By type
2023-01-12 03:30:04,279 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2023-01-12 03:30:05,373 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2023-01-12 03:30:06.069 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Jan 12, 2023 3:30:07 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jan 12, 2023 3:30:07 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jan 12, 2023 3:30:07 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jan 12, 2023 3:30:07 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2023-01-12 03:30:08.330 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2023-01-12 03:30:08.609 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2023-01-12 03:30:08.768 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2023-01-12 03:30:09.414 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2023-01-12 03:30:09.416 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2023-01-12 03:30:09.418 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2023-01-12 03:30:09.421 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2023-01-12 03:30:09.456 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2023-01-12 03:30:09.459 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2023-01-12 03:30:09.569 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2023-01-12 03:30:10.165 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jan 12, 2023 3:30:10 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2023-01-12 03:30:11.057 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 7.659 seconds (JVM running for 9.332) Jan 12, 2023 3:30:39 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2023-01-12 03:31:07.970 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-12 03:31:07.979 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-12 03:31:08.024 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2023-01-12 03:31:08.028 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-12 03:31:08.048 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2023-01-12 03:31:08.050 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-12 03:31:08.051 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-12 03:31:08.052 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-12 03:31:08.053 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-12 03:31:08.057 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-12 03:31:08.066 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-12 03:31:08.070 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-12 03:31:08.127 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-12 03:31:08.137 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-12 03:31:08.137 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-12 03:31:08.141 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-12 03:31:08.788 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-12 03:31:08.791 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-12 03:31:08.791 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-12 03:31:08.793 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-12 03:31:08.802 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-12 03:31:08.803 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-12 03:31:08.804 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-12 03:31:08.804 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-12 03:31:08.805 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-12 03:31:08.827 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-12 03:31:08.828 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-12 03:31:08.828 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-12 03:31:08.836 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-12 03:31:08.836 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-12 03:31:08.837 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-12 03:31:08.838 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-12 03:31:08.881 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 126172013863890901979413708265899355209992631185 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jan 12 03:28:00 UTC 2023 Final Date: Tue Jan 11 03:27:59 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5f:9e:8d:34:ef:db:cd:05:d5:fc:60:34:45:24:2d:0f:83:ae:f9:fc],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3d8ccbd4e8b5f0460dded1cfcef7c12d04ae9eb2 dbdc4dfa51a36660e0676ab851becb9297534af8 00b9a32dd748a81e0cadbb94fbf99e9df1fb9f21 e696e655e71d3e1b5e66f38e44f9950390aab3c7 5845a9768382be7e9c52271e34139b4657ce5567 fd57856d2f1b2ec421fdae2adb1a881e24e726cb 44b9006d12d34e1ebdfb8c4266cf2ef4a8ff5078 178fe0edd3eeca3b3a486b15310ae1912f8aaa1f 53c2db14226240a59ca8ac803c357213cd6044d9 1caa7553639c1c7a5f6eeb1d6d0e5c55dd72ccf8 d7c6872bfed9b485b21b684b7ae8f25d4e75718e 0026af6ba2894c4abefa27496d547acb57e51aae 5f9f61d090592ce5e211dadb52fd7206598bbc12 0a6655d32bf30cb20c9d1c5f2cc4c0092e18c01c 2566d424b08c07b6b3fc3ec5e73d2c2dc7e1896b 856b419478cec0a170c98a5bdcd78de4468b3233 b2c3287a618a6d7f79dc511056489d624dfccc21 5747a2faab1707db122cdfab16b58e7b5d3646dd de54d88309b3da8fafd6a968c1d988b01b560768 da6b878d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [de:e0:2b:ef:d2:77:24:03:2d:1f:60:c5:ca:8e:57:c1:1b:6e:14:da],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-12 05:30:21.109 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-12 05:30:21.115 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-12 05:30:21.120 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-12 05:30:21.121 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-12 05:30:21.122 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-12 05:30:21.123 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-12 05:30:21.123 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-12 05:30:21.124 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-12 05:30:21.125 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-12 05:30:21.126 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-12 05:30:21.134 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-12 05:30:21.136 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-12 05:30:21.137 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-12 05:30:21.137 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-12 05:30:21.374 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-12 05:30:21.375 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-12 05:30:21.375 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-12 05:30:21.376 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-12 05:30:21.379 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-12 05:30:21.379 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-12 05:30:21.380 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-12 05:30:21.380 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-12 05:30:21.381 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-12 05:30:21.383 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-12 05:30:21.383 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-12 05:30:21.384 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-12 05:30:21.385 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-12 05:30:21.386 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-12 05:30:21.386 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-12 05:30:21.388 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-12 05:30:21.392 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 126172013863890901979413708265899355209992631185 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jan 12 03:28:00 UTC 2023 Final Date: Tue Jan 11 03:27:59 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5f:9e:8d:34:ef:db:cd:05:d5:fc:60:34:45:24:2d:0f:83:ae:f9:fc],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3d8ccbd4e8b5f0460dded1cfcef7c12d04ae9eb2 dbdc4dfa51a36660e0676ab851becb9297534af8 00b9a32dd748a81e0cadbb94fbf99e9df1fb9f21 e696e655e71d3e1b5e66f38e44f9950390aab3c7 5845a9768382be7e9c52271e34139b4657ce5567 fd57856d2f1b2ec421fdae2adb1a881e24e726cb 44b9006d12d34e1ebdfb8c4266cf2ef4a8ff5078 178fe0edd3eeca3b3a486b15310ae1912f8aaa1f 53c2db14226240a59ca8ac803c357213cd6044d9 1caa7553639c1c7a5f6eeb1d6d0e5c55dd72ccf8 d7c6872bfed9b485b21b684b7ae8f25d4e75718e 0026af6ba2894c4abefa27496d547acb57e51aae 5f9f61d090592ce5e211dadb52fd7206598bbc12 0a6655d32bf30cb20c9d1c5f2cc4c0092e18c01c 2566d424b08c07b6b3fc3ec5e73d2c2dc7e1896b 856b419478cec0a170c98a5bdcd78de4468b3233 b2c3287a618a6d7f79dc511056489d624dfccc21 5747a2faab1707db122cdfab16b58e7b5d3646dd de54d88309b3da8fafd6a968c1d988b01b560768 da6b878d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1e:ef:cd:f0:87:bc:cf:98:97:1e:bd:84:ac:c8:7f:77:ce:fb:d0:09],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-12 05:32:09.734 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-12 05:32:09.739 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-12 05:32:09.743 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2023-01-12 05:32:09.746 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-12 05:32:09.748 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2023-01-12 05:32:09.749 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-12 05:32:09.750 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-12 05:32:09.752 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-12 05:32:09.755 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-12 05:32:09.756 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-12 05:32:09.765 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-12 05:32:09.766 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-12 05:32:09.766 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-12 05:32:09.767 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-12 05:32:09.947 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-12 05:32:09.948 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-12 05:32:09.949 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-12 05:32:09.949 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-12 05:32:09.953 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-12 05:32:09.953 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-12 05:32:09.954 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-12 05:32:09.955 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-12 05:32:09.956 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-12 05:32:09.958 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-12 05:32:09.958 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-12 05:32:09.959 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-12 05:32:09.960 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-12 05:32:09.960 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-12 05:32:09.961 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-12 05:32:09.962 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-12 05:32:09.966 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 126172013863890901979413708265899355209992631185 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jan 12 03:28:00 UTC 2023 Final Date: Tue Jan 11 03:27:59 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5f:9e:8d:34:ef:db:cd:05:d5:fc:60:34:45:24:2d:0f:83:ae:f9:fc],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3d8ccbd4e8b5f0460dded1cfcef7c12d04ae9eb2 dbdc4dfa51a36660e0676ab851becb9297534af8 00b9a32dd748a81e0cadbb94fbf99e9df1fb9f21 e696e655e71d3e1b5e66f38e44f9950390aab3c7 5845a9768382be7e9c52271e34139b4657ce5567 fd57856d2f1b2ec421fdae2adb1a881e24e726cb 44b9006d12d34e1ebdfb8c4266cf2ef4a8ff5078 178fe0edd3eeca3b3a486b15310ae1912f8aaa1f 53c2db14226240a59ca8ac803c357213cd6044d9 1caa7553639c1c7a5f6eeb1d6d0e5c55dd72ccf8 d7c6872bfed9b485b21b684b7ae8f25d4e75718e 0026af6ba2894c4abefa27496d547acb57e51aae 5f9f61d090592ce5e211dadb52fd7206598bbc12 0a6655d32bf30cb20c9d1c5f2cc4c0092e18c01c 2566d424b08c07b6b3fc3ec5e73d2c2dc7e1896b 856b419478cec0a170c98a5bdcd78de4468b3233 b2c3287a618a6d7f79dc511056489d624dfccc21 5747a2faab1707db122cdfab16b58e7b5d3646dd de54d88309b3da8fafd6a968c1d988b01b560768 da6b878d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5c:c4:1e:81:3f:15:9b:6d:56:da:02:7e:92:d8:fb:53:8a:03:4c:8b],[56:66:d1:a4] modulus: aec226341bb45b3ba3031818981648d37e0ec470588138861106805b1e1800d144385391bed4f49b00435beb84129a71a357a7c4d04783965ebd0d3f95efd2977c55f1fc31295ed2238d312ee10705172fd622efc5f30aee30a0af4f6f6a372668bec5714fc4eda3b4b11bc5190499f68897d0967adb0635d1a3cebcf7fe466a95cf68eec0ec99303cc9a9ace2ddad8345452739d7626237359e501108c50de57a8c36a85d59e2feb09e0ce45f0d54f0f7dd8749a952ad2c87d3833244c3e9a85b194dbc6ebe41922f7d2efd7c042f69918be21b598a95f1ed6dbda263c5f42a2cb70c3e17c942e8c7b1b32430384627dbfe50c3df8ee0a6a480aabdf876dd53 public exponent: 10001 ] 2023-01-12 05:35:34.602 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-12 05:35:34.604 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-12 05:35:34.607 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2023-01-12 05:35:34.608 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-12 05:35:34.609 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2023-01-12 05:35:34.610 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-12 05:35:34.610 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-12 05:35:34.611 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-12 05:35:34.612 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-12 05:35:34.613 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-12 05:35:34.619 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-12 05:35:34.620 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-12 05:35:34.621 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-12 05:35:34.621 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-12 05:35:34.858 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-12 05:35:34.859 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-12 05:35:34.859 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-12 05:35:34.860 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-12 05:35:34.862 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-12 05:35:34.862 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-12 05:35:34.863 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-12 05:35:34.863 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-12 05:35:34.863 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-12 05:35:34.864 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-12 05:35:34.864 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-12 05:35:34.865 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-12 05:35:34.865 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-12 05:35:34.866 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-12 05:35:34.866 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-12 05:35:34.867 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-12 05:35:34.871 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 126172013863890901979413708265899355209992631185 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jan 12 03:28:00 UTC 2023 Final Date: Tue Jan 11 03:27:59 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5f:9e:8d:34:ef:db:cd:05:d5:fc:60:34:45:24:2d:0f:83:ae:f9:fc],[56:66:d1:a4] modulus: 8f1e949f0789211611e8f9d16339e18641f3779e3668b1c4c668adb58933fd750715bb7e3406d194dbc378e02c8940ed4557a896f6c2bc7fa3e3e9ed6c2f58721406b58265568acfa8a50ccb8b037f9d2e6588adbdd4903bb2ee24bf3dcea2fda54266d51a2d26f78843860c7ff90e7fdba99be7ba4014e17eb1afe6b671ce433e4978187dd1d4bae23fe8fb8f52039ddf3c413edf06aa2e1c283e359c135a9ce839868640c8f4bb90c250288a27cd28c9af7e7b3f9898e656eec1d20dd899957fdbf45adeb6963392967cbb412456b190bbd148f6f98887981105dd5acd57eabedf7bfc781e5ab14aed95bf8e4850e62941af7bd28ef82de1533ba84f10dae03c588fde9ec0246a427ed83f1b7cc5bd330b44523351cdba0642067218040228345b3aad985c1d0f02bd0fdb4d286f385430937bdc56d4dfffae76856b7517d56bdb15b53d55dd15dcc04a890030c8ced2587b57db0f2ae2add1e65aff193575e816566347bbc68b579dbea25aa7b7440028aa34da8127c9b786cc8105a0ab11 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3d8ccbd4e8b5f0460dded1cfcef7c12d04ae9eb2 dbdc4dfa51a36660e0676ab851becb9297534af8 00b9a32dd748a81e0cadbb94fbf99e9df1fb9f21 e696e655e71d3e1b5e66f38e44f9950390aab3c7 5845a9768382be7e9c52271e34139b4657ce5567 fd57856d2f1b2ec421fdae2adb1a881e24e726cb 44b9006d12d34e1ebdfb8c4266cf2ef4a8ff5078 178fe0edd3eeca3b3a486b15310ae1912f8aaa1f 53c2db14226240a59ca8ac803c357213cd6044d9 1caa7553639c1c7a5f6eeb1d6d0e5c55dd72ccf8 d7c6872bfed9b485b21b684b7ae8f25d4e75718e 0026af6ba2894c4abefa27496d547acb57e51aae 5f9f61d090592ce5e211dadb52fd7206598bbc12 0a6655d32bf30cb20c9d1c5f2cc4c0092e18c01c 2566d424b08c07b6b3fc3ec5e73d2c2dc7e1896b 856b419478cec0a170c98a5bdcd78de4468b3233 b2c3287a618a6d7f79dc511056489d624dfccc21 5747a2faab1707db122cdfab16b58e7b5d3646dd de54d88309b3da8fafd6a968c1d988b01b560768 da6b878d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [87:27:be:3d:3f:02:25:c7:49:c5:26:5a:0b:da:de:dd:9d:99:07:b3],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-12 05:38:32.520 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-12 05:38:32.521 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-12 05:38:32.523 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-12 05:38:32.523 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-12 05:38:32.524 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-12 05:38:32.525 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-12 05:38:32.526 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-12 05:38:32.526 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-12 05:38:32.527 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-12 05:38:32.527 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-12 05:38:32.531 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-12 05:38:32.532 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-12 05:38:32.532 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-12 05:38:32.532 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-12 05:38:33.700 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-12 05:38:33.700 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-12 05:38:33.701 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-12 05:38:33.701 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-12 05:38:33.703 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-12 05:38:33.704 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-12 05:38:33.704 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-12 05:38:33.705 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-12 05:38:33.705 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-12 05:38:33.706 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-12 05:38:33.706 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-12 05:38:33.707 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-12 05:38:33.707 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-12 05:38:33.708 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-12 05:38:33.708 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-12 05:38:33.710 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-12 05:38:33.714 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 126172013863890901979413708265899355209992631185 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jan 12 03:28:00 UTC 2023 Final Date: Tue Jan 11 03:27:59 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5f:9e:8d:34:ef:db:cd:05:d5:fc:60:34:45:24:2d:0f:83:ae:f9:fc],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3d8ccbd4e8b5f0460dded1cfcef7c12d04ae9eb2 dbdc4dfa51a36660e0676ab851becb9297534af8 00b9a32dd748a81e0cadbb94fbf99e9df1fb9f21 e696e655e71d3e1b5e66f38e44f9950390aab3c7 5845a9768382be7e9c52271e34139b4657ce5567 fd57856d2f1b2ec421fdae2adb1a881e24e726cb 44b9006d12d34e1ebdfb8c4266cf2ef4a8ff5078 178fe0edd3eeca3b3a486b15310ae1912f8aaa1f 53c2db14226240a59ca8ac803c357213cd6044d9 1caa7553639c1c7a5f6eeb1d6d0e5c55dd72ccf8 d7c6872bfed9b485b21b684b7ae8f25d4e75718e 0026af6ba2894c4abefa27496d547acb57e51aae 5f9f61d090592ce5e211dadb52fd7206598bbc12 0a6655d32bf30cb20c9d1c5f2cc4c0092e18c01c 2566d424b08c07b6b3fc3ec5e73d2c2dc7e1896b 856b419478cec0a170c98a5bdcd78de4468b3233 b2c3287a618a6d7f79dc511056489d624dfccc21 5747a2faab1707db122cdfab16b58e7b5d3646dd de54d88309b3da8fafd6a968c1d988b01b560768 da6b878d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ce:2b:ab:39:43:a6:f3:78:f8:2c:a0:1c:6a:48:c3:d2:54:17:15:a3],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-12 05:46:26.416 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-12 05:46:26.419 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-12 05:46:26.421 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-12 05:46:26.421 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-12 05:46:26.422 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-12 05:46:26.423 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-12 05:46:26.423 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-12 05:46:26.424 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-12 05:46:26.424 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-12 05:46:26.425 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-12 05:46:26.430 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-12 05:46:26.431 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-12 05:46:26.431 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-12 05:46:26.432 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-12 05:46:26.555 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-12 05:46:26.556 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-12 05:46:26.556 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-12 05:46:26.557 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-12 05:46:26.558 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-12 05:46:26.559 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-12 05:46:26.559 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-12 05:46:26.560 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-12 05:46:26.560 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-12 05:46:26.561 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-12 05:46:26.561 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-12 05:46:26.562 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-12 05:46:26.562 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-12 05:46:26.563 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-12 05:46:26.563 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-12 05:46:26.564 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-12 05:46:26.567 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 126172013863890901979413708265899355209992631185 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jan 12 03:28:00 UTC 2023 Final Date: Tue Jan 11 03:27:59 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5f:9e:8d:34:ef:db:cd:05:d5:fc:60:34:45:24:2d:0f:83:ae:f9:fc],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3d8ccbd4e8b5f0460dded1cfcef7c12d04ae9eb2 dbdc4dfa51a36660e0676ab851becb9297534af8 00b9a32dd748a81e0cadbb94fbf99e9df1fb9f21 e696e655e71d3e1b5e66f38e44f9950390aab3c7 5845a9768382be7e9c52271e34139b4657ce5567 fd57856d2f1b2ec421fdae2adb1a881e24e726cb 44b9006d12d34e1ebdfb8c4266cf2ef4a8ff5078 178fe0edd3eeca3b3a486b15310ae1912f8aaa1f 53c2db14226240a59ca8ac803c357213cd6044d9 1caa7553639c1c7a5f6eeb1d6d0e5c55dd72ccf8 d7c6872bfed9b485b21b684b7ae8f25d4e75718e 0026af6ba2894c4abefa27496d547acb57e51aae 5f9f61d090592ce5e211dadb52fd7206598bbc12 0a6655d32bf30cb20c9d1c5f2cc4c0092e18c01c 2566d424b08c07b6b3fc3ec5e73d2c2dc7e1896b 856b419478cec0a170c98a5bdcd78de4468b3233 b2c3287a618a6d7f79dc511056489d624dfccc21 5747a2faab1707db122cdfab16b58e7b5d3646dd de54d88309b3da8fafd6a968c1d988b01b560768 da6b878d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f0:4f:76:d6:a3:b7:7c:7a:2b:5a:ba:1f:f7:10:b9:6e:69:e4:1f:89],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-12 05:53:14.903 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-12 05:53:14.909 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-12 05:53:14.912 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-12 05:53:14.913 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-12 05:53:14.914 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-12 05:53:14.914 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-12 05:53:14.915 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-12 05:53:14.915 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-12 05:53:14.916 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-12 05:53:14.916 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-12 05:53:14.920 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-12 05:53:14.921 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-12 05:53:14.921 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-12 05:53:14.922 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-12 05:53:15.078 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-12 05:53:15.078 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-12 05:53:15.079 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-12 05:53:15.079 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-12 05:53:15.080 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-12 05:53:15.081 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-12 05:53:15.081 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-12 05:53:15.081 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-12 05:53:15.082 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-12 05:53:15.082 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-12 05:53:15.083 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-12 05:53:15.083 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-12 05:53:15.084 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-12 05:53:15.084 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-12 05:53:15.084 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-12 05:53:15.085 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-12 05:53:15.088 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 126172013863890901979413708265899355209992631185 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jan 12 03:28:00 UTC 2023 Final Date: Tue Jan 11 03:27:59 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5f:9e:8d:34:ef:db:cd:05:d5:fc:60:34:45:24:2d:0f:83:ae:f9:fc],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3d8ccbd4e8b5f0460dded1cfcef7c12d04ae9eb2 dbdc4dfa51a36660e0676ab851becb9297534af8 00b9a32dd748a81e0cadbb94fbf99e9df1fb9f21 e696e655e71d3e1b5e66f38e44f9950390aab3c7 5845a9768382be7e9c52271e34139b4657ce5567 fd57856d2f1b2ec421fdae2adb1a881e24e726cb 44b9006d12d34e1ebdfb8c4266cf2ef4a8ff5078 178fe0edd3eeca3b3a486b15310ae1912f8aaa1f 53c2db14226240a59ca8ac803c357213cd6044d9 1caa7553639c1c7a5f6eeb1d6d0e5c55dd72ccf8 d7c6872bfed9b485b21b684b7ae8f25d4e75718e 0026af6ba2894c4abefa27496d547acb57e51aae 5f9f61d090592ce5e211dadb52fd7206598bbc12 0a6655d32bf30cb20c9d1c5f2cc4c0092e18c01c 2566d424b08c07b6b3fc3ec5e73d2c2dc7e1896b 856b419478cec0a170c98a5bdcd78de4468b3233 b2c3287a618a6d7f79dc511056489d624dfccc21 5747a2faab1707db122cdfab16b58e7b5d3646dd de54d88309b3da8fafd6a968c1d988b01b560768 da6b878d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [20:2f:fd:1c:bb:13:a5:5c:15:f3:5d:ce:f6:5a:bd:62:32:5c:c6:8e],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-12 06:01:20.430 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-12 06:01:20.431 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-12 06:01:20.432 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2023-01-12 06:01:20.433 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-12 06:01:20.433 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2023-01-12 06:01:20.434 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-12 06:01:20.434 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-12 06:01:20.434 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-12 06:01:20.435 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-12 06:01:20.435 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-12 06:01:20.438 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-12 06:01:20.439 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-12 06:01:20.439 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-12 06:01:20.439 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-12 06:01:20.629 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-12 06:01:20.630 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-12 06:01:20.630 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-12 06:01:20.631 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-12 06:01:20.632 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-12 06:01:20.632 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-12 06:01:20.633 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-12 06:01:20.633 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-12 06:01:20.633 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-12 06:01:20.634 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-12 06:01:20.634 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-12 06:01:20.635 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-12 06:01:20.636 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-12 06:01:20.636 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-12 06:01:20.636 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-12 06:01:20.637 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-12 06:01:20.640 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 126172013863890901979413708265899355209992631185 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jan 12 03:28:00 UTC 2023 Final Date: Tue Jan 11 03:27:59 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5f:9e:8d:34:ef:db:cd:05:d5:fc:60:34:45:24:2d:0f:83:ae:f9:fc],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3d8ccbd4e8b5f0460dded1cfcef7c12d04ae9eb2 dbdc4dfa51a36660e0676ab851becb9297534af8 00b9a32dd748a81e0cadbb94fbf99e9df1fb9f21 e696e655e71d3e1b5e66f38e44f9950390aab3c7 5845a9768382be7e9c52271e34139b4657ce5567 fd57856d2f1b2ec421fdae2adb1a881e24e726cb 44b9006d12d34e1ebdfb8c4266cf2ef4a8ff5078 178fe0edd3eeca3b3a486b15310ae1912f8aaa1f 53c2db14226240a59ca8ac803c357213cd6044d9 1caa7553639c1c7a5f6eeb1d6d0e5c55dd72ccf8 d7c6872bfed9b485b21b684b7ae8f25d4e75718e 0026af6ba2894c4abefa27496d547acb57e51aae 5f9f61d090592ce5e211dadb52fd7206598bbc12 0a6655d32bf30cb20c9d1c5f2cc4c0092e18c01c 2566d424b08c07b6b3fc3ec5e73d2c2dc7e1896b 856b419478cec0a170c98a5bdcd78de4468b3233 b2c3287a618a6d7f79dc511056489d624dfccc21 5747a2faab1707db122cdfab16b58e7b5d3646dd de54d88309b3da8fafd6a968c1d988b01b560768 da6b878d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3f:ce:73:03:fd:26:cb:0d:1e:a7:b2:ca:98:3e:36:e1:c0:cc:b2:42],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-12 06:09:12.336 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-12 06:09:12.340 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-12 06:09:12.343 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-12 06:09:12.344 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-12 06:09:12.345 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-12 06:09:12.346 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-12 06:09:12.346 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-12 06:09:12.346 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-12 06:09:12.347 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-12 06:09:12.347 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-12 06:09:12.352 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-12 06:09:12.352 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-12 06:09:12.353 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-12 06:09:12.353 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-12 06:09:12.523 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-12 06:09:12.524 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-12 06:09:12.524 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-12 06:09:12.525 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-12 06:09:12.527 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-12 06:09:12.527 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-12 06:09:12.528 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-12 06:09:12.528 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-12 06:09:12.528 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-12 06:09:12.529 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-12 06:09:12.529 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-12 06:09:12.530 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-12 06:09:12.530 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-12 06:09:12.530 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-12 06:09:12.531 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-12 06:09:12.531 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-12 06:09:12.535 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 126172013863890901979413708265899355209992631185 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jan 12 03:28:00 UTC 2023 Final Date: Tue Jan 11 03:27:59 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5f:9e:8d:34:ef:db:cd:05:d5:fc:60:34:45:24:2d:0f:83:ae:f9:fc],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3d8ccbd4e8b5f0460dded1cfcef7c12d04ae9eb2 dbdc4dfa51a36660e0676ab851becb9297534af8 00b9a32dd748a81e0cadbb94fbf99e9df1fb9f21 e696e655e71d3e1b5e66f38e44f9950390aab3c7 5845a9768382be7e9c52271e34139b4657ce5567 fd57856d2f1b2ec421fdae2adb1a881e24e726cb 44b9006d12d34e1ebdfb8c4266cf2ef4a8ff5078 178fe0edd3eeca3b3a486b15310ae1912f8aaa1f 53c2db14226240a59ca8ac803c357213cd6044d9 1caa7553639c1c7a5f6eeb1d6d0e5c55dd72ccf8 d7c6872bfed9b485b21b684b7ae8f25d4e75718e 0026af6ba2894c4abefa27496d547acb57e51aae 5f9f61d090592ce5e211dadb52fd7206598bbc12 0a6655d32bf30cb20c9d1c5f2cc4c0092e18c01c 2566d424b08c07b6b3fc3ec5e73d2c2dc7e1896b 856b419478cec0a170c98a5bdcd78de4468b3233 b2c3287a618a6d7f79dc511056489d624dfccc21 5747a2faab1707db122cdfab16b58e7b5d3646dd de54d88309b3da8fafd6a968c1d988b01b560768 da6b878d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [86:58:21:59:b3:24:e2:6a:9b:f9:16:dc:59:9b:aa:eb:76:e4:06:d1],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-12 06:09:31.602 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-12 06:09:31.603 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-12 06:09:31.605 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-12 06:09:31.605 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-12 06:09:31.606 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-12 06:09:31.606 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-12 06:09:31.606 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-12 06:09:31.607 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-12 06:09:31.607 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-12 06:09:31.607 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-12 06:09:31.611 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-12 06:09:31.611 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-12 06:09:31.611 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-12 06:09:31.612 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-12 06:09:31.741 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-12 06:09:31.742 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-12 06:09:31.742 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-12 06:09:31.742 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-12 06:09:31.744 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-12 06:09:31.744 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-12 06:09:31.745 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-12 06:09:31.745 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-12 06:09:31.745 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-12 06:09:31.746 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-12 06:09:31.747 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-12 06:09:31.747 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-12 06:09:31.748 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-12 06:09:31.748 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-12 06:09:31.748 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-12 06:09:31.749 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-12 06:09:31.752 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 126172013863890901979413708265899355209992631185 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jan 12 03:28:00 UTC 2023 Final Date: Tue Jan 11 03:27:59 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5f:9e:8d:34:ef:db:cd:05:d5:fc:60:34:45:24:2d:0f:83:ae:f9:fc],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3d8ccbd4e8b5f0460dded1cfcef7c12d04ae9eb2 dbdc4dfa51a36660e0676ab851becb9297534af8 00b9a32dd748a81e0cadbb94fbf99e9df1fb9f21 e696e655e71d3e1b5e66f38e44f9950390aab3c7 5845a9768382be7e9c52271e34139b4657ce5567 fd57856d2f1b2ec421fdae2adb1a881e24e726cb 44b9006d12d34e1ebdfb8c4266cf2ef4a8ff5078 178fe0edd3eeca3b3a486b15310ae1912f8aaa1f 53c2db14226240a59ca8ac803c357213cd6044d9 1caa7553639c1c7a5f6eeb1d6d0e5c55dd72ccf8 d7c6872bfed9b485b21b684b7ae8f25d4e75718e 0026af6ba2894c4abefa27496d547acb57e51aae 5f9f61d090592ce5e211dadb52fd7206598bbc12 0a6655d32bf30cb20c9d1c5f2cc4c0092e18c01c 2566d424b08c07b6b3fc3ec5e73d2c2dc7e1896b 856b419478cec0a170c98a5bdcd78de4468b3233 b2c3287a618a6d7f79dc511056489d624dfccc21 5747a2faab1707db122cdfab16b58e7b5d3646dd de54d88309b3da8fafd6a968c1d988b01b560768 da6b878d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5a:94:52:90:5c:3b:e0:1a:5b:a5:a6:3a:7e:66:ac:e6:ce:5d:5d:dc],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-12 06:34:38.887 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-12 06:34:38.892 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-12 06:34:38.896 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-12 06:34:38.897 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-12 06:34:38.898 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-12 06:34:38.899 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-12 06:34:38.899 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-12 06:34:38.913 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-12 06:34:38.914 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-12 06:34:38.915 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-12 06:34:38.920 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-12 06:34:38.921 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-12 06:34:38.921 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-12 06:34:38.922 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-12 06:34:39.119 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-12 06:34:39.119 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-12 06:34:39.120 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-12 06:34:39.120 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-12 06:34:39.121 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-12 06:34:39.122 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-12 06:34:39.122 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-12 06:34:39.122 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-12 06:34:39.123 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-12 06:34:39.125 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-12 06:34:39.126 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-12 06:34:39.126 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-12 06:34:39.127 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-12 06:34:39.127 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-12 06:34:39.127 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-12 06:34:39.130 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-12 06:34:39.135 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 126172013863890901979413708265899355209992631185 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jan 12 03:28:00 UTC 2023 Final Date: Tue Jan 11 03:27:59 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5f:9e:8d:34:ef:db:cd:05:d5:fc:60:34:45:24:2d:0f:83:ae:f9:fc],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3d8ccbd4e8b5f0460dded1cfcef7c12d04ae9eb2 dbdc4dfa51a36660e0676ab851becb9297534af8 00b9a32dd748a81e0cadbb94fbf99e9df1fb9f21 e696e655e71d3e1b5e66f38e44f9950390aab3c7 5845a9768382be7e9c52271e34139b4657ce5567 fd57856d2f1b2ec421fdae2adb1a881e24e726cb 44b9006d12d34e1ebdfb8c4266cf2ef4a8ff5078 178fe0edd3eeca3b3a486b15310ae1912f8aaa1f 53c2db14226240a59ca8ac803c357213cd6044d9 1caa7553639c1c7a5f6eeb1d6d0e5c55dd72ccf8 d7c6872bfed9b485b21b684b7ae8f25d4e75718e 0026af6ba2894c4abefa27496d547acb57e51aae 5f9f61d090592ce5e211dadb52fd7206598bbc12 0a6655d32bf30cb20c9d1c5f2cc4c0092e18c01c 2566d424b08c07b6b3fc3ec5e73d2c2dc7e1896b 856b419478cec0a170c98a5bdcd78de4468b3233 b2c3287a618a6d7f79dc511056489d624dfccc21 5747a2faab1707db122cdfab16b58e7b5d3646dd de54d88309b3da8fafd6a968c1d988b01b560768 da6b878d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [07:b9:d9:50:9d:f2:e6:e7:0b:78:f1:5d:66:22:9c:93:20:04:eb:12],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-12 06:34:56.188 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-12 06:34:56.189 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-12 06:34:56.190 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-12 06:34:56.191 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-12 06:34:56.191 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-12 06:34:56.192 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-12 06:34:56.192 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-12 06:34:56.193 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-12 06:34:56.193 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-12 06:34:56.193 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-12 06:34:56.200 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-12 06:34:56.200 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-12 06:34:56.201 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-12 06:34:56.201 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-12 06:34:56.343 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-12 06:34:56.343 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-12 06:34:56.344 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-12 06:34:56.345 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-12 06:34:56.346 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-12 06:34:56.346 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-12 06:34:56.347 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-12 06:34:56.347 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-12 06:34:56.347 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-12 06:34:56.349 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-12 06:34:56.349 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-12 06:34:56.349 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-12 06:34:56.352 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-12 06:34:56.357 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-12 06:34:56.362 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-12 06:34:56.363 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-12 06:34:56.367 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 126172013863890901979413708265899355209992631185 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jan 12 03:28:00 UTC 2023 Final Date: Tue Jan 11 03:27:59 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [5f:9e:8d:34:ef:db:cd:05:d5:fc:60:34:45:24:2d:0f:83:ae:f9:fc],[56:66:d1:a4] modulus: 8f1e949f0789211611e8f9d16339e18641f3779e3668b1c4c668adb58933fd750715bb7e3406d194dbc378e02c8940ed4557a896f6c2bc7fa3e3e9ed6c2f58721406b58265568acfa8a50ccb8b037f9d2e6588adbdd4903bb2ee24bf3dcea2fda54266d51a2d26f78843860c7ff90e7fdba99be7ba4014e17eb1afe6b671ce433e4978187dd1d4bae23fe8fb8f52039ddf3c413edf06aa2e1c283e359c135a9ce839868640c8f4bb90c250288a27cd28c9af7e7b3f9898e656eec1d20dd899957fdbf45adeb6963392967cbb412456b190bbd148f6f98887981105dd5acd57eabedf7bfc781e5ab14aed95bf8e4850e62941af7bd28ef82de1533ba84f10dae03c588fde9ec0246a427ed83f1b7cc5bd330b44523351cdba0642067218040228345b3aad985c1d0f02bd0fdb4d286f385430937bdc56d4dfffae76856b7517d56bdb15b53d55dd15dcc04a890030c8ced2587b57db0f2ae2add1e65aff193575e816566347bbc68b579dbea25aa7b7440028aa34da8127c9b786cc8105a0ab11 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3d8ccbd4e8b5f0460dded1cfcef7c12d04ae9eb2 dbdc4dfa51a36660e0676ab851becb9297534af8 00b9a32dd748a81e0cadbb94fbf99e9df1fb9f21 e696e655e71d3e1b5e66f38e44f9950390aab3c7 5845a9768382be7e9c52271e34139b4657ce5567 fd57856d2f1b2ec421fdae2adb1a881e24e726cb 44b9006d12d34e1ebdfb8c4266cf2ef4a8ff5078 178fe0edd3eeca3b3a486b15310ae1912f8aaa1f 53c2db14226240a59ca8ac803c357213cd6044d9 1caa7553639c1c7a5f6eeb1d6d0e5c55dd72ccf8 d7c6872bfed9b485b21b684b7ae8f25d4e75718e 0026af6ba2894c4abefa27496d547acb57e51aae 5f9f61d090592ce5e211dadb52fd7206598bbc12 0a6655d32bf30cb20c9d1c5f2cc4c0092e18c01c 2566d424b08c07b6b3fc3ec5e73d2c2dc7e1896b 856b419478cec0a170c98a5bdcd78de4468b3233 b2c3287a618a6d7f79dc511056489d624dfccc21 5747a2faab1707db122cdfab16b58e7b5d3646dd de54d88309b3da8fafd6a968c1d988b01b560768 da6b878d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2c:5a:e9:6c:0a:e0:e2:f3:35:12:97:e3:e2:6e:3b:83:2d:77:82:4f],[56:66:d1:a4] modulus: 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 public exponent: 10001 ]