By type
2023-01-11 03:32:12,954 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2023-01-11 03:32:16,806 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2023-01-11 03:32:19.681 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Jan 11, 2023 3:32:28 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jan 11, 2023 3:32:28 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jan 11, 2023 3:32:28 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jan 11, 2023 3:32:28 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2023-01-11 03:32:29.818 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2023-01-11 03:32:30.411 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2023-01-11 03:32:30.774 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2023-01-11 03:32:33.469 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2023-01-11 03:32:33.498 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2023-01-11 03:32:33.502 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2023-01-11 03:32:33.514 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2023-01-11 03:32:33.612 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2023-01-11 03:32:33.623 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2023-01-11 03:32:33.944 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2023-01-11 03:32:36.118 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jan 11, 2023 3:32:38 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2023-01-11 03:32:39.338 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 29.875 seconds (JVM running for 37.913) Jan 11, 2023 3:32:40 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2023-01-11 04:53:18.929 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-11 04:53:18.969 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-11 04:53:19.307 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-11 04:53:19.330 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-11 04:53:19.398 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-11 04:53:19.405 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-11 04:53:19.411 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-11 04:53:19.414 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-11 04:53:19.415 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-11 04:53:19.423 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-11 04:53:19.446 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-11 04:53:19.470 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-11 04:53:19.672 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-11 04:53:20.020 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-11 04:53:20.021 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-11 04:53:20.027 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-11 04:53:21.314 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-11 04:53:21.324 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-11 04:53:21.325 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-11 04:53:21.338 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-11 04:53:21.361 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-11 04:53:21.365 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-11 04:53:21.366 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-11 04:53:21.367 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-11 04:53:21.370 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-11 04:53:21.431 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-11 04:53:21.433 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-11 04:53:21.438 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-11 04:53:21.463 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-11 04:53:21.465 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-11 04:53:21.466 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-11 04:53:21.472 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-11 04:53:21.580 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 155166148919103244539810985875530366520352351227 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jan 11 03:07:48 UTC 2023 Final Date: Mon Jan 10 03:07:47 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e5:45:72:be:d2:06:59:09:f7:4a:f8:d6:18:1e:40:1b:c5:7e:e8:17],[56:66:d1:a4] modulus: ae31560371b2c7f03bc67231f9d7d31b3a7f8944e5e376a0fc2ea80426eab83e6ae07b03fd1c329de34eacb9fd1b43395b6bbb7956c00c2c4b3e1e5c208844f278b903756dd3080f16bb64c7e4f65816f55d5a7294b5f8e816189faff054f29282c6dbb43ac67d751affb6378bc36866e9279836046d6674c7de7a2892d90f2311886b32ecb7f4a8d8e7b6ae350cffcfcd82d252ebf7e40ccb0af7580d3a05b93fc4089886c6904ebea7a7bb9a3caf2094bc3f2844c839da69c29f10a0a778a1a361be3fbbeaf9bdf7dffd5ebd2d2e52a9afe6b578ab5297e485b7f4b9c9fb444af014af3091f7fbbdd2325994e914370f6493672ea7dabc1f5ae9444a8ceca1b0628d32a65042451bba267fcbc5fd83c04c32c7e4d61eef2930ea09d324c46bf5368b087b7f8041571a0d2b2cd5dede44a77ef9c37c845674300d5e5c22e1f1e92debb5ea2341a6df5d53f57a3851150855489b92f6634c26b9a7ee2f2ac13570c668ce1e379085538987bf78ad19fc2f42df5ca2d7ab72b65df784937edea1 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6ff09f5608c2c000c0f2cbe186467da6971c794d 5ccbd2099bc307a3b20c8a3faa40db9284c895e2 f723d9e64c56410b80763057a16dac511aed3fea 9cb9fa63fa5ef33fccca7bb6e171816ba59c434d 33f91ccb67799128ec8ae5a96ea9d0fcda2c78c5 fa3f12c4b65d0714347c43cc7d4369100e2f1434 05f852596ef4aa8fe8b8b67507f11717f4ce8eaf 7e1a0bd0ce55f4326bd2c2737ca4eb2087752fba 12c9e8739502bd10138df6c19a2e9ede21240c11 1d58298612eaa4c01a3c801f3503313da79c80a2 3677e840e3d8c9ef8f55dab3c1844ddc91f54795 bd71945ac701d4e4c288385e5b7ee956be487936 ecc27e02e9a7e38adcfbac3cf61f8fcc7490f6c6 54602e61132ee7722f6f1654b563abb4a136ea42 4f049b5f435b11b1e6de94cb6b2900c848621a14 d148f89f7ad71909ee1d3165d8f0343dd2515580 4142649cbcd83474fc56dc5e3248c3e26c998434 0530da368f1425ec20c26c6cf9498a4abceb8fff 96a9f696355fbbe2e50975d7b3f68f875cc0d9a9 8b9d9014 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c2:8c:7d:19:ea:74:05:e9:05:6e:8f:3d:77:91:d3:e9:5a:ba:38:88],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-11 05:00:39.606 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-11 05:00:39.609 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-11 05:00:39.613 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-11 05:00:39.615 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-11 05:00:39.615 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-11 05:00:39.616 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-11 05:00:39.617 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-11 05:00:39.618 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-11 05:00:39.619 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-11 05:00:39.620 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-11 05:00:39.629 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-11 05:00:39.631 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-11 05:00:39.632 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-11 05:00:39.632 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-11 05:00:39.876 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-11 05:00:39.878 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-11 05:00:39.878 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-11 05:00:39.879 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-11 05:00:39.883 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-11 05:00:39.885 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-11 05:00:39.885 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-11 05:00:39.886 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-11 05:00:39.886 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-11 05:00:39.888 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-11 05:00:39.889 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-11 05:00:39.889 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-11 05:00:39.891 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-11 05:00:39.891 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-11 05:00:39.892 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-11 05:00:39.894 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-11 05:00:39.901 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 155166148919103244539810985875530366520352351227 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jan 11 03:07:48 UTC 2023 Final Date: Mon Jan 10 03:07:47 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e5:45:72:be:d2:06:59:09:f7:4a:f8:d6:18:1e:40:1b:c5:7e:e8:17],[56:66:d1:a4] modulus: ae31560371b2c7f03bc67231f9d7d31b3a7f8944e5e376a0fc2ea80426eab83e6ae07b03fd1c329de34eacb9fd1b43395b6bbb7956c00c2c4b3e1e5c208844f278b903756dd3080f16bb64c7e4f65816f55d5a7294b5f8e816189faff054f29282c6dbb43ac67d751affb6378bc36866e9279836046d6674c7de7a2892d90f2311886b32ecb7f4a8d8e7b6ae350cffcfcd82d252ebf7e40ccb0af7580d3a05b93fc4089886c6904ebea7a7bb9a3caf2094bc3f2844c839da69c29f10a0a778a1a361be3fbbeaf9bdf7dffd5ebd2d2e52a9afe6b578ab5297e485b7f4b9c9fb444af014af3091f7fbbdd2325994e914370f6493672ea7dabc1f5ae9444a8ceca1b0628d32a65042451bba267fcbc5fd83c04c32c7e4d61eef2930ea09d324c46bf5368b087b7f8041571a0d2b2cd5dede44a77ef9c37c845674300d5e5c22e1f1e92debb5ea2341a6df5d53f57a3851150855489b92f6634c26b9a7ee2f2ac13570c668ce1e379085538987bf78ad19fc2f42df5ca2d7ab72b65df784937edea1 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6ff09f5608c2c000c0f2cbe186467da6971c794d 5ccbd2099bc307a3b20c8a3faa40db9284c895e2 f723d9e64c56410b80763057a16dac511aed3fea 9cb9fa63fa5ef33fccca7bb6e171816ba59c434d 33f91ccb67799128ec8ae5a96ea9d0fcda2c78c5 fa3f12c4b65d0714347c43cc7d4369100e2f1434 05f852596ef4aa8fe8b8b67507f11717f4ce8eaf 7e1a0bd0ce55f4326bd2c2737ca4eb2087752fba 12c9e8739502bd10138df6c19a2e9ede21240c11 1d58298612eaa4c01a3c801f3503313da79c80a2 3677e840e3d8c9ef8f55dab3c1844ddc91f54795 bd71945ac701d4e4c288385e5b7ee956be487936 ecc27e02e9a7e38adcfbac3cf61f8fcc7490f6c6 54602e61132ee7722f6f1654b563abb4a136ea42 4f049b5f435b11b1e6de94cb6b2900c848621a14 d148f89f7ad71909ee1d3165d8f0343dd2515580 4142649cbcd83474fc56dc5e3248c3e26c998434 0530da368f1425ec20c26c6cf9498a4abceb8fff 96a9f696355fbbe2e50975d7b3f68f875cc0d9a9 8b9d9014 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [fd:ea:b0:c7:ba:ed:39:ac:47:c2:27:94:87:a2:ec:31:c9:56:e2:5f],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-11 05:02:28.084 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-11 05:02:28.092 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-11 05:02:28.103 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2023-01-11 05:02:28.112 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-11 05:02:28.116 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2023-01-11 05:02:28.125 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-11 05:02:28.126 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-11 05:02:28.131 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-11 05:02:28.132 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-11 05:02:28.135 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-11 05:02:28.150 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-11 05:02:28.156 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-11 05:02:28.157 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-11 05:02:28.158 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-11 05:02:28.323 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-11 05:02:28.324 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-11 05:02:28.325 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-11 05:02:28.325 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-11 05:02:28.328 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-11 05:02:28.328 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-11 05:02:28.329 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-11 05:02:28.330 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-11 05:02:28.330 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-11 05:02:28.331 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-11 05:02:28.332 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-11 05:02:28.332 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-11 05:02:28.333 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-11 05:02:28.334 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-11 05:02:28.334 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-11 05:02:28.336 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-11 05:02:28.341 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 155166148919103244539810985875530366520352351227 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jan 11 03:07:48 UTC 2023 Final Date: Mon Jan 10 03:07:47 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e5:45:72:be:d2:06:59:09:f7:4a:f8:d6:18:1e:40:1b:c5:7e:e8:17],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6ff09f5608c2c000c0f2cbe186467da6971c794d 5ccbd2099bc307a3b20c8a3faa40db9284c895e2 f723d9e64c56410b80763057a16dac511aed3fea 9cb9fa63fa5ef33fccca7bb6e171816ba59c434d 33f91ccb67799128ec8ae5a96ea9d0fcda2c78c5 fa3f12c4b65d0714347c43cc7d4369100e2f1434 05f852596ef4aa8fe8b8b67507f11717f4ce8eaf 7e1a0bd0ce55f4326bd2c2737ca4eb2087752fba 12c9e8739502bd10138df6c19a2e9ede21240c11 1d58298612eaa4c01a3c801f3503313da79c80a2 3677e840e3d8c9ef8f55dab3c1844ddc91f54795 bd71945ac701d4e4c288385e5b7ee956be487936 ecc27e02e9a7e38adcfbac3cf61f8fcc7490f6c6 54602e61132ee7722f6f1654b563abb4a136ea42 4f049b5f435b11b1e6de94cb6b2900c848621a14 d148f89f7ad71909ee1d3165d8f0343dd2515580 4142649cbcd83474fc56dc5e3248c3e26c998434 0530da368f1425ec20c26c6cf9498a4abceb8fff 96a9f696355fbbe2e50975d7b3f68f875cc0d9a9 8b9d9014 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d3:80:82:9f:ed:7a:b3:6c:67:b0:93:d4:2e:6a:2c:e3:9e:ac:6a:9e],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-11 05:06:28.494 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-11 05:06:28.502 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-11 05:06:28.506 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2023-01-11 05:06:28.507 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-11 05:06:28.509 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2023-01-11 05:06:28.513 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-11 05:06:28.514 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-11 05:06:28.515 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-11 05:06:28.517 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-11 05:06:28.572 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-11 05:06:28.600 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-11 05:06:28.605 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-11 05:06:28.606 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-11 05:06:28.607 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-11 05:06:28.828 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-11 05:06:28.829 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-11 05:06:28.829 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-11 05:06:28.830 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-11 05:06:28.838 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-11 05:06:28.894 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-11 05:06:28.908 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-11 05:06:28.909 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-11 05:06:28.909 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-11 05:06:28.912 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-11 05:06:28.918 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-11 05:06:28.920 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-11 05:06:28.924 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-11 05:06:28.925 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-11 05:06:28.926 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-11 05:06:28.928 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-11 05:06:29.020 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 155166148919103244539810985875530366520352351227 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jan 11 03:07:48 UTC 2023 Final Date: Mon Jan 10 03:07:47 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e5:45:72:be:d2:06:59:09:f7:4a:f8:d6:18:1e:40:1b:c5:7e:e8:17],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6ff09f5608c2c000c0f2cbe186467da6971c794d 5ccbd2099bc307a3b20c8a3faa40db9284c895e2 f723d9e64c56410b80763057a16dac511aed3fea 9cb9fa63fa5ef33fccca7bb6e171816ba59c434d 33f91ccb67799128ec8ae5a96ea9d0fcda2c78c5 fa3f12c4b65d0714347c43cc7d4369100e2f1434 05f852596ef4aa8fe8b8b67507f11717f4ce8eaf 7e1a0bd0ce55f4326bd2c2737ca4eb2087752fba 12c9e8739502bd10138df6c19a2e9ede21240c11 1d58298612eaa4c01a3c801f3503313da79c80a2 3677e840e3d8c9ef8f55dab3c1844ddc91f54795 bd71945ac701d4e4c288385e5b7ee956be487936 ecc27e02e9a7e38adcfbac3cf61f8fcc7490f6c6 54602e61132ee7722f6f1654b563abb4a136ea42 4f049b5f435b11b1e6de94cb6b2900c848621a14 d148f89f7ad71909ee1d3165d8f0343dd2515580 4142649cbcd83474fc56dc5e3248c3e26c998434 0530da368f1425ec20c26c6cf9498a4abceb8fff 96a9f696355fbbe2e50975d7b3f68f875cc0d9a9 8b9d9014 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [aa:c5:8d:4d:6a:90:6d:fd:14:04:bf:ad:06:db:84:5f:d8:87:b6:0c],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-11 05:09:52.133 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-11 05:09:52.137 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-11 05:09:52.139 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-11 05:09:52.141 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-11 05:09:52.142 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-11 05:09:52.143 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-11 05:09:52.144 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-11 05:09:52.144 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-11 05:09:52.145 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-11 05:09:52.145 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-11 05:09:52.151 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-11 05:09:52.152 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-11 05:09:52.153 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-11 05:09:52.153 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-11 05:09:52.314 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-11 05:09:52.315 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-11 05:09:52.316 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-11 05:09:52.316 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-11 05:09:52.318 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-11 05:09:52.318 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-11 05:09:52.319 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-11 05:09:52.319 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-11 05:09:52.320 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-11 05:09:52.320 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-11 05:09:52.321 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-11 05:09:52.321 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-11 05:09:52.322 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-11 05:09:52.323 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-11 05:09:52.323 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-11 05:09:52.324 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-11 05:09:52.329 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 155166148919103244539810985875530366520352351227 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jan 11 03:07:48 UTC 2023 Final Date: Mon Jan 10 03:07:47 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e5:45:72:be:d2:06:59:09:f7:4a:f8:d6:18:1e:40:1b:c5:7e:e8:17],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6ff09f5608c2c000c0f2cbe186467da6971c794d 5ccbd2099bc307a3b20c8a3faa40db9284c895e2 f723d9e64c56410b80763057a16dac511aed3fea 9cb9fa63fa5ef33fccca7bb6e171816ba59c434d 33f91ccb67799128ec8ae5a96ea9d0fcda2c78c5 fa3f12c4b65d0714347c43cc7d4369100e2f1434 05f852596ef4aa8fe8b8b67507f11717f4ce8eaf 7e1a0bd0ce55f4326bd2c2737ca4eb2087752fba 12c9e8739502bd10138df6c19a2e9ede21240c11 1d58298612eaa4c01a3c801f3503313da79c80a2 3677e840e3d8c9ef8f55dab3c1844ddc91f54795 bd71945ac701d4e4c288385e5b7ee956be487936 ecc27e02e9a7e38adcfbac3cf61f8fcc7490f6c6 54602e61132ee7722f6f1654b563abb4a136ea42 4f049b5f435b11b1e6de94cb6b2900c848621a14 d148f89f7ad71909ee1d3165d8f0343dd2515580 4142649cbcd83474fc56dc5e3248c3e26c998434 0530da368f1425ec20c26c6cf9498a4abceb8fff 96a9f696355fbbe2e50975d7b3f68f875cc0d9a9 8b9d9014 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [04:f9:77:11:54:ca:5d:07:a2:d1:96:1a:7a:c2:fd:73:47:ec:d0:b3],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-11 05:17:54.779 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-11 05:17:54.785 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-11 05:17:54.809 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-11 05:17:54.810 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-11 05:17:54.811 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-11 05:17:54.812 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-11 05:17:54.812 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-11 05:17:54.813 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-11 05:17:54.814 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-11 05:17:54.815 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-11 05:17:54.824 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-11 05:17:54.827 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-11 05:17:54.827 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-11 05:17:54.827 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-11 05:17:54.993 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-11 05:17:54.994 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-11 05:17:54.995 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-11 05:17:54.996 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-11 05:17:54.999 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-11 05:17:55.000 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-11 05:17:55.005 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-11 05:17:55.005 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-11 05:17:55.049 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-11 05:17:55.054 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-11 05:17:55.055 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-11 05:17:55.055 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-11 05:17:55.062 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-11 05:17:55.070 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-11 05:17:55.073 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-11 05:17:55.078 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-11 05:17:55.090 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 155166148919103244539810985875530366520352351227 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jan 11 03:07:48 UTC 2023 Final Date: Mon Jan 10 03:07:47 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e5:45:72:be:d2:06:59:09:f7:4a:f8:d6:18:1e:40:1b:c5:7e:e8:17],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6ff09f5608c2c000c0f2cbe186467da6971c794d 5ccbd2099bc307a3b20c8a3faa40db9284c895e2 f723d9e64c56410b80763057a16dac511aed3fea 9cb9fa63fa5ef33fccca7bb6e171816ba59c434d 33f91ccb67799128ec8ae5a96ea9d0fcda2c78c5 fa3f12c4b65d0714347c43cc7d4369100e2f1434 05f852596ef4aa8fe8b8b67507f11717f4ce8eaf 7e1a0bd0ce55f4326bd2c2737ca4eb2087752fba 12c9e8739502bd10138df6c19a2e9ede21240c11 1d58298612eaa4c01a3c801f3503313da79c80a2 3677e840e3d8c9ef8f55dab3c1844ddc91f54795 bd71945ac701d4e4c288385e5b7ee956be487936 ecc27e02e9a7e38adcfbac3cf61f8fcc7490f6c6 54602e61132ee7722f6f1654b563abb4a136ea42 4f049b5f435b11b1e6de94cb6b2900c848621a14 d148f89f7ad71909ee1d3165d8f0343dd2515580 4142649cbcd83474fc56dc5e3248c3e26c998434 0530da368f1425ec20c26c6cf9498a4abceb8fff 96a9f696355fbbe2e50975d7b3f68f875cc0d9a9 8b9d9014 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [eb:93:1f:33:25:ab:96:98:3f:77:9d:38:a3:54:23:14:3f:5a:08:d5],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-11 05:25:23.558 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-11 05:25:23.565 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-11 05:25:23.576 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-11 05:25:23.579 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-11 05:25:23.580 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-11 05:25:23.581 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-11 05:25:23.583 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-11 05:25:23.583 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-11 05:25:23.584 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-11 05:25:23.590 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-11 05:25:23.601 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-11 05:25:23.603 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-11 05:25:23.604 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-11 05:25:23.605 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-11 05:25:23.783 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-11 05:25:23.784 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-11 05:25:23.785 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-11 05:25:23.786 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-11 05:25:23.788 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-11 05:25:23.790 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-11 05:25:23.791 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-11 05:25:23.792 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-11 05:25:23.793 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-11 05:25:23.799 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-11 05:25:23.801 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-11 05:25:23.801 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-11 05:25:23.817 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-11 05:25:23.824 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-11 05:25:23.825 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-11 05:25:23.826 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-11 05:25:23.833 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 155166148919103244539810985875530366520352351227 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jan 11 03:07:48 UTC 2023 Final Date: Mon Jan 10 03:07:47 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e5:45:72:be:d2:06:59:09:f7:4a:f8:d6:18:1e:40:1b:c5:7e:e8:17],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6ff09f5608c2c000c0f2cbe186467da6971c794d 5ccbd2099bc307a3b20c8a3faa40db9284c895e2 f723d9e64c56410b80763057a16dac511aed3fea 9cb9fa63fa5ef33fccca7bb6e171816ba59c434d 33f91ccb67799128ec8ae5a96ea9d0fcda2c78c5 fa3f12c4b65d0714347c43cc7d4369100e2f1434 05f852596ef4aa8fe8b8b67507f11717f4ce8eaf 7e1a0bd0ce55f4326bd2c2737ca4eb2087752fba 12c9e8739502bd10138df6c19a2e9ede21240c11 1d58298612eaa4c01a3c801f3503313da79c80a2 3677e840e3d8c9ef8f55dab3c1844ddc91f54795 bd71945ac701d4e4c288385e5b7ee956be487936 ecc27e02e9a7e38adcfbac3cf61f8fcc7490f6c6 54602e61132ee7722f6f1654b563abb4a136ea42 4f049b5f435b11b1e6de94cb6b2900c848621a14 d148f89f7ad71909ee1d3165d8f0343dd2515580 4142649cbcd83474fc56dc5e3248c3e26c998434 0530da368f1425ec20c26c6cf9498a4abceb8fff 96a9f696355fbbe2e50975d7b3f68f875cc0d9a9 8b9d9014 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [93:79:35:d3:a4:e1:9a:47:68:b8:51:3d:f6:1e:6a:bb:bb:9f:80:0d],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-11 05:35:19.810 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-11 05:35:19.813 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-11 05:35:19.821 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2023-01-11 05:35:19.823 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-11 05:35:19.825 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2023-01-11 05:35:19.826 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-11 05:35:19.827 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-11 05:35:19.828 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-11 05:35:19.829 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-11 05:35:19.830 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-11 05:35:19.845 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-11 05:35:19.850 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-11 05:35:19.851 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-11 05:35:19.852 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-11 05:35:20.065 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-11 05:35:20.066 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-11 05:35:20.070 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-11 05:35:20.070 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-11 05:35:20.074 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-11 05:35:20.082 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-11 05:35:20.084 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-11 05:35:20.085 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-11 05:35:20.085 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-11 05:35:20.088 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-11 05:35:20.089 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-11 05:35:20.089 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-11 05:35:20.092 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-11 05:35:20.093 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-11 05:35:20.093 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-11 05:35:20.095 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-11 05:35:20.101 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 155166148919103244539810985875530366520352351227 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jan 11 03:07:48 UTC 2023 Final Date: Mon Jan 10 03:07:47 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e5:45:72:be:d2:06:59:09:f7:4a:f8:d6:18:1e:40:1b:c5:7e:e8:17],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6ff09f5608c2c000c0f2cbe186467da6971c794d 5ccbd2099bc307a3b20c8a3faa40db9284c895e2 f723d9e64c56410b80763057a16dac511aed3fea 9cb9fa63fa5ef33fccca7bb6e171816ba59c434d 33f91ccb67799128ec8ae5a96ea9d0fcda2c78c5 fa3f12c4b65d0714347c43cc7d4369100e2f1434 05f852596ef4aa8fe8b8b67507f11717f4ce8eaf 7e1a0bd0ce55f4326bd2c2737ca4eb2087752fba 12c9e8739502bd10138df6c19a2e9ede21240c11 1d58298612eaa4c01a3c801f3503313da79c80a2 3677e840e3d8c9ef8f55dab3c1844ddc91f54795 bd71945ac701d4e4c288385e5b7ee956be487936 ecc27e02e9a7e38adcfbac3cf61f8fcc7490f6c6 54602e61132ee7722f6f1654b563abb4a136ea42 4f049b5f435b11b1e6de94cb6b2900c848621a14 d148f89f7ad71909ee1d3165d8f0343dd2515580 4142649cbcd83474fc56dc5e3248c3e26c998434 0530da368f1425ec20c26c6cf9498a4abceb8fff 96a9f696355fbbe2e50975d7b3f68f875cc0d9a9 8b9d9014 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [90:2d:70:2e:f6:70:af:9d:96:ae:18:f7:57:23:8e:c1:1f:1c:68:61],[56:66:d1:a4] modulus: ceb71a9c022e682eb74b7d1238d0a5752b057bf42d0e5e02113c43f5f9cce5e6508b7ee01c8800cc14083b2bff7bf0cd1e9784d2c69002bdcdd3a6b250acbea89186b7c197b65234b5d2ffc183a9e95c18cf7a47641a68c1d9382ddf03bf4a0f7c813e661b7715e983d1ed62b6ba99385616dadad08d643d15626c76c85e40ba68c9d3c7c7e3c40d896c23fd8b6dda0efcf0ceddc851d6c0660f014515f6a41980172c1436c9e40f08d3073a17377acdaf5483712ef9bbb86a4be366e3cb10be9067723d0444601e3dfe281abcdcb54e14d0d5ab2df698dfa766836d54954da74f84e5d92bae9aa651c8ba7d66a7b99074fd2eddc7de9842437736f4583ba781 public exponent: 10001 ] 2023-01-11 05:41:28.373 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-11 05:41:28.374 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-11 05:41:28.377 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-11 05:41:28.378 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-11 05:41:28.379 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-11 05:41:28.380 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-11 05:41:28.380 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-11 05:41:28.381 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-11 05:41:28.382 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-11 05:41:28.382 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-11 05:41:28.392 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-11 05:41:28.394 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-11 05:41:28.394 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-11 05:41:28.395 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-11 05:41:28.595 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-11 05:41:28.597 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-11 05:41:28.598 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-11 05:41:28.598 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-11 05:41:28.600 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-11 05:41:28.601 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-11 05:41:28.601 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-11 05:41:28.602 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-11 05:41:28.602 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-11 05:41:28.603 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-11 05:41:28.604 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-11 05:41:28.604 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-11 05:41:28.605 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-11 05:41:28.605 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-11 05:41:28.606 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-11 05:41:28.608 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-11 05:41:28.612 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 155166148919103244539810985875530366520352351227 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jan 11 03:07:48 UTC 2023 Final Date: Mon Jan 10 03:07:47 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e5:45:72:be:d2:06:59:09:f7:4a:f8:d6:18:1e:40:1b:c5:7e:e8:17],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6ff09f5608c2c000c0f2cbe186467da6971c794d 5ccbd2099bc307a3b20c8a3faa40db9284c895e2 f723d9e64c56410b80763057a16dac511aed3fea 9cb9fa63fa5ef33fccca7bb6e171816ba59c434d 33f91ccb67799128ec8ae5a96ea9d0fcda2c78c5 fa3f12c4b65d0714347c43cc7d4369100e2f1434 05f852596ef4aa8fe8b8b67507f11717f4ce8eaf 7e1a0bd0ce55f4326bd2c2737ca4eb2087752fba 12c9e8739502bd10138df6c19a2e9ede21240c11 1d58298612eaa4c01a3c801f3503313da79c80a2 3677e840e3d8c9ef8f55dab3c1844ddc91f54795 bd71945ac701d4e4c288385e5b7ee956be487936 ecc27e02e9a7e38adcfbac3cf61f8fcc7490f6c6 54602e61132ee7722f6f1654b563abb4a136ea42 4f049b5f435b11b1e6de94cb6b2900c848621a14 d148f89f7ad71909ee1d3165d8f0343dd2515580 4142649cbcd83474fc56dc5e3248c3e26c998434 0530da368f1425ec20c26c6cf9498a4abceb8fff 96a9f696355fbbe2e50975d7b3f68f875cc0d9a9 8b9d9014 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5c:d7:29:f5:64:54:51:77:28:ac:29:95:a1:7c:cf:54:b6:71:be:66],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-11 05:41:51.580 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-11 05:41:51.583 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-11 05:41:51.586 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-11 05:41:51.588 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-11 05:41:51.588 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-11 05:41:51.589 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-11 05:41:51.590 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-11 05:41:51.590 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-11 05:41:51.591 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-11 05:41:51.592 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-11 05:41:51.599 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-11 05:41:51.601 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-11 05:41:51.602 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-11 05:41:51.602 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-11 05:41:51.746 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-11 05:41:51.747 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-11 05:41:51.747 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-11 05:41:51.753 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-11 05:41:51.759 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-11 05:41:51.760 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-11 05:41:51.761 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-11 05:41:51.762 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-11 05:41:51.762 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-11 05:41:51.763 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-11 05:41:51.764 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-11 05:41:51.765 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-11 05:41:51.768 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-11 05:41:51.768 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-11 05:41:51.769 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-11 05:41:51.771 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-11 05:41:51.785 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 155166148919103244539810985875530366520352351227 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jan 11 03:07:48 UTC 2023 Final Date: Mon Jan 10 03:07:47 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e5:45:72:be:d2:06:59:09:f7:4a:f8:d6:18:1e:40:1b:c5:7e:e8:17],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6ff09f5608c2c000c0f2cbe186467da6971c794d 5ccbd2099bc307a3b20c8a3faa40db9284c895e2 f723d9e64c56410b80763057a16dac511aed3fea 9cb9fa63fa5ef33fccca7bb6e171816ba59c434d 33f91ccb67799128ec8ae5a96ea9d0fcda2c78c5 fa3f12c4b65d0714347c43cc7d4369100e2f1434 05f852596ef4aa8fe8b8b67507f11717f4ce8eaf 7e1a0bd0ce55f4326bd2c2737ca4eb2087752fba 12c9e8739502bd10138df6c19a2e9ede21240c11 1d58298612eaa4c01a3c801f3503313da79c80a2 3677e840e3d8c9ef8f55dab3c1844ddc91f54795 bd71945ac701d4e4c288385e5b7ee956be487936 ecc27e02e9a7e38adcfbac3cf61f8fcc7490f6c6 54602e61132ee7722f6f1654b563abb4a136ea42 4f049b5f435b11b1e6de94cb6b2900c848621a14 d148f89f7ad71909ee1d3165d8f0343dd2515580 4142649cbcd83474fc56dc5e3248c3e26c998434 0530da368f1425ec20c26c6cf9498a4abceb8fff 96a9f696355fbbe2e50975d7b3f68f875cc0d9a9 8b9d9014 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c5:67:6e:aa:d9:30:d6:07:46:42:e5:5e:1f:ed:eb:43:51:5e:ce:f6],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-11 06:09:28.946 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-11 06:09:28.950 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-11 06:09:28.954 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-11 06:09:28.956 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-11 06:09:28.957 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-11 06:09:28.963 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-11 06:09:28.964 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-11 06:09:28.965 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-11 06:09:28.966 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-11 06:09:28.967 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-11 06:09:28.974 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-11 06:09:28.976 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-11 06:09:28.977 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-11 06:09:28.979 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-11 06:09:29.170 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-11 06:09:29.171 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-11 06:09:29.171 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-11 06:09:29.172 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-11 06:09:29.174 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-11 06:09:29.181 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-11 06:09:29.182 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-11 06:09:29.182 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-11 06:09:29.182 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-11 06:09:29.184 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-11 06:09:29.185 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-11 06:09:29.185 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-11 06:09:29.187 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-11 06:09:29.187 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-11 06:09:29.187 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-11 06:09:29.193 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-11 06:09:29.202 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 155166148919103244539810985875530366520352351227 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jan 11 03:07:48 UTC 2023 Final Date: Mon Jan 10 03:07:47 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e5:45:72:be:d2:06:59:09:f7:4a:f8:d6:18:1e:40:1b:c5:7e:e8:17],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6ff09f5608c2c000c0f2cbe186467da6971c794d 5ccbd2099bc307a3b20c8a3faa40db9284c895e2 f723d9e64c56410b80763057a16dac511aed3fea 9cb9fa63fa5ef33fccca7bb6e171816ba59c434d 33f91ccb67799128ec8ae5a96ea9d0fcda2c78c5 fa3f12c4b65d0714347c43cc7d4369100e2f1434 05f852596ef4aa8fe8b8b67507f11717f4ce8eaf 7e1a0bd0ce55f4326bd2c2737ca4eb2087752fba 12c9e8739502bd10138df6c19a2e9ede21240c11 1d58298612eaa4c01a3c801f3503313da79c80a2 3677e840e3d8c9ef8f55dab3c1844ddc91f54795 bd71945ac701d4e4c288385e5b7ee956be487936 ecc27e02e9a7e38adcfbac3cf61f8fcc7490f6c6 54602e61132ee7722f6f1654b563abb4a136ea42 4f049b5f435b11b1e6de94cb6b2900c848621a14 d148f89f7ad71909ee1d3165d8f0343dd2515580 4142649cbcd83474fc56dc5e3248c3e26c998434 0530da368f1425ec20c26c6cf9498a4abceb8fff 96a9f696355fbbe2e50975d7b3f68f875cc0d9a9 8b9d9014 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e8:45:fb:e8:5b:ff:74:5e:db:5e:b0:57:c7:4b:7c:65:fd:ef:88:ec],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-11 06:09:34.608 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-11 06:09:34.609 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-11 06:09:34.611 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-11 06:09:34.612 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-11 06:09:34.612 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-11 06:09:34.612 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-11 06:09:34.613 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-11 06:09:34.613 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-11 06:09:34.614 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-11 06:09:34.614 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-11 06:09:34.622 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-11 06:09:34.623 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-11 06:09:34.623 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-11 06:09:34.624 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-11 06:09:34.749 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-11 06:09:34.750 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-11 06:09:34.750 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-11 06:09:34.750 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-11 06:09:34.752 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-11 06:09:34.753 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-11 06:09:34.754 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-11 06:09:34.754 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-11 06:09:34.754 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-11 06:09:34.758 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-11 06:09:34.758 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-11 06:09:34.759 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-11 06:09:34.759 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-11 06:09:34.760 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-11 06:09:34.761 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-11 06:09:34.762 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-11 06:09:34.766 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 155166148919103244539810985875530366520352351227 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jan 11 03:07:48 UTC 2023 Final Date: Mon Jan 10 03:07:47 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [e5:45:72:be:d2:06:59:09:f7:4a:f8:d6:18:1e:40:1b:c5:7e:e8:17],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6ff09f5608c2c000c0f2cbe186467da6971c794d 5ccbd2099bc307a3b20c8a3faa40db9284c895e2 f723d9e64c56410b80763057a16dac511aed3fea 9cb9fa63fa5ef33fccca7bb6e171816ba59c434d 33f91ccb67799128ec8ae5a96ea9d0fcda2c78c5 fa3f12c4b65d0714347c43cc7d4369100e2f1434 05f852596ef4aa8fe8b8b67507f11717f4ce8eaf 7e1a0bd0ce55f4326bd2c2737ca4eb2087752fba 12c9e8739502bd10138df6c19a2e9ede21240c11 1d58298612eaa4c01a3c801f3503313da79c80a2 3677e840e3d8c9ef8f55dab3c1844ddc91f54795 bd71945ac701d4e4c288385e5b7ee956be487936 ecc27e02e9a7e38adcfbac3cf61f8fcc7490f6c6 54602e61132ee7722f6f1654b563abb4a136ea42 4f049b5f435b11b1e6de94cb6b2900c848621a14 d148f89f7ad71909ee1d3165d8f0343dd2515580 4142649cbcd83474fc56dc5e3248c3e26c998434 0530da368f1425ec20c26c6cf9498a4abceb8fff 96a9f696355fbbe2e50975d7b3f68f875cc0d9a9 8b9d9014 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [34:24:48:b4:bf:02:d7:c6:89:99:df:f1:48:77:ad:10:71:31:2c:74],[56:66:d1:a4] modulus: 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 public exponent: 10001 ]