By type
2022-04-16 05:13:05,337 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-04-16 05:13:06,392 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-04-16 05:13:07.244 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Apr 16, 2022 5:13:09 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Apr 16, 2022 5:13:09 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Apr 16, 2022 5:13:09 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Apr 16, 2022 5:13:09 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-04-16 05:13:10.254 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-04-16 05:13:10.609 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-04-16 05:13:10.791 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-04-16 05:13:11.731 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-04-16 05:13:11.734 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-04-16 05:13:11.735 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-04-16 05:13:11.740 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-04-16 05:13:11.791 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-04-16 05:13:11.796 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-04-16 05:13:11.940 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-04-16 05:13:12.681 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Apr 16, 2022 5:13:13 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-04-16 05:13:13.692 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 9.184 seconds (JVM running for 11.066) Apr 16, 2022 5:13:39 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-04-16 05:14:04.988 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-16 05:14:04.996 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-16 05:14:05.040 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-04-16 05:14:05.044 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-16 05:14:05.062 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-04-16 05:14:05.065 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-16 05:14:05.066 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-16 05:14:05.068 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-16 05:14:05.068 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-16 05:14:05.073 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-16 05:14:05.080 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-16 05:14:05.085 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-16 05:14:05.130 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-16 05:14:05.135 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-16 05:14:05.136 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-16 05:14:05.140 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-16 05:14:05.827 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-16 05:14:05.830 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-16 05:14:05.830 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-16 05:14:05.832 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-16 05:14:05.843 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-16 05:14:05.844 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-16 05:14:05.845 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-16 05:14:05.846 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-16 05:14:05.846 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-16 05:14:05.863 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-16 05:14:05.864 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-16 05:14:05.864 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-16 05:14:05.875 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-16 05:14:05.876 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-16 05:14:05.876 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-16 05:14:05.881 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-16 05:14:05.918 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 93835245517316104807799299576411046520884244723 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Apr 16 05:10:49 UTC 2022 Final Date: Thu Apr 15 05:10:48 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [38:d0:d8:e7:a2:65:7f:95:ec:9e:13:09:07:c4:0f:ef:9f:c9:a9:cc] modulus: b1b4079b2fc11ca436c20b2abf80151decddd083c1369fddccc475dffb4751bb48084c4463a39ca0c6ac6aa9cf671a5f2d5117b3f327648e9493543ffccd7ca7977b093e8f7b9de64580f76e868d82d9a9c6aa42eba5f12bef4436e66c1004c36d5666a51994dc2ea55d6e96dd783d86f0b3655ed3f27d3cf6879a5567853ba049d13114c5dab32763fed3cb5d8f6fffcf1c6960fb64dbe07591723c0bf3cfe35cd87b290de60268a40cb2358ec11f4ba4a0df0fc57eea03428acf52d706d380a638a3394a49efc3fb03b70aca7f6f69dfae067ae574a33605b87300e1360ae4bce3f85565e5f32091c46268943d5d293b24d7637c5b28a2d80ddd1f51e7b2880a240112c9ac8002c739e657e26c1e01404de3c26bcd4862331d265463346725dcf53154037644397bfed8f249cf8d25dbf0d511e1375975c58a90839baa580b481387ed26c85397e91942f6660aa794c1bbfa6efee09372f27a52b9abfc87e2602bbc4805981b7b22ae91bad254b215e6ae67bd261ac5d322ab743b8ae369db public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9940872bdb58e14d8138456eb0c474157a92c686 099ff60e7fdd897d8267d66a1fdc3b49b36c77b2 a837111122b908b991818b10354c89c502cf890a 7a7de583c13ff40af08721d75a5eb2596db61348 1351ea4023abe4ab2c6b1da46b0069089c4d5735 3b9f02f48c6ffdb86d0b90da41a4ad34dfcffc83 d9dc216495f08609983edb1e1572cc9468b40d47 1ff8af7f486facad4699576e64aca44ed355ecc8 bae0c48d39fe7c740ede03436bd2787b396e1996 b15b588aff53e5785640d8701fc2f0d4b2d58dc1 0d9554cf644b59a0e2e6b72d594adfc1c16527fc 63ce64e71b31d3266dbd12052247ae9ca02944b4 88e674980459894687d5f41364ee78dd1718c6e3 572bb4e2a22621ef55e2b3680045263d5efcfe54 9d754fa4085c69056db5a53820e502fbbeaae7d3 cb713af8875d91fb5ebe406098eab0c165b4ba33 85b2f9a4920513574428bc0056b162cb41340158 6a6e3f162c97b99f90b0ac3e4bd61b832b47cdbd 53a2ab938dbced63459bf41bef0c197c93632b6b 48ed6687 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [50:76:3f:c8:1f:d4:ed:b1:da:5d:db:e1:6c:b8:ee:df:f4:e5:07:60] modulus: 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 public exponent: 10001 ] 2022-04-16 06:29:51.216 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-16 06:29:51.218 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-16 06:29:51.221 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-04-16 06:29:51.222 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-16 06:29:51.223 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-04-16 06:29:51.224 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-16 06:29:51.225 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-16 06:29:51.225 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-16 06:29:51.226 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-16 06:29:51.226 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-16 06:29:51.234 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-16 06:29:51.236 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-16 06:29:51.236 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-16 06:29:51.237 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-16 06:29:51.474 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-16 06:29:51.475 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-16 06:29:51.475 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-16 06:29:51.475 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-16 06:29:51.478 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-16 06:29:51.479 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-16 06:29:51.480 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-16 06:29:51.480 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-16 06:29:51.481 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-16 06:29:51.482 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-16 06:29:51.482 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-16 06:29:51.482 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-16 06:29:51.483 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-16 06:29:51.484 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-16 06:29:51.484 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-16 06:29:51.485 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-16 06:29:51.490 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 93835245517316104807799299576411046520884244723 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Apr 16 05:10:49 UTC 2022 Final Date: Thu Apr 15 05:10:48 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [38:d0:d8:e7:a2:65:7f:95:ec:9e:13:09:07:c4:0f:ef:9f:c9:a9:cc] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9940872bdb58e14d8138456eb0c474157a92c686 099ff60e7fdd897d8267d66a1fdc3b49b36c77b2 a837111122b908b991818b10354c89c502cf890a 7a7de583c13ff40af08721d75a5eb2596db61348 1351ea4023abe4ab2c6b1da46b0069089c4d5735 3b9f02f48c6ffdb86d0b90da41a4ad34dfcffc83 d9dc216495f08609983edb1e1572cc9468b40d47 1ff8af7f486facad4699576e64aca44ed355ecc8 bae0c48d39fe7c740ede03436bd2787b396e1996 b15b588aff53e5785640d8701fc2f0d4b2d58dc1 0d9554cf644b59a0e2e6b72d594adfc1c16527fc 63ce64e71b31d3266dbd12052247ae9ca02944b4 88e674980459894687d5f41364ee78dd1718c6e3 572bb4e2a22621ef55e2b3680045263d5efcfe54 9d754fa4085c69056db5a53820e502fbbeaae7d3 cb713af8875d91fb5ebe406098eab0c165b4ba33 85b2f9a4920513574428bc0056b162cb41340158 6a6e3f162c97b99f90b0ac3e4bd61b832b47cdbd 53a2ab938dbced63459bf41bef0c197c93632b6b 48ed6687 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [35:09:af:6e:da:a1:3f:0e:58:a3:ef:02:11:cc:5d:dc:34:fa:b6:4f] modulus: dcf1cf787993d13f95adefaa936c98e4cd50705f334f069c1ca8203b5dcc07b08c857461604255f27d4bf5a6ce019896cad1cbf3f9ede0a0304fb843647a4ae18b07282509286a6bcc23f56ca037a036b9b1e19e16f9b33b8f08979c3d2ce038efc7974539c71be50c29225e5126637598f0e8eb5e7eb2d3d052ee740c646b7918ce7a946f7e0d784a63cb0b42bdced7d825e5ce3996fe8f5aba4ce9644ad0eb5492a54502851d314c0dab0a7e9e26cb35cf72861f66f14581ecc08142bd644528586c02f2a0b4f18aaf223294f5b27b1a4f49e1ced60005c57d8d651b4e72d0aef22dfc088169952bd4c2c81784dcfe18be4719c45733747f719701d6bd0157 public exponent: 10001 ] 2022-04-16 06:30:08.735 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-16 06:30:08.736 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-16 06:30:08.741 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-16 06:30:08.743 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-16 06:30:08.743 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-16 06:30:08.745 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-16 06:30:08.746 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-16 06:30:08.746 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-16 06:30:08.747 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-16 06:30:08.748 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-16 06:30:08.758 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-16 06:30:08.760 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-16 06:30:08.760 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-16 06:30:08.761 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-16 06:30:08.916 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-16 06:30:08.917 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-16 06:30:08.918 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-16 06:30:08.918 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-16 06:30:08.921 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-16 06:30:08.921 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-16 06:30:08.922 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-16 06:30:08.922 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-16 06:30:08.922 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-16 06:30:08.924 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-16 06:30:08.924 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-16 06:30:08.924 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-16 06:30:08.925 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-16 06:30:08.926 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-16 06:30:08.926 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-16 06:30:08.927 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-16 06:30:08.935 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 93835245517316104807799299576411046520884244723 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Apr 16 05:10:49 UTC 2022 Final Date: Thu Apr 15 05:10:48 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [38:d0:d8:e7:a2:65:7f:95:ec:9e:13:09:07:c4:0f:ef:9f:c9:a9:cc] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9940872bdb58e14d8138456eb0c474157a92c686 099ff60e7fdd897d8267d66a1fdc3b49b36c77b2 a837111122b908b991818b10354c89c502cf890a 7a7de583c13ff40af08721d75a5eb2596db61348 1351ea4023abe4ab2c6b1da46b0069089c4d5735 3b9f02f48c6ffdb86d0b90da41a4ad34dfcffc83 d9dc216495f08609983edb1e1572cc9468b40d47 1ff8af7f486facad4699576e64aca44ed355ecc8 bae0c48d39fe7c740ede03436bd2787b396e1996 b15b588aff53e5785640d8701fc2f0d4b2d58dc1 0d9554cf644b59a0e2e6b72d594adfc1c16527fc 63ce64e71b31d3266dbd12052247ae9ca02944b4 88e674980459894687d5f41364ee78dd1718c6e3 572bb4e2a22621ef55e2b3680045263d5efcfe54 9d754fa4085c69056db5a53820e502fbbeaae7d3 cb713af8875d91fb5ebe406098eab0c165b4ba33 85b2f9a4920513574428bc0056b162cb41340158 6a6e3f162c97b99f90b0ac3e4bd61b832b47cdbd 53a2ab938dbced63459bf41bef0c197c93632b6b 48ed6687 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c0:c7:4f:f1:c5:2d:34:02:e1:cf:e6:dc:eb:0f:02:f9:2b:e7:70:f7] modulus: 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 public exponent: 10001 ] 2022-04-16 06:33:13.250 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-16 06:33:13.252 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-16 06:33:13.255 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-16 06:33:13.255 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-16 06:33:13.256 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-16 06:33:13.257 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-16 06:33:13.258 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-16 06:33:13.258 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-16 06:33:13.259 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-16 06:33:13.259 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-16 06:33:13.265 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-16 06:33:13.266 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-16 06:33:13.266 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-16 06:33:13.267 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-16 06:33:13.460 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-16 06:33:13.461 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-16 06:33:13.462 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-16 06:33:13.463 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-16 06:33:13.465 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-16 06:33:13.466 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-16 06:33:13.467 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-16 06:33:13.468 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-16 06:33:13.468 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-16 06:33:13.469 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-16 06:33:13.469 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-16 06:33:13.470 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-16 06:33:13.471 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-16 06:33:13.471 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-16 06:33:13.472 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-16 06:33:13.473 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-16 06:33:13.482 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 93835245517316104807799299576411046520884244723 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Apr 16 05:10:49 UTC 2022 Final Date: Thu Apr 15 05:10:48 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [38:d0:d8:e7:a2:65:7f:95:ec:9e:13:09:07:c4:0f:ef:9f:c9:a9:cc] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9940872bdb58e14d8138456eb0c474157a92c686 099ff60e7fdd897d8267d66a1fdc3b49b36c77b2 a837111122b908b991818b10354c89c502cf890a 7a7de583c13ff40af08721d75a5eb2596db61348 1351ea4023abe4ab2c6b1da46b0069089c4d5735 3b9f02f48c6ffdb86d0b90da41a4ad34dfcffc83 d9dc216495f08609983edb1e1572cc9468b40d47 1ff8af7f486facad4699576e64aca44ed355ecc8 bae0c48d39fe7c740ede03436bd2787b396e1996 b15b588aff53e5785640d8701fc2f0d4b2d58dc1 0d9554cf644b59a0e2e6b72d594adfc1c16527fc 63ce64e71b31d3266dbd12052247ae9ca02944b4 88e674980459894687d5f41364ee78dd1718c6e3 572bb4e2a22621ef55e2b3680045263d5efcfe54 9d754fa4085c69056db5a53820e502fbbeaae7d3 cb713af8875d91fb5ebe406098eab0c165b4ba33 85b2f9a4920513574428bc0056b162cb41340158 6a6e3f162c97b99f90b0ac3e4bd61b832b47cdbd 53a2ab938dbced63459bf41bef0c197c93632b6b 48ed6687 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [79:84:9e:3a:8a:0e:0c:a8:de:71:64:a4:77:3e:1e:be:5f:4b:cf:59] modulus: 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 public exponent: 10001 ] 2022-04-16 06:34:30.120 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-16 06:34:30.122 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-16 06:34:30.124 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-04-16 06:34:30.125 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-16 06:34:30.126 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-04-16 06:34:30.126 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-16 06:34:30.127 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-16 06:34:30.127 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-16 06:34:30.128 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-16 06:34:30.128 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-16 06:34:30.136 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-16 06:34:30.137 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-16 06:34:30.138 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-16 06:34:30.138 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-16 06:34:30.311 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-16 06:34:30.312 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-16 06:34:30.313 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-16 06:34:30.313 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-16 06:34:30.315 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-16 06:34:30.315 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-16 06:34:30.316 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-16 06:34:30.316 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-16 06:34:30.317 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-16 06:34:30.318 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-16 06:34:30.318 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-16 06:34:30.318 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-16 06:34:30.319 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-16 06:34:30.319 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-16 06:34:30.320 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-16 06:34:30.321 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-16 06:34:30.326 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 93835245517316104807799299576411046520884244723 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Apr 16 05:10:49 UTC 2022 Final Date: Thu Apr 15 05:10:48 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [38:d0:d8:e7:a2:65:7f:95:ec:9e:13:09:07:c4:0f:ef:9f:c9:a9:cc] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9940872bdb58e14d8138456eb0c474157a92c686 099ff60e7fdd897d8267d66a1fdc3b49b36c77b2 a837111122b908b991818b10354c89c502cf890a 7a7de583c13ff40af08721d75a5eb2596db61348 1351ea4023abe4ab2c6b1da46b0069089c4d5735 3b9f02f48c6ffdb86d0b90da41a4ad34dfcffc83 d9dc216495f08609983edb1e1572cc9468b40d47 1ff8af7f486facad4699576e64aca44ed355ecc8 bae0c48d39fe7c740ede03436bd2787b396e1996 b15b588aff53e5785640d8701fc2f0d4b2d58dc1 0d9554cf644b59a0e2e6b72d594adfc1c16527fc 63ce64e71b31d3266dbd12052247ae9ca02944b4 88e674980459894687d5f41364ee78dd1718c6e3 572bb4e2a22621ef55e2b3680045263d5efcfe54 9d754fa4085c69056db5a53820e502fbbeaae7d3 cb713af8875d91fb5ebe406098eab0c165b4ba33 85b2f9a4920513574428bc0056b162cb41340158 6a6e3f162c97b99f90b0ac3e4bd61b832b47cdbd 53a2ab938dbced63459bf41bef0c197c93632b6b 48ed6687 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [83:bd:7f:3e:a4:c4:11:98:4a:9d:b6:eb:f4:89:bc:9b:7d:a0:ca:f2] modulus: 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 public exponent: 10001 ] 2022-04-16 06:35:50.306 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-16 06:35:50.308 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-16 06:35:50.310 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-04-16 06:35:50.310 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-16 06:35:50.311 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-04-16 06:35:50.312 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-16 06:35:50.312 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-16 06:35:50.313 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-16 06:35:50.313 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-16 06:35:50.313 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-16 06:35:50.321 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-16 06:35:50.322 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-16 06:35:50.323 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-16 06:35:50.324 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-16 06:35:50.516 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-16 06:35:50.517 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-16 06:35:50.518 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-16 06:35:50.518 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-16 06:35:50.520 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-16 06:35:50.520 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-16 06:35:50.521 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-16 06:35:50.521 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-16 06:35:50.522 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-16 06:35:50.523 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-16 06:35:50.523 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-16 06:35:50.523 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-16 06:35:50.524 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-16 06:35:50.524 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-16 06:35:50.525 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-16 06:35:50.526 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-16 06:35:50.530 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 93835245517316104807799299576411046520884244723 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Apr 16 05:10:49 UTC 2022 Final Date: Thu Apr 15 05:10:48 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [38:d0:d8:e7:a2:65:7f:95:ec:9e:13:09:07:c4:0f:ef:9f:c9:a9:cc] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9940872bdb58e14d8138456eb0c474157a92c686 099ff60e7fdd897d8267d66a1fdc3b49b36c77b2 a837111122b908b991818b10354c89c502cf890a 7a7de583c13ff40af08721d75a5eb2596db61348 1351ea4023abe4ab2c6b1da46b0069089c4d5735 3b9f02f48c6ffdb86d0b90da41a4ad34dfcffc83 d9dc216495f08609983edb1e1572cc9468b40d47 1ff8af7f486facad4699576e64aca44ed355ecc8 bae0c48d39fe7c740ede03436bd2787b396e1996 b15b588aff53e5785640d8701fc2f0d4b2d58dc1 0d9554cf644b59a0e2e6b72d594adfc1c16527fc 63ce64e71b31d3266dbd12052247ae9ca02944b4 88e674980459894687d5f41364ee78dd1718c6e3 572bb4e2a22621ef55e2b3680045263d5efcfe54 9d754fa4085c69056db5a53820e502fbbeaae7d3 cb713af8875d91fb5ebe406098eab0c165b4ba33 85b2f9a4920513574428bc0056b162cb41340158 6a6e3f162c97b99f90b0ac3e4bd61b832b47cdbd 53a2ab938dbced63459bf41bef0c197c93632b6b 48ed6687 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ae:3e:45:c9:2b:2a:ed:71:1d:02:35:91:9c:58:da:8c:ea:b8:ce:28] modulus: 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 public exponent: 10001 ] 2022-04-16 06:36:11.826 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-16 06:36:11.828 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-16 06:36:11.830 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-04-16 06:36:11.831 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-16 06:36:11.831 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-04-16 06:36:11.832 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-16 06:36:11.832 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-16 06:36:11.833 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-16 06:36:11.833 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-16 06:36:11.834 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-16 06:36:11.844 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-16 06:36:11.849 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-16 06:36:11.849 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-16 06:36:11.850 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-16 06:36:12.005 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-16 06:36:12.006 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-16 06:36:12.007 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-16 06:36:12.007 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-16 06:36:12.009 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-16 06:36:12.010 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-16 06:36:12.011 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-16 06:36:12.012 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-16 06:36:12.012 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-16 06:36:12.013 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-16 06:36:12.014 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-16 06:36:12.015 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-16 06:36:12.015 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-16 06:36:12.016 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-16 06:36:12.016 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-16 06:36:12.017 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-16 06:36:12.021 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 93835245517316104807799299576411046520884244723 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Apr 16 05:10:49 UTC 2022 Final Date: Thu Apr 15 05:10:48 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [38:d0:d8:e7:a2:65:7f:95:ec:9e:13:09:07:c4:0f:ef:9f:c9:a9:cc] modulus: b1b4079b2fc11ca436c20b2abf80151decddd083c1369fddccc475dffb4751bb48084c4463a39ca0c6ac6aa9cf671a5f2d5117b3f327648e9493543ffccd7ca7977b093e8f7b9de64580f76e868d82d9a9c6aa42eba5f12bef4436e66c1004c36d5666a51994dc2ea55d6e96dd783d86f0b3655ed3f27d3cf6879a5567853ba049d13114c5dab32763fed3cb5d8f6fffcf1c6960fb64dbe07591723c0bf3cfe35cd87b290de60268a40cb2358ec11f4ba4a0df0fc57eea03428acf52d706d380a638a3394a49efc3fb03b70aca7f6f69dfae067ae574a33605b87300e1360ae4bce3f85565e5f32091c46268943d5d293b24d7637c5b28a2d80ddd1f51e7b2880a240112c9ac8002c739e657e26c1e01404de3c26bcd4862331d265463346725dcf53154037644397bfed8f249cf8d25dbf0d511e1375975c58a90839baa580b481387ed26c85397e91942f6660aa794c1bbfa6efee09372f27a52b9abfc87e2602bbc4805981b7b22ae91bad254b215e6ae67bd261ac5d322ab743b8ae369db public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9940872bdb58e14d8138456eb0c474157a92c686 099ff60e7fdd897d8267d66a1fdc3b49b36c77b2 a837111122b908b991818b10354c89c502cf890a 7a7de583c13ff40af08721d75a5eb2596db61348 1351ea4023abe4ab2c6b1da46b0069089c4d5735 3b9f02f48c6ffdb86d0b90da41a4ad34dfcffc83 d9dc216495f08609983edb1e1572cc9468b40d47 1ff8af7f486facad4699576e64aca44ed355ecc8 bae0c48d39fe7c740ede03436bd2787b396e1996 b15b588aff53e5785640d8701fc2f0d4b2d58dc1 0d9554cf644b59a0e2e6b72d594adfc1c16527fc 63ce64e71b31d3266dbd12052247ae9ca02944b4 88e674980459894687d5f41364ee78dd1718c6e3 572bb4e2a22621ef55e2b3680045263d5efcfe54 9d754fa4085c69056db5a53820e502fbbeaae7d3 cb713af8875d91fb5ebe406098eab0c165b4ba33 85b2f9a4920513574428bc0056b162cb41340158 6a6e3f162c97b99f90b0ac3e4bd61b832b47cdbd 53a2ab938dbced63459bf41bef0c197c93632b6b 48ed6687 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7d:3a:fe:da:4e:88:fd:af:dc:aa:67:a6:b0:e5:e8:cf:dd:f5:4c:47] modulus: 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 public exponent: 10001 ] 2022-04-16 06:36:12.087 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-16 06:36:12.088 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-16 06:36:12.090 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-04-16 06:36:12.091 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-16 06:36:12.091 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-04-16 06:36:12.092 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-16 06:36:12.092 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-16 06:36:12.093 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-16 06:36:12.093 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-16 06:36:12.094 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-16 06:36:12.098 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-16 06:36:12.099 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-16 06:36:12.099 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-16 06:36:12.099 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-16 06:36:12.192 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-16 06:36:12.194 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-16 06:36:12.194 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-16 06:36:12.194 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-16 06:36:12.196 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-16 06:36:12.197 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-16 06:36:12.198 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-16 06:36:12.198 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-16 06:36:12.199 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-16 06:36:12.200 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-16 06:36:12.200 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-16 06:36:12.200 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-16 06:36:12.201 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-16 06:36:12.201 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-16 06:36:12.202 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-16 06:36:12.202 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-16 06:36:12.209 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 93835245517316104807799299576411046520884244723 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Apr 16 05:10:49 UTC 2022 Final Date: Thu Apr 15 05:10:48 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [38:d0:d8:e7:a2:65:7f:95:ec:9e:13:09:07:c4:0f:ef:9f:c9:a9:cc] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9940872bdb58e14d8138456eb0c474157a92c686 099ff60e7fdd897d8267d66a1fdc3b49b36c77b2 a837111122b908b991818b10354c89c502cf890a 7a7de583c13ff40af08721d75a5eb2596db61348 1351ea4023abe4ab2c6b1da46b0069089c4d5735 3b9f02f48c6ffdb86d0b90da41a4ad34dfcffc83 d9dc216495f08609983edb1e1572cc9468b40d47 1ff8af7f486facad4699576e64aca44ed355ecc8 bae0c48d39fe7c740ede03436bd2787b396e1996 b15b588aff53e5785640d8701fc2f0d4b2d58dc1 0d9554cf644b59a0e2e6b72d594adfc1c16527fc 63ce64e71b31d3266dbd12052247ae9ca02944b4 88e674980459894687d5f41364ee78dd1718c6e3 572bb4e2a22621ef55e2b3680045263d5efcfe54 9d754fa4085c69056db5a53820e502fbbeaae7d3 cb713af8875d91fb5ebe406098eab0c165b4ba33 85b2f9a4920513574428bc0056b162cb41340158 6a6e3f162c97b99f90b0ac3e4bd61b832b47cdbd 53a2ab938dbced63459bf41bef0c197c93632b6b 48ed6687 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [86:f8:cc:90:f4:10:28:4e:90:84:8d:bc:7b:85:57:d8:6a:61:4a:30] modulus: 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 public exponent: 10001 ] 2022-04-16 06:38:33.990 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-16 06:38:33.993 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-16 06:38:33.995 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-16 06:38:33.996 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-16 06:38:33.997 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-16 06:38:33.998 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-16 06:38:33.999 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-16 06:38:33.999 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-16 06:38:34.000 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-16 06:38:34.000 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-16 06:38:34.009 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-16 06:38:34.010 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-16 06:38:34.011 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-16 06:38:34.011 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-16 06:38:34.181 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-16 06:38:34.182 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-16 06:38:34.183 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-16 06:38:34.184 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-16 06:38:34.185 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-16 06:38:34.186 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-16 06:38:34.187 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-16 06:38:34.187 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-16 06:38:34.187 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-16 06:38:34.188 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-16 06:38:34.189 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-16 06:38:34.189 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-16 06:38:34.190 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-16 06:38:34.191 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-16 06:38:34.192 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-16 06:38:34.193 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-16 06:38:34.199 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 93835245517316104807799299576411046520884244723 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Apr 16 05:10:49 UTC 2022 Final Date: Thu Apr 15 05:10:48 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [38:d0:d8:e7:a2:65:7f:95:ec:9e:13:09:07:c4:0f:ef:9f:c9:a9:cc] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9940872bdb58e14d8138456eb0c474157a92c686 099ff60e7fdd897d8267d66a1fdc3b49b36c77b2 a837111122b908b991818b10354c89c502cf890a 7a7de583c13ff40af08721d75a5eb2596db61348 1351ea4023abe4ab2c6b1da46b0069089c4d5735 3b9f02f48c6ffdb86d0b90da41a4ad34dfcffc83 d9dc216495f08609983edb1e1572cc9468b40d47 1ff8af7f486facad4699576e64aca44ed355ecc8 bae0c48d39fe7c740ede03436bd2787b396e1996 b15b588aff53e5785640d8701fc2f0d4b2d58dc1 0d9554cf644b59a0e2e6b72d594adfc1c16527fc 63ce64e71b31d3266dbd12052247ae9ca02944b4 88e674980459894687d5f41364ee78dd1718c6e3 572bb4e2a22621ef55e2b3680045263d5efcfe54 9d754fa4085c69056db5a53820e502fbbeaae7d3 cb713af8875d91fb5ebe406098eab0c165b4ba33 85b2f9a4920513574428bc0056b162cb41340158 6a6e3f162c97b99f90b0ac3e4bd61b832b47cdbd 53a2ab938dbced63459bf41bef0c197c93632b6b 48ed6687 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c6:e5:01:1f:c8:a4:54:86:8b:a3:41:17:eb:15:d4:f6:15:bf:09:a2] modulus: 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 public exponent: 10001 ] 2022-04-16 06:43:05.887 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-16 06:43:05.889 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-16 06:43:05.890 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-16 06:43:05.891 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-16 06:43:05.891 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-16 06:43:05.892 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-16 06:43:05.892 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-16 06:43:05.892 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-16 06:43:05.893 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-16 06:43:05.893 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-16 06:43:05.898 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-16 06:43:05.898 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-16 06:43:05.898 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-16 06:43:05.899 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-16 06:43:06.073 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-16 06:43:06.074 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-16 06:43:06.074 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-16 06:43:06.074 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-16 06:43:06.076 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-16 06:43:06.076 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-16 06:43:06.076 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-16 06:43:06.076 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-16 06:43:06.077 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-16 06:43:06.078 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-16 06:43:06.078 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-16 06:43:06.078 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-16 06:43:06.078 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-16 06:43:06.079 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-16 06:43:06.079 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-16 06:43:06.080 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-16 06:43:06.083 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 93835245517316104807799299576411046520884244723 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Apr 16 05:10:49 UTC 2022 Final Date: Thu Apr 15 05:10:48 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [38:d0:d8:e7:a2:65:7f:95:ec:9e:13:09:07:c4:0f:ef:9f:c9:a9:cc] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9940872bdb58e14d8138456eb0c474157a92c686 099ff60e7fdd897d8267d66a1fdc3b49b36c77b2 a837111122b908b991818b10354c89c502cf890a 7a7de583c13ff40af08721d75a5eb2596db61348 1351ea4023abe4ab2c6b1da46b0069089c4d5735 3b9f02f48c6ffdb86d0b90da41a4ad34dfcffc83 d9dc216495f08609983edb1e1572cc9468b40d47 1ff8af7f486facad4699576e64aca44ed355ecc8 bae0c48d39fe7c740ede03436bd2787b396e1996 b15b588aff53e5785640d8701fc2f0d4b2d58dc1 0d9554cf644b59a0e2e6b72d594adfc1c16527fc 63ce64e71b31d3266dbd12052247ae9ca02944b4 88e674980459894687d5f41364ee78dd1718c6e3 572bb4e2a22621ef55e2b3680045263d5efcfe54 9d754fa4085c69056db5a53820e502fbbeaae7d3 cb713af8875d91fb5ebe406098eab0c165b4ba33 85b2f9a4920513574428bc0056b162cb41340158 6a6e3f162c97b99f90b0ac3e4bd61b832b47cdbd 53a2ab938dbced63459bf41bef0c197c93632b6b 48ed6687 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [02:f9:5e:a1:e9:b3:b3:cf:08:c0:26:0c:38:a6:74:78:8e:d1:06:bc] modulus: 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 public exponent: 10001 ] 2022-04-16 06:57:08.588 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-16 06:57:08.591 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-16 06:57:08.593 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-04-16 06:57:08.594 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-16 06:57:08.595 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-04-16 06:57:08.595 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-16 06:57:08.596 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-16 06:57:08.596 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-16 06:57:08.597 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-16 06:57:08.597 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-16 06:57:08.602 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-16 06:57:08.603 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-16 06:57:08.604 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-16 06:57:08.604 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-16 06:57:08.757 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-16 06:57:08.759 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-16 06:57:08.759 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-16 06:57:08.759 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-16 06:57:08.761 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-16 06:57:08.762 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-16 06:57:08.762 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-16 06:57:08.762 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-16 06:57:08.763 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-16 06:57:08.764 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-16 06:57:08.764 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-16 06:57:08.764 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-16 06:57:08.765 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-16 06:57:08.765 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-16 06:57:08.765 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-16 06:57:08.766 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-16 06:57:08.770 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 93835245517316104807799299576411046520884244723 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Apr 16 05:10:49 UTC 2022 Final Date: Thu Apr 15 05:10:48 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [38:d0:d8:e7:a2:65:7f:95:ec:9e:13:09:07:c4:0f:ef:9f:c9:a9:cc] modulus: b1b4079b2fc11ca436c20b2abf80151decddd083c1369fddccc475dffb4751bb48084c4463a39ca0c6ac6aa9cf671a5f2d5117b3f327648e9493543ffccd7ca7977b093e8f7b9de64580f76e868d82d9a9c6aa42eba5f12bef4436e66c1004c36d5666a51994dc2ea55d6e96dd783d86f0b3655ed3f27d3cf6879a5567853ba049d13114c5dab32763fed3cb5d8f6fffcf1c6960fb64dbe07591723c0bf3cfe35cd87b290de60268a40cb2358ec11f4ba4a0df0fc57eea03428acf52d706d380a638a3394a49efc3fb03b70aca7f6f69dfae067ae574a33605b87300e1360ae4bce3f85565e5f32091c46268943d5d293b24d7637c5b28a2d80ddd1f51e7b2880a240112c9ac8002c739e657e26c1e01404de3c26bcd4862331d265463346725dcf53154037644397bfed8f249cf8d25dbf0d511e1375975c58a90839baa580b481387ed26c85397e91942f6660aa794c1bbfa6efee09372f27a52b9abfc87e2602bbc4805981b7b22ae91bad254b215e6ae67bd261ac5d322ab743b8ae369db public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9940872bdb58e14d8138456eb0c474157a92c686 099ff60e7fdd897d8267d66a1fdc3b49b36c77b2 a837111122b908b991818b10354c89c502cf890a 7a7de583c13ff40af08721d75a5eb2596db61348 1351ea4023abe4ab2c6b1da46b0069089c4d5735 3b9f02f48c6ffdb86d0b90da41a4ad34dfcffc83 d9dc216495f08609983edb1e1572cc9468b40d47 1ff8af7f486facad4699576e64aca44ed355ecc8 bae0c48d39fe7c740ede03436bd2787b396e1996 b15b588aff53e5785640d8701fc2f0d4b2d58dc1 0d9554cf644b59a0e2e6b72d594adfc1c16527fc 63ce64e71b31d3266dbd12052247ae9ca02944b4 88e674980459894687d5f41364ee78dd1718c6e3 572bb4e2a22621ef55e2b3680045263d5efcfe54 9d754fa4085c69056db5a53820e502fbbeaae7d3 cb713af8875d91fb5ebe406098eab0c165b4ba33 85b2f9a4920513574428bc0056b162cb41340158 6a6e3f162c97b99f90b0ac3e4bd61b832b47cdbd 53a2ab938dbced63459bf41bef0c197c93632b6b 48ed6687 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0a:66:c8:a5:5c:ac:33:b6:99:d2:12:ae:3e:ad:79:9d:e4:10:a7:61] modulus: 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 public exponent: 10001 ] 2022-04-16 06:57:26.813 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-16 06:57:26.814 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-16 06:57:26.816 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-04-16 06:57:26.816 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-16 06:57:26.817 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-04-16 06:57:26.817 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-16 06:57:26.817 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-16 06:57:26.818 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-16 06:57:26.818 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-16 06:57:26.818 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-16 06:57:26.823 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-16 06:57:26.823 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-16 06:57:26.824 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-16 06:57:26.824 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-16 06:57:26.922 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-16 06:57:26.923 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-16 06:57:26.923 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-16 06:57:26.924 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-16 06:57:26.925 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-16 06:57:26.926 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-16 06:57:26.926 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-16 06:57:26.926 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-16 06:57:26.926 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-16 06:57:26.927 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-16 06:57:26.927 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-16 06:57:26.928 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-16 06:57:26.928 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-16 06:57:26.929 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-16 06:57:26.929 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-16 06:57:26.930 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-16 06:57:26.934 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 93835245517316104807799299576411046520884244723 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Apr 16 05:10:49 UTC 2022 Final Date: Thu Apr 15 05:10:48 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [38:d0:d8:e7:a2:65:7f:95:ec:9e:13:09:07:c4:0f:ef:9f:c9:a9:cc] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 9940872bdb58e14d8138456eb0c474157a92c686 099ff60e7fdd897d8267d66a1fdc3b49b36c77b2 a837111122b908b991818b10354c89c502cf890a 7a7de583c13ff40af08721d75a5eb2596db61348 1351ea4023abe4ab2c6b1da46b0069089c4d5735 3b9f02f48c6ffdb86d0b90da41a4ad34dfcffc83 d9dc216495f08609983edb1e1572cc9468b40d47 1ff8af7f486facad4699576e64aca44ed355ecc8 bae0c48d39fe7c740ede03436bd2787b396e1996 b15b588aff53e5785640d8701fc2f0d4b2d58dc1 0d9554cf644b59a0e2e6b72d594adfc1c16527fc 63ce64e71b31d3266dbd12052247ae9ca02944b4 88e674980459894687d5f41364ee78dd1718c6e3 572bb4e2a22621ef55e2b3680045263d5efcfe54 9d754fa4085c69056db5a53820e502fbbeaae7d3 cb713af8875d91fb5ebe406098eab0c165b4ba33 85b2f9a4920513574428bc0056b162cb41340158 6a6e3f162c97b99f90b0ac3e4bd61b832b47cdbd 53a2ab938dbced63459bf41bef0c197c93632b6b 48ed6687 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5e:7b:8c:6a:49:5d:79:4d:b7:92:5e:1a:b4:0f:8a:56:e7:57:5e:cc] modulus: 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 public exponent: 10001 ]