By type
2023-01-10 03:31:12,747 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2023-01-10 03:31:15,056 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2023-01-10 03:31:16.725 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Jan 10, 2023 3:31:20 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jan 10, 2023 3:31:20 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jan 10, 2023 3:31:20 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jan 10, 2023 3:31:21 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2023-01-10 03:31:22.084 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2023-01-10 03:31:22.574 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2023-01-10 03:31:22.905 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2023-01-10 03:31:24.142 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2023-01-10 03:31:24.145 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2023-01-10 03:31:24.146 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2023-01-10 03:31:24.153 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2023-01-10 03:31:24.207 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2023-01-10 03:31:24.212 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2023-01-10 03:31:24.380 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2023-01-10 03:31:25.371 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jan 10, 2023 3:31:26 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2023-01-10 03:31:26.723 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 15.735 seconds (JVM running for 19.651) Jan 10, 2023 3:31:38 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2023-01-10 04:55:53.131 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-10 04:55:53.171 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-10 04:55:53.257 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-10 04:55:53.264 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-10 04:55:53.299 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-10 04:55:53.303 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-10 04:55:53.305 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-10 04:55:53.308 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-10 04:55:53.309 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-10 04:55:53.317 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-10 04:55:53.345 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-10 04:55:53.353 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-10 04:55:53.956 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-10 04:55:53.984 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-10 04:55:53.986 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-10 04:55:54.001 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-10 04:55:55.233 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-10 04:55:55.237 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-10 04:55:55.238 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-10 04:55:55.240 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-10 04:55:55.255 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-10 04:55:55.257 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-10 04:55:55.258 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-10 04:55:55.259 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-10 04:55:55.260 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-10 04:55:55.297 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-10 04:55:55.297 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-10 04:55:55.298 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-10 04:55:55.306 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-10 04:55:55.307 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-10 04:55:55.307 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-10 04:55:55.310 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-10 04:55:55.363 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 92551955864557222341923700481685480651316379942 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 10 03:11:30 UTC 2023 Final Date: Sun Jan 09 03:11:29 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [41:3a:f8:fd:4b:34:ad:b0:3b:a7:6f:01:55:85:b6:b0:b9:00:b3:34],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9570edcd42b0751f637c70ab8520388091daccfd 1775851dd2b514999c672133e70e42826b754577 51ba26c49d7cdc3922d81acc640b9790a8a1cc67 16624bb536f8ce94ed668183cfff4602444e2be1 300137d6caa0dd0b6e48a3e03cfc83f064f307df 988f0295ed35691342d3560f119679822f5073f1 e8f19c702556bb9872f29bca159190177cfb559d 9eb4516a7101faa13d00163787643cb05bf4454d fbcb1dce03ae6ef0dcb7eb1d16b5df4a1bfc0350 62de7fabad4d7c1ab737f8af4b5981197464e271 0e59694ae1e8cc64cb388e410c2ef915b7e6c44a 9f76e7603135bf48394e3fa105a0e530d6c2a1e8 f94664aad97ef9187d0a8f874476b7a34cb45174 2d84468c0ab44ca3d618bc27365ad1754d3a0b42 101685507183da0d0b923e6fccc6069bd9a308cb 061b0ab87c2fc23ee46a8b02198d6c1ce62e0ff7 1bf538bf7fd5a1637669d542e6dd081c868f9f75 82aa063ea05001514999762286ef72b33b0fdcf9 3e0a611fe6bfeeb2a5741a411aa051f836dbc3ec e89539dd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [34:51:93:45:e9:54:7f:93:fd:5e:47:e4:5b:cb:77:41:7d:2b:1d:ae],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-10 04:57:39.016 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-10 04:57:39.020 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-10 04:57:39.025 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2023-01-10 04:57:39.026 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-10 04:57:39.027 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2023-01-10 04:57:39.028 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-10 04:57:39.029 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-10 04:57:39.030 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-10 04:57:39.031 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-10 04:57:39.031 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-10 04:57:39.041 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-10 04:57:39.042 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-10 04:57:39.042 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-10 04:57:39.043 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-10 04:57:39.372 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-10 04:57:39.373 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-10 04:57:39.374 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-10 04:57:39.374 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-10 04:57:39.379 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-10 04:57:39.380 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-10 04:57:39.381 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-10 04:57:39.382 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-10 04:57:39.383 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-10 04:57:39.385 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-10 04:57:39.386 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-10 04:57:39.387 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-10 04:57:39.393 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-10 04:57:39.394 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-10 04:57:39.394 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-10 04:57:39.396 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-10 04:57:39.403 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 92551955864557222341923700481685480651316379942 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 10 03:11:30 UTC 2023 Final Date: Sun Jan 09 03:11:29 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [41:3a:f8:fd:4b:34:ad:b0:3b:a7:6f:01:55:85:b6:b0:b9:00:b3:34],[56:66:d1:a4] modulus: c1480f69181a43a09ad7fcef96a635376e1b376c4ea66194507d426351042c371efe07f782581c8c822fef46ca7901b280dbccdb5b8b89b8e97ce2679f5d3e185f0842c0d5f58aff4d592ce55915cf9f9366327ff95986cfa6287a799880115b9ac17d8e9ec922e2b0b9857a4ffc97b3f9b926b16502f78b0e9ac6881ee5dac5a1f0eb03db44556acb328a5380ac0a3bd130113a69db34dba36e095dd3e888da439aeedded9f6701e5c241babff52da3bf0dc716caf95c701de45f1afd249646d76620c86703060944007210e9bada57798674a216976404c3b49445a6106f3a4445e313f56290b4aa458199516e2da791782a0287a523c7170fd21c0fa5e23a8bd52b3c6356d3f1c18a2e95aa555e4e30725d4e0cdbc56c7eb6e9b8f42aba3ef3335994d6068dd006dafc23f5b517283ec9743f9b181a545ca50ff453951ad15ced4bf90b276b1e26134ffa2861005b18ac8bc2044f45f839032182782f669e10f9ad01a8261bde6a4d1c187d426bbdc3edc34f57e00ceb7fbd865a05fa6613 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9570edcd42b0751f637c70ab8520388091daccfd 1775851dd2b514999c672133e70e42826b754577 51ba26c49d7cdc3922d81acc640b9790a8a1cc67 16624bb536f8ce94ed668183cfff4602444e2be1 300137d6caa0dd0b6e48a3e03cfc83f064f307df 988f0295ed35691342d3560f119679822f5073f1 e8f19c702556bb9872f29bca159190177cfb559d 9eb4516a7101faa13d00163787643cb05bf4454d fbcb1dce03ae6ef0dcb7eb1d16b5df4a1bfc0350 62de7fabad4d7c1ab737f8af4b5981197464e271 0e59694ae1e8cc64cb388e410c2ef915b7e6c44a 9f76e7603135bf48394e3fa105a0e530d6c2a1e8 f94664aad97ef9187d0a8f874476b7a34cb45174 2d84468c0ab44ca3d618bc27365ad1754d3a0b42 101685507183da0d0b923e6fccc6069bd9a308cb 061b0ab87c2fc23ee46a8b02198d6c1ce62e0ff7 1bf538bf7fd5a1637669d542e6dd081c868f9f75 82aa063ea05001514999762286ef72b33b0fdcf9 3e0a611fe6bfeeb2a5741a411aa051f836dbc3ec e89539dd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1f:aa:74:e1:2a:bf:3b:36:55:17:10:60:1f:f2:f9:ca:f3:a1:9a:3a],[56:66:d1:a4] modulus: dcba6b46b38c562293b60a2fb8971c42764cb62b83cabaa3caa5f572078c788370e852f273bd3f176a9bdfa689e0067348f980c263f43c8feff7222092be39d788ca2db91fc8fb09202307598c18c1e038d3f12eea38b51c0194109fa32492b735a1bd8d4dd9471a309e0c41584286d67168e823c89087249c322bb11a487daae270b5cc3cd8d20f239cc0808cc6c81a0f58a81dd3f04a5a166e1e401b7b8d72f835a81dcfc8623a8245d4ddf49bfa34ee572b3007eccd762f6dbbdf1b6054dec677d9b15c5c4cf70361eb40a4ecdfd12768ba21926da3be710973f8d7a0acf463cb8503ec47d699bd68f0524bcd05406a174cfc49c0293df7d97eb3ab9534c5 public exponent: 10001 ] 2023-01-10 04:59:19.224 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-10 04:59:19.226 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-10 04:59:19.229 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2023-01-10 04:59:19.230 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-10 04:59:19.231 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2023-01-10 04:59:19.232 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-10 04:59:19.233 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-10 04:59:19.233 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-10 04:59:19.234 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-10 04:59:19.242 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-10 04:59:19.249 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-10 04:59:19.252 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-10 04:59:19.262 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-10 04:59:19.263 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-10 04:59:19.686 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-10 04:59:19.686 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-10 04:59:19.687 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-10 04:59:19.687 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-10 04:59:19.689 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-10 04:59:19.690 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-10 04:59:19.690 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-10 04:59:19.691 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-10 04:59:19.691 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-10 04:59:19.693 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-10 04:59:19.694 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-10 04:59:19.694 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-10 04:59:19.695 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-10 04:59:19.695 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-10 04:59:19.696 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-10 04:59:19.697 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-10 04:59:19.701 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 92551955864557222341923700481685480651316379942 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 10 03:11:30 UTC 2023 Final Date: Sun Jan 09 03:11:29 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [41:3a:f8:fd:4b:34:ad:b0:3b:a7:6f:01:55:85:b6:b0:b9:00:b3:34],[56:66:d1:a4] modulus: c1480f69181a43a09ad7fcef96a635376e1b376c4ea66194507d426351042c371efe07f782581c8c822fef46ca7901b280dbccdb5b8b89b8e97ce2679f5d3e185f0842c0d5f58aff4d592ce55915cf9f9366327ff95986cfa6287a799880115b9ac17d8e9ec922e2b0b9857a4ffc97b3f9b926b16502f78b0e9ac6881ee5dac5a1f0eb03db44556acb328a5380ac0a3bd130113a69db34dba36e095dd3e888da439aeedded9f6701e5c241babff52da3bf0dc716caf95c701de45f1afd249646d76620c86703060944007210e9bada57798674a216976404c3b49445a6106f3a4445e313f56290b4aa458199516e2da791782a0287a523c7170fd21c0fa5e23a8bd52b3c6356d3f1c18a2e95aa555e4e30725d4e0cdbc56c7eb6e9b8f42aba3ef3335994d6068dd006dafc23f5b517283ec9743f9b181a545ca50ff453951ad15ced4bf90b276b1e26134ffa2861005b18ac8bc2044f45f839032182782f669e10f9ad01a8261bde6a4d1c187d426bbdc3edc34f57e00ceb7fbd865a05fa6613 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9570edcd42b0751f637c70ab8520388091daccfd 1775851dd2b514999c672133e70e42826b754577 51ba26c49d7cdc3922d81acc640b9790a8a1cc67 16624bb536f8ce94ed668183cfff4602444e2be1 300137d6caa0dd0b6e48a3e03cfc83f064f307df 988f0295ed35691342d3560f119679822f5073f1 e8f19c702556bb9872f29bca159190177cfb559d 9eb4516a7101faa13d00163787643cb05bf4454d fbcb1dce03ae6ef0dcb7eb1d16b5df4a1bfc0350 62de7fabad4d7c1ab737f8af4b5981197464e271 0e59694ae1e8cc64cb388e410c2ef915b7e6c44a 9f76e7603135bf48394e3fa105a0e530d6c2a1e8 f94664aad97ef9187d0a8f874476b7a34cb45174 2d84468c0ab44ca3d618bc27365ad1754d3a0b42 101685507183da0d0b923e6fccc6069bd9a308cb 061b0ab87c2fc23ee46a8b02198d6c1ce62e0ff7 1bf538bf7fd5a1637669d542e6dd081c868f9f75 82aa063ea05001514999762286ef72b33b0fdcf9 3e0a611fe6bfeeb2a5741a411aa051f836dbc3ec e89539dd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4e:ab:33:b9:21:1e:c9:05:d6:53:5e:c6:c6:65:18:d5:0a:ed:ef:95],[56:66:d1:a4] modulus: c1f74ea87a197a0a9a19a97a71799efa332b1a24dab6699816fa031943420fea7f8e582aaf60d56fe77c8bcac84bc8b212e0814c3c6e64b55df2616803acdfa5559ad4e5c9af464890f4d8e6fef6e6d9bc57be9bae453df94dcdb89fbd4f29e254419c9ea841f4dde029db352576a5c38b525f1fc6fe0a7823e3ae28585bc4a05288de4d4acfd07d50a4b3828106c4dd0ab209a4c8c6bcfda36cc5b530378b74a09f7439f2e8c64058bade6e7a15bc1cb34d1780f63fc9942bbdc8f0deb2cb0aac9b289eeb6ca1d7dce824460fadd879d0fa9a07ebcc5d867586b8ad528565af02535e5fc3677e206c49a0f39d8d66157076dfeddbbaee2c105d38520e539f31 public exponent: 10001 ] 2023-01-10 05:03:07.614 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-10 05:03:07.617 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-10 05:03:07.619 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-10 05:03:07.621 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-10 05:03:07.621 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-10 05:03:07.622 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-10 05:03:07.623 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-10 05:03:07.623 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-10 05:03:07.624 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-10 05:03:07.625 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-10 05:03:07.634 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-10 05:03:07.636 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-10 05:03:07.637 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-10 05:03:07.638 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-10 05:03:08.028 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-10 05:03:08.033 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-10 05:03:08.034 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-10 05:03:08.035 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-10 05:03:08.038 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-10 05:03:08.039 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-10 05:03:08.040 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-10 05:03:08.041 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-10 05:03:08.042 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-10 05:03:08.044 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-10 05:03:08.044 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-10 05:03:08.045 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-10 05:03:08.046 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-10 05:03:08.047 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-10 05:03:08.047 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-10 05:03:08.048 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-10 05:03:08.056 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 92551955864557222341923700481685480651316379942 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 10 03:11:30 UTC 2023 Final Date: Sun Jan 09 03:11:29 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [41:3a:f8:fd:4b:34:ad:b0:3b:a7:6f:01:55:85:b6:b0:b9:00:b3:34],[56:66:d1:a4] modulus: c1480f69181a43a09ad7fcef96a635376e1b376c4ea66194507d426351042c371efe07f782581c8c822fef46ca7901b280dbccdb5b8b89b8e97ce2679f5d3e185f0842c0d5f58aff4d592ce55915cf9f9366327ff95986cfa6287a799880115b9ac17d8e9ec922e2b0b9857a4ffc97b3f9b926b16502f78b0e9ac6881ee5dac5a1f0eb03db44556acb328a5380ac0a3bd130113a69db34dba36e095dd3e888da439aeedded9f6701e5c241babff52da3bf0dc716caf95c701de45f1afd249646d76620c86703060944007210e9bada57798674a216976404c3b49445a6106f3a4445e313f56290b4aa458199516e2da791782a0287a523c7170fd21c0fa5e23a8bd52b3c6356d3f1c18a2e95aa555e4e30725d4e0cdbc56c7eb6e9b8f42aba3ef3335994d6068dd006dafc23f5b517283ec9743f9b181a545ca50ff453951ad15ced4bf90b276b1e26134ffa2861005b18ac8bc2044f45f839032182782f669e10f9ad01a8261bde6a4d1c187d426bbdc3edc34f57e00ceb7fbd865a05fa6613 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9570edcd42b0751f637c70ab8520388091daccfd 1775851dd2b514999c672133e70e42826b754577 51ba26c49d7cdc3922d81acc640b9790a8a1cc67 16624bb536f8ce94ed668183cfff4602444e2be1 300137d6caa0dd0b6e48a3e03cfc83f064f307df 988f0295ed35691342d3560f119679822f5073f1 e8f19c702556bb9872f29bca159190177cfb559d 9eb4516a7101faa13d00163787643cb05bf4454d fbcb1dce03ae6ef0dcb7eb1d16b5df4a1bfc0350 62de7fabad4d7c1ab737f8af4b5981197464e271 0e59694ae1e8cc64cb388e410c2ef915b7e6c44a 9f76e7603135bf48394e3fa105a0e530d6c2a1e8 f94664aad97ef9187d0a8f874476b7a34cb45174 2d84468c0ab44ca3d618bc27365ad1754d3a0b42 101685507183da0d0b923e6fccc6069bd9a308cb 061b0ab87c2fc23ee46a8b02198d6c1ce62e0ff7 1bf538bf7fd5a1637669d542e6dd081c868f9f75 82aa063ea05001514999762286ef72b33b0fdcf9 3e0a611fe6bfeeb2a5741a411aa051f836dbc3ec e89539dd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c0:54:94:03:07:80:5e:ee:9f:c7:02:a0:b4:f6:ef:00:6e:42:9b:49],[56:66:d1:a4] modulus: cc94e351e50eca65c9fd5566849c5f59e9d31def5b8da91acaf86643b15b891e4f6316c85cc985418d1c2a4a95a11659ae5c3146f6f6372c25e38ac66311a5a190eb9fe3d9abba93196e6970285a4e0a445fcf0885e238f696665e9ec4eb444d304986f0a5a1bcbb7efef1e17ea5340fe5e04d6a87ebfc9916cc51168ec69d382490fafbc1ff6db3eb62bf6be01e7e8b1ae43487d85e4545ffe0649b756f5246cf84b45f42f2566feae5d7b816bb04f09dd4b3cb81e74563078eacb791822166bd025018a1c7dd1d21355c52584e02c2a9cec7ed817c005717e850e34d73b8152e59996759f8163950ffddc346e2a86a4efa3e14e4e84dfb09aa1433f1251af9 public exponent: 10001 ] 2023-01-10 05:19:40.596 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-10 05:19:40.604 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-10 05:19:40.607 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2023-01-10 05:19:40.609 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-10 05:19:40.610 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2023-01-10 05:19:40.611 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-10 05:19:40.611 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-10 05:19:40.612 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-10 05:19:40.613 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-10 05:19:40.613 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-10 05:19:40.619 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-10 05:19:40.621 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-10 05:19:40.622 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-10 05:19:40.622 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-10 05:19:41.027 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-10 05:19:41.029 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-10 05:19:41.029 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-10 05:19:41.030 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-10 05:19:41.033 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-10 05:19:41.034 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-10 05:19:41.035 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-10 05:19:41.035 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-10 05:19:41.036 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-10 05:19:41.040 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-10 05:19:41.042 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-10 05:19:41.043 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-10 05:19:41.050 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-10 05:19:41.052 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-10 05:19:41.053 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-10 05:19:41.055 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-10 05:19:41.059 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 92551955864557222341923700481685480651316379942 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 10 03:11:30 UTC 2023 Final Date: Sun Jan 09 03:11:29 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [41:3a:f8:fd:4b:34:ad:b0:3b:a7:6f:01:55:85:b6:b0:b9:00:b3:34],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9570edcd42b0751f637c70ab8520388091daccfd 1775851dd2b514999c672133e70e42826b754577 51ba26c49d7cdc3922d81acc640b9790a8a1cc67 16624bb536f8ce94ed668183cfff4602444e2be1 300137d6caa0dd0b6e48a3e03cfc83f064f307df 988f0295ed35691342d3560f119679822f5073f1 e8f19c702556bb9872f29bca159190177cfb559d 9eb4516a7101faa13d00163787643cb05bf4454d fbcb1dce03ae6ef0dcb7eb1d16b5df4a1bfc0350 62de7fabad4d7c1ab737f8af4b5981197464e271 0e59694ae1e8cc64cb388e410c2ef915b7e6c44a 9f76e7603135bf48394e3fa105a0e530d6c2a1e8 f94664aad97ef9187d0a8f874476b7a34cb45174 2d84468c0ab44ca3d618bc27365ad1754d3a0b42 101685507183da0d0b923e6fccc6069bd9a308cb 061b0ab87c2fc23ee46a8b02198d6c1ce62e0ff7 1bf538bf7fd5a1637669d542e6dd081c868f9f75 82aa063ea05001514999762286ef72b33b0fdcf9 3e0a611fe6bfeeb2a5741a411aa051f836dbc3ec e89539dd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c7:b4:36:db:a0:ba:fb:12:c6:41:e7:1f:38:34:61:24:56:df:dc:fd],[56:66:d1:a4] modulus: ac429ce762110ab7d714199b91fe4dad5d10d500ff9a01b055852436222b9bf8fe647c4572eb6798747236ed81fd9aa42f1d4bd733ddeaddab2450c74dfd0ffe4eef5220901b360d52da60d7cd567bbd65ad637bd2ed71e490bd40268de68954780490482647fd213e28ec6051235413d549e0731f220b18e498492c605c26c52e59d3d78597a5287e12ff05193c625b7fdbb780d3e1742f792060c2316d3b6afefd08b26bf0255c97a7da6d8286ba3afcef3d798f03ab59b42adbb7ffa5b99166e9835501840f1c055d693ab5a277ae306c10b6dbf3a9b9b0b62138d8c99230666c931f53d4eac37a53b556c59e039050e9382842e431229bbda6716ff55927 public exponent: 10001 ] 2023-01-10 05:27:09.160 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-10 05:27:09.167 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-10 05:27:09.171 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-10 05:27:09.173 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-10 05:27:09.174 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-10 05:27:09.176 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-10 05:27:09.177 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-10 05:27:09.178 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-10 05:27:09.178 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-10 05:27:09.179 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-10 05:27:09.203 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-10 05:27:09.205 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-10 05:27:09.206 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-10 05:27:09.206 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-10 05:27:09.575 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-10 05:27:09.576 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-10 05:27:09.576 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-10 05:27:09.577 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-10 05:27:09.579 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-10 05:27:09.580 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-10 05:27:09.581 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-10 05:27:09.581 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-10 05:27:09.582 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-10 05:27:09.583 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-10 05:27:09.584 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-10 05:27:09.584 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-10 05:27:09.585 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-10 05:27:09.585 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-10 05:27:09.586 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-10 05:27:09.586 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-10 05:27:09.590 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 92551955864557222341923700481685480651316379942 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 10 03:11:30 UTC 2023 Final Date: Sun Jan 09 03:11:29 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [41:3a:f8:fd:4b:34:ad:b0:3b:a7:6f:01:55:85:b6:b0:b9:00:b3:34],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9570edcd42b0751f637c70ab8520388091daccfd 1775851dd2b514999c672133e70e42826b754577 51ba26c49d7cdc3922d81acc640b9790a8a1cc67 16624bb536f8ce94ed668183cfff4602444e2be1 300137d6caa0dd0b6e48a3e03cfc83f064f307df 988f0295ed35691342d3560f119679822f5073f1 e8f19c702556bb9872f29bca159190177cfb559d 9eb4516a7101faa13d00163787643cb05bf4454d fbcb1dce03ae6ef0dcb7eb1d16b5df4a1bfc0350 62de7fabad4d7c1ab737f8af4b5981197464e271 0e59694ae1e8cc64cb388e410c2ef915b7e6c44a 9f76e7603135bf48394e3fa105a0e530d6c2a1e8 f94664aad97ef9187d0a8f874476b7a34cb45174 2d84468c0ab44ca3d618bc27365ad1754d3a0b42 101685507183da0d0b923e6fccc6069bd9a308cb 061b0ab87c2fc23ee46a8b02198d6c1ce62e0ff7 1bf538bf7fd5a1637669d542e6dd081c868f9f75 82aa063ea05001514999762286ef72b33b0fdcf9 3e0a611fe6bfeeb2a5741a411aa051f836dbc3ec e89539dd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2b:a0:df:d0:d6:73:31:fe:3d:98:c1:07:73:1a:85:7d:a9:f9:1c:e5],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-10 05:27:42.366 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-10 05:27:42.369 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-10 05:27:42.374 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-10 05:27:42.377 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-10 05:27:42.378 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-10 05:27:42.380 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-10 05:27:42.381 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-10 05:27:42.381 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-10 05:27:42.382 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-10 05:27:42.383 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-10 05:27:42.390 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-10 05:27:42.391 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-10 05:27:42.391 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-10 05:27:42.392 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-10 05:27:42.705 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-10 05:27:42.706 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-10 05:27:42.707 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-10 05:27:42.707 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-10 05:27:42.709 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-10 05:27:42.710 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-10 05:27:42.711 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-10 05:27:42.711 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-10 05:27:42.712 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-10 05:27:42.713 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-10 05:27:42.714 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-10 05:27:42.714 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-10 05:27:42.716 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-10 05:27:42.716 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-10 05:27:42.717 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-10 05:27:42.718 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-10 05:27:42.723 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 92551955864557222341923700481685480651316379942 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 10 03:11:30 UTC 2023 Final Date: Sun Jan 09 03:11:29 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [41:3a:f8:fd:4b:34:ad:b0:3b:a7:6f:01:55:85:b6:b0:b9:00:b3:34],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9570edcd42b0751f637c70ab8520388091daccfd 1775851dd2b514999c672133e70e42826b754577 51ba26c49d7cdc3922d81acc640b9790a8a1cc67 16624bb536f8ce94ed668183cfff4602444e2be1 300137d6caa0dd0b6e48a3e03cfc83f064f307df 988f0295ed35691342d3560f119679822f5073f1 e8f19c702556bb9872f29bca159190177cfb559d 9eb4516a7101faa13d00163787643cb05bf4454d fbcb1dce03ae6ef0dcb7eb1d16b5df4a1bfc0350 62de7fabad4d7c1ab737f8af4b5981197464e271 0e59694ae1e8cc64cb388e410c2ef915b7e6c44a 9f76e7603135bf48394e3fa105a0e530d6c2a1e8 f94664aad97ef9187d0a8f874476b7a34cb45174 2d84468c0ab44ca3d618bc27365ad1754d3a0b42 101685507183da0d0b923e6fccc6069bd9a308cb 061b0ab87c2fc23ee46a8b02198d6c1ce62e0ff7 1bf538bf7fd5a1637669d542e6dd081c868f9f75 82aa063ea05001514999762286ef72b33b0fdcf9 3e0a611fe6bfeeb2a5741a411aa051f836dbc3ec e89539dd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9b:55:a7:9b:01:7f:ad:e7:86:ca:5e:f5:f0:21:69:19:06:36:a8:38],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-10 05:52:27.308 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-10 05:52:27.316 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-10 05:52:27.325 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-10 05:52:27.327 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-10 05:52:27.328 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-10 05:52:27.329 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-10 05:52:27.329 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-10 05:52:27.331 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-10 05:52:27.332 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-10 05:52:27.333 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-10 05:52:27.339 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-10 05:52:27.341 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-10 05:52:27.341 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-10 05:52:27.341 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-10 05:52:27.656 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-10 05:52:27.657 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-10 05:52:27.657 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-10 05:52:27.657 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-10 05:52:27.659 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-10 05:52:27.659 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-10 05:52:27.660 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-10 05:52:27.660 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-10 05:52:27.661 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-10 05:52:27.663 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-10 05:52:27.664 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-10 05:52:27.664 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-10 05:52:27.665 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-10 05:52:27.665 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-10 05:52:27.669 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-10 05:52:27.674 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-10 05:52:27.679 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 92551955864557222341923700481685480651316379942 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 10 03:11:30 UTC 2023 Final Date: Sun Jan 09 03:11:29 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [41:3a:f8:fd:4b:34:ad:b0:3b:a7:6f:01:55:85:b6:b0:b9:00:b3:34],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9570edcd42b0751f637c70ab8520388091daccfd 1775851dd2b514999c672133e70e42826b754577 51ba26c49d7cdc3922d81acc640b9790a8a1cc67 16624bb536f8ce94ed668183cfff4602444e2be1 300137d6caa0dd0b6e48a3e03cfc83f064f307df 988f0295ed35691342d3560f119679822f5073f1 e8f19c702556bb9872f29bca159190177cfb559d 9eb4516a7101faa13d00163787643cb05bf4454d fbcb1dce03ae6ef0dcb7eb1d16b5df4a1bfc0350 62de7fabad4d7c1ab737f8af4b5981197464e271 0e59694ae1e8cc64cb388e410c2ef915b7e6c44a 9f76e7603135bf48394e3fa105a0e530d6c2a1e8 f94664aad97ef9187d0a8f874476b7a34cb45174 2d84468c0ab44ca3d618bc27365ad1754d3a0b42 101685507183da0d0b923e6fccc6069bd9a308cb 061b0ab87c2fc23ee46a8b02198d6c1ce62e0ff7 1bf538bf7fd5a1637669d542e6dd081c868f9f75 82aa063ea05001514999762286ef72b33b0fdcf9 3e0a611fe6bfeeb2a5741a411aa051f836dbc3ec e89539dd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [54:a8:db:63:ec:cd:c5:59:f6:32:3e:97:1b:aa:9e:48:c4:c7:63:fe],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-10 05:52:36.371 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-10 05:52:36.372 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-10 05:52:36.374 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-10 05:52:36.375 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-10 05:52:36.375 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-10 05:52:36.376 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-10 05:52:36.376 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-10 05:52:36.376 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-10 05:52:36.377 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-10 05:52:36.377 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-10 05:52:36.383 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-10 05:52:36.384 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-10 05:52:36.384 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-10 05:52:36.385 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-10 05:52:36.647 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-10 05:52:36.648 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-10 05:52:36.649 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-10 05:52:36.649 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-10 05:52:36.651 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-10 05:52:36.652 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-10 05:52:36.653 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-10 05:52:36.653 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-10 05:52:36.653 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-10 05:52:36.656 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-10 05:52:36.656 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-10 05:52:36.657 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-10 05:52:36.658 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-10 05:52:36.658 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-10 05:52:36.659 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-10 05:52:36.660 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-10 05:52:36.664 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 92551955864557222341923700481685480651316379942 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 10 03:11:30 UTC 2023 Final Date: Sun Jan 09 03:11:29 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [41:3a:f8:fd:4b:34:ad:b0:3b:a7:6f:01:55:85:b6:b0:b9:00:b3:34],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9570edcd42b0751f637c70ab8520388091daccfd 1775851dd2b514999c672133e70e42826b754577 51ba26c49d7cdc3922d81acc640b9790a8a1cc67 16624bb536f8ce94ed668183cfff4602444e2be1 300137d6caa0dd0b6e48a3e03cfc83f064f307df 988f0295ed35691342d3560f119679822f5073f1 e8f19c702556bb9872f29bca159190177cfb559d 9eb4516a7101faa13d00163787643cb05bf4454d fbcb1dce03ae6ef0dcb7eb1d16b5df4a1bfc0350 62de7fabad4d7c1ab737f8af4b5981197464e271 0e59694ae1e8cc64cb388e410c2ef915b7e6c44a 9f76e7603135bf48394e3fa105a0e530d6c2a1e8 f94664aad97ef9187d0a8f874476b7a34cb45174 2d84468c0ab44ca3d618bc27365ad1754d3a0b42 101685507183da0d0b923e6fccc6069bd9a308cb 061b0ab87c2fc23ee46a8b02198d6c1ce62e0ff7 1bf538bf7fd5a1637669d542e6dd081c868f9f75 82aa063ea05001514999762286ef72b33b0fdcf9 3e0a611fe6bfeeb2a5741a411aa051f836dbc3ec e89539dd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e7:e8:f4:83:91:95:59:09:e3:ee:05:4e:de:64:d8:ef:29:4e:f1:86],[56:66:d1:a4] modulus: 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 public exponent: 10001 ]