:46:41.884 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2023-01-09 05:46:41.885 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-09 05:46:41.885 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2023-01-09 05:46:41.885 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-09 05:46:41.886 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-09 05:46:41.886 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-09 05:46:41.886 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-09 05:46:41.887 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-09 05:46:41.891 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-09 05:46:41.891 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-09 05:46:41.891 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-09 05:46:41.892 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-09 05:46:42.030 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-09 05:46:42.031 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-09 05:46:42.031 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-09 05:46:42.031 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-09 05:46:42.032 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-09 05:46:42.033 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-09 05:46:42.033 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 05:46:42.033 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-09 05:46:42.034 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-09 05:46:42.034 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 05:46:42.034 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-09 05:46:42.035 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-09 05:46:42.035 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 05:46:42.035 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-09 05:46:42.036 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-09 05:46:42.037 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-09 05:46:42.041 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 562942738559669878030832421375045642922985564089 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jan 09 03:17:00 UTC 2023 Final Date: Sat Jan 08 03:16:59 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f8:76:7e:b7:e8:11:35:4b:9f:f0:1f:bd:5e:b4:15:a8:53:85:cb:32],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0e986f2a2ded7047f9eff208c63ffc0a91e840f5 863c0667d0c4b3d066e542e3bbf48961eadf057f 098b2b64de04a74e5f6d3e7c4cce0f83a9a28611 1465e38e1597cc3e3b3195e1aa5fc47887c9f4c8 e819e3991476872d947bb7717958ca3dcb916340 25537e936aacb3ca8149788e4881eb80346e2b5f 349d0eeaf1cadc406058655c561d7847cad22aad 22bd01cbfd6832f90053be42fe8bb16fe4440fd2 64079652343410d74b6ad12db706d32bb5756691 70c0c992ffa782efdaa3f59cbdf508ed3320ba3b aeae1b07345627f62d6ae16a184ec24d7705c69f e732031142ba8f11c1c9b511fa112de52eda8a87 2d6baf078caa0620d08f9fe0ad8d43ec633b0a01 264ad11da3cc3aab20cd5bbbcba18458bb404b37 3bbb8325483ec7ae714d84763a430b81f8ed622c b4103e4c6f22b7db8500ab98a90030f832c11869 d4580cddc40044f40c03c351d7b8eca080700cee 9c5fa75bab788711b4546fbfb7d02487d13b3e90 21ff1f6bac401fa4123059e0073f97265de01ccd 9c7adb60 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c9:f7:9f:cf:c1:28:c3:86:41:15:08:bc:a4:0a:b3:34:a8:dd:88:1c],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-09 05:52:57.261 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-09 05:52:57.263 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-09 05:52:57.266 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-09 05:52:57.267 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-09 05:52:57.267 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-09 05:52:57.268 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-09 05:52:57.269 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-09 05:52:57.269 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-09 05:52:57.270 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-09 05:52:57.270 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-09 05:52:57.274 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-09 05:52:57.275 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-09 05:52:57.275 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-09 05:52:57.276 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-09 05:52:57.440 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-09 05:52:57.441 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-09 05:52:57.441 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-09 05:52:57.442 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-09 05:52:57.443 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-09 05:52:57.444 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-09 05:52:57.444 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 05:52:57.445 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-09 05:52:57.445 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-09 05:52:57.446 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 05:52:57.446 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-09 05:52:57.446 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-09 05:52:57.447 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 05:52:57.447 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-09 05:52:57.447 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-09 05:52:57.448 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-09 05:52:57.451 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 562942738559669878030832421375045642922985564089 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jan 09 03:17:00 UTC 2023 Final Date: Sat Jan 08 03:16:59 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f8:76:7e:b7:e8:11:35:4b:9f:f0:1f:bd:5e:b4:15:a8:53:85:cb:32],[56:66:d1:a4] modulus: a595783ba68d447e8766ba0f8b749a6123448f0899de732529abef5012a62453f6747f7d47af8e143f7bd5056da0c46c9be414e32efd93191080b58be517582836303ad08006c0124bd778b24b55ee4b1c9ed7ad255f43d2cb190715e1cf4d1b7394cd50c998342b4708c69d66d1d4e18030303d511b9b2d10aecc5e35ec0faf306fbeb9574044f8e3c97e0f083f95bab7359bffeab4f44f750a32af4ace0c22b9482936696aa001bbf150c54d910cbb6ee6ace0ebc43eab489dedf635a0220a66524de78410c6727cac113d8c2c16c3a7f9677a84b700466f15bf328517e69738d9f544310f7cbf464ee9835e04364d82af037fea3f88a7770410623b6fdb4df03ced2c270e3c79f2defc5fbb227f1dd2da7d29f39261d579eb38656a53dbb7b64b9a0f856a9ed86fd2ea13b6205bd43c97a4f56b81aee8c795afcfd5c520261fc807e61e7325ee95379552eb10cd08729a8233a4fef5ec723f5ffbe19d6622a8197266dd3c2da70d76d967c89374a926196a514f329e70482915a8d536e173 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0e986f2a2ded7047f9eff208c63ffc0a91e840f5 863c0667d0c4b3d066e542e3bbf48961eadf057f 098b2b64de04a74e5f6d3e7c4cce0f83a9a28611 1465e38e1597cc3e3b3195e1aa5fc47887c9f4c8 e819e3991476872d947bb7717958ca3dcb916340 25537e936aacb3ca8149788e4881eb80346e2b5f 349d0eeaf1cadc406058655c561d7847cad22aad 22bd01cbfd6832f90053be42fe8bb16fe4440fd2 64079652343410d74b6ad12db706d32bb5756691 70c0c992ffa782efdaa3f59cbdf508ed3320ba3b aeae1b07345627f62d6ae16a184ec24d7705c69f e732031142ba8f11c1c9b511fa112de52eda8a87 2d6baf078caa0620d08f9fe0ad8d43ec633b0a01 264ad11da3cc3aab20cd5bbbcba18458bb404b37 3bbb8325483ec7ae714d84763a430b81f8ed622c b4103e4c6f22b7db8500ab98a90030f832c11869 d4580cddc40044f40c03c351d7b8eca080700cee 9c5fa75bab788711b4546fbfb7d02487d13b3e90 21ff1f6bac401fa4123059e0073f97265de01ccd 9c7adb60 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f6:ae:bd:5d:b9:f1:6b:67:0c:5c:9d:0f:e5:3c:34:5a:89:14:fc:d2],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-09 05:53:36.083 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-09 05:53:36.083 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-09 05:53:36.085 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-09 05:53:36.086 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-09 05:53:36.086 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-09 05:53:36.087 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-09 05:53:36.087 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-09 05:53:36.087 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-09 05:53:36.088 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-09 05:53:36.088 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-09 05:53:36.092 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-09 05:53:36.096 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-09 05:53:36.097 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-09 05:53:36.097 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-09 05:53:36.222 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-09 05:53:36.222 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-09 05:53:36.223 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-09 05:53:36.223 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-09 05:53:36.224 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-09 05:53:36.224 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-09 05:53:36.225 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 05:53:36.225 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-09 05:53:36.225 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-09 05:53:36.226 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 05:53:36.226 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-09 05:53:36.226 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-09 05:53:36.227 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 05:53:36.227 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-09 05:53:36.227 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-09 05:53:36.228 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-09 05:53:36.230 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 562942738559669878030832421375045642922985564089 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jan 09 03:17:00 UTC 2023 Final Date: Sat Jan 08 03:16:59 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f8:76:7e:b7:e8:11:35:4b:9f:f0:1f:bd:5e:b4:15:a8:53:85:cb:32],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0e986f2a2ded7047f9eff208c63ffc0a91e840f5 863c0667d0c4b3d066e542e3bbf48961eadf057f 098b2b64de04a74e5f6d3e7c4cce0f83a9a28611 1465e38e1597cc3e3b3195e1aa5fc47887c9f4c8 e819e3991476872d947bb7717958ca3dcb916340 25537e936aacb3ca8149788e4881eb80346e2b5f 349d0eeaf1cadc406058655c561d7847cad22aad 22bd01cbfd6832f90053be42fe8bb16fe4440fd2 64079652343410d74b6ad12db706d32bb5756691 70c0c992ffa782efdaa3f59cbdf508ed3320ba3b aeae1b07345627f62d6ae16a184ec24d7705c69f e732031142ba8f11c1c9b511fa112de52eda8a87 2d6baf078caa0620d08f9fe0ad8d43ec633b0a01 264ad11da3cc3aab20cd5bbbcba18458bb404b37 3bbb8325483ec7ae714d84763a430b81f8ed622c b4103e4c6f22b7db8500ab98a90030f832c11869 d4580cddc40044f40c03c351d7b8eca080700cee 9c5fa75bab788711b4546fbfb7d02487d13b3e90 21ff1f6bac401fa4123059e0073f97265de01ccd 9c7adb60 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [74:82:27:30:c1:e0:18:81:7e:d4:9e:38:c8:0d:ae:71:91:c8:75:03],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-09 06:19:21.942 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-09 06:19:21.944 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-09 06:19:21.946 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-09 06:19:21.947 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-09 06:19:21.948 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-09 06:19:21.948 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-09 06:19:21.949 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-09 06:19:21.949 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-09 06:19:21.950 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-09 06:19:21.950 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-09 06:19:21.960 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-09 06:19:21.962 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-09 06:19:21.962 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-09 06:19:21.962 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-09 06:19:22.144 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-09 06:19:22.144 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-09 06:19:22.144 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-09 06:19:22.145 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-09 06:19:22.146 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-09 06:19:22.146 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-09 06:19:22.147 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 06:19:22.147 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-09 06:19:22.147 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-09 06:19:22.148 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 06:19:22.148 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-09 06:19:22.148 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-09 06:19:22.149 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 06:19:22.149 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-09 06:19:22.149 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-09 06:19:22.150 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-09 06:19:22.154 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 562942738559669878030832421375045642922985564089 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jan 09 03:17:00 UTC 2023 Final Date: Sat Jan 08 03:16:59 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f8:76:7e:b7:e8:11:35:4b:9f:f0:1f:bd:5e:b4:15:a8:53:85:cb:32],[56:66:d1:a4] modulus: a595783ba68d447e8766ba0f8b749a6123448f0899de732529abef5012a62453f6747f7d47af8e143f7bd5056da0c46c9be414e32efd93191080b58be517582836303ad08006c0124bd778b24b55ee4b1c9ed7ad255f43d2cb190715e1cf4d1b7394cd50c998342b4708c69d66d1d4e18030303d511b9b2d10aecc5e35ec0faf306fbeb9574044f8e3c97e0f083f95bab7359bffeab4f44f750a32af4ace0c22b9482936696aa001bbf150c54d910cbb6ee6ace0ebc43eab489dedf635a0220a66524de78410c6727cac113d8c2c16c3a7f9677a84b700466f15bf328517e69738d9f544310f7cbf464ee9835e04364d82af037fea3f88a7770410623b6fdb4df03ced2c270e3c79f2defc5fbb227f1dd2da7d29f39261d579eb38656a53dbb7b64b9a0f856a9ed86fd2ea13b6205bd43c97a4f56b81aee8c795afcfd5c520261fc807e61e7325ee95379552eb10cd08729a8233a4fef5ec723f5ffbe19d6622a8197266dd3c2da70d76d967c89374a926196a514f329e70482915a8d536e173 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0e986f2a2ded7047f9eff208c63ffc0a91e840f5 863c0667d0c4b3d066e542e3bbf48961eadf057f 098b2b64de04a74e5f6d3e7c4cce0f83a9a28611 1465e38e1597cc3e3b3195e1aa5fc47887c9f4c8 e819e3991476872d947bb7717958ca3dcb916340 25537e936aacb3ca8149788e4881eb80346e2b5f 349d0eeaf1cadc406058655c561d7847cad22aad 22bd01cbfd6832f90053be42fe8bb16fe4440fd2 64079652343410d74b6ad12db706d32bb5756691 70c0c992ffa782efdaa3f59cbdf508ed3320ba3b aeae1b07345627f62d6ae16a184ec24d7705c69f e732031142ba8f11c1c9b511fa112de52eda8a87 2d6baf078caa0620d08f9fe0ad8d43ec633b0a01 264ad11da3cc3aab20cd5bbbcba18458bb404b37 3bbb8325483ec7ae714d84763a430b81f8ed622c b4103e4c6f22b7db8500ab98a90030f832c11869 d4580cddc40044f40c03c351d7b8eca080700cee 9c5fa75bab788711b4546fbfb7d02487d13b3e90 21ff1f6bac401fa4123059e0073f97265de01ccd 9c7adb60 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [62:16:80:ee:3f:96:b7:9e:4d:42:6f:43:67:97:a9:d0:bc:d1:7c:94],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-09 06:19:27.574 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-09 06:19:27.575 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-09 06:19:27.576 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-09 06:19:27.578 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-09 06:19:27.579 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-09 06:19:27.579 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-09 06:19:27.580 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-09 06:19:27.580 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-09 06:19:27.580 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-09 06:19:27.581 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-09 06:19:27.584 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-09 06:19:27.585 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-09 06:19:27.585 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-09 06:19:27.586 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-09 06:19:27.695 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-09 06:19:27.696 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-09 06:19:27.696 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-09 06:19:27.696 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-09 06:19:27.697 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-09 06:19:27.697 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-09 06:19:27.698 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 06:19:27.698 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-09 06:19:27.698 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-09 06:19:27.699 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 06:19:27.699 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-09 06:19:27.699 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-09 06:19:27.700 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 06:19:27.700 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-09 06:19:27.701 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-09 06:19:27.701 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-09 06:19:27.704 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 562942738559669878030832421375045642922985564089 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jan 09 03:17:00 UTC 2023 Final Date: Sat Jan 08 03:16:59 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f8:76:7e:b7:e8:11:35:4b:9f:f0:1f:bd:5e:b4:15:a8:53:85:cb:32],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0e986f2a2ded7047f9eff208c63ffc0a91e840f5 863c0667d0c4b3d066e542e3bbf48961eadf057f 098b2b64de04a74e5f6d3e7c4cce0f83a9a28611 1465e38e1597cc3e3b3195e1aa5fc47887c9f4c8 e819e3991476872d947bb7717958ca3dcb916340 25537e936aacb3ca8149788e4881eb80346e2b5f 349d0eeaf1cadc406058655c561d7847cad22aad 22bd01cbfd6832f90053be42fe8bb16fe4440fd2 64079652343410d74b6ad12db706d32bb5756691 70c0c992ffa782efdaa3f59cbdf508ed3320ba3b aeae1b07345627f62d6ae16a184ec24d7705c69f e732031142ba8f11c1c9b511fa112de52eda8a87 2d6baf078caa0620d08f9fe0ad8d43ec633b0a01 264ad11da3cc3aab20cd5bbbcba18458bb404b37 3bbb8325483ec7ae714d84763a430b81f8ed622c b4103e4c6f22b7db8500ab98a90030f832c11869 d4580cddc40044f40c03c351d7b8eca080700cee 9c5fa75bab788711b4546fbfb7d02487d13b3e90 21ff1f6bac401fa4123059e0073f97265de01ccd 9c7adb60 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [61:f0:44:0b:bc:2f:b4:f5:9b:bc:13:6c:c4:76:ed:6c:fa:e3:c0:15],[56:66:d1:a4] modulus: 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 public exponent: 10001 ]