By type
2022-07-03 05:41:37,534 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-07-03 05:41:38,714 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-07-03 05:41:39.640 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Jul 03, 2022 5:41:42 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jul 03, 2022 5:41:42 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jul 03, 2022 5:41:42 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jul 03, 2022 5:41:42 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-07-03 05:41:42.971 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-07-03 05:41:43.352 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-07-03 05:41:43.551 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-07-03 05:41:44.539 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-07-03 05:41:44.542 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-07-03 05:41:44.543 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-07-03 05:41:44.547 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-07-03 05:41:44.592 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-07-03 05:41:44.596 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-07-03 05:41:44.768 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-07-03 05:41:45.856 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jul 03, 2022 5:41:46 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-07-03 05:41:47.039 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 10.945 seconds (JVM running for 14.203) Jul 03, 2022 5:42:05 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-07-03 06:45:51.298 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-03 06:45:51.316 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-03 06:45:51.366 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-03 06:45:51.374 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-03 06:45:51.396 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-03 06:45:51.398 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-03 06:45:51.400 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-03 06:45:51.401 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-03 06:45:51.401 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-03 06:45:51.405 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-03 06:45:51.412 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-03 06:45:51.415 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-03 06:45:51.451 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-03 06:45:51.455 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-03 06:45:51.455 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-03 06:45:51.458 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-03 06:45:52.148 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-03 06:45:52.154 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-03 06:45:52.155 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-03 06:45:52.158 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-03 06:45:52.171 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-03 06:45:52.172 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-03 06:45:52.173 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-03 06:45:52.174 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-03 06:45:52.175 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-03 06:45:52.192 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-03 06:45:52.192 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-03 06:45:52.193 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-03 06:45:52.199 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-03 06:45:52.199 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-03 06:45:52.200 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-03 06:45:52.201 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-03 06:45:52.231 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 98918862840996890597710955844662879879620974957 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jul 03 05:21:03 UTC 2022 Final Date: Fri Jul 02 05:21:02 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c0:b2:17:07:ae:68:35:23:f4:e3:42:f8:de:3a:44:e3:91:6f:10:ed] modulus: e6081d6ac65c9d2e902e0a050c1c71f7447488b51af8f8178419aca1a033384511f70b37abf1e5f892b9ad7bc14398c4c781210e4aa0810d17d753f9b4858f32ba5e2a6f3055f6045145efc42b7d6104227b44a15b0ed5a3442eec97a24cd57a16d4a39c04d7b52460aa08a3338087d16cec1a959a12118d449e7e00219a7b6560b77e4ac3aaca0f891d652c0ce2c55a42ef9aba9de7a5f41b9c371f01671301bf8ea014741cbf71618cac356bd6ca846eebc0ecc8078bb732ff3be0104e80dc07385518dc6f5e38924c5748dca0e8b5843b2cbf22e024e1b8a9d493baff78c66c8abeadf921690eb855f0de2bad59f00dcefe5028dcb023a54682aa734572338dc8a00b6404d1ff6ae874ea40c122c2b4e060ae2beacc09a8f8ca690a26858ff62d87503cdfdd26c41b433828eeef2c25c4c3067e48a46036443706afd6be7a2c89e32045a6d81e5044037a6c0f8617a739b7d0387762f35653fb97fed71bece45175955087cb4563fa67867a6d5f2e4d09f8b2392848fd4dcfc1c6925952ad public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: cbe02dd23d898c1d9774fe00f374f16a0ac53084 245945479122d3d0bc13b468b1c29ec7995e3c2d 3c2b4e483d092b2d7b54911ae7b7ccdf9f22cdad 37b44a7fca2771931d28262edb9dcfd141ec739a 3b45f18f6bd5c07ec1eec86b42c52b1b20fe2ee7 bf490de07cc098fca9b4fae3b20ba065d3732c6e ff32bf1ff0948802d825061697ebb658f678bb26 e6a9375e1cf07ec33f6817dbc15bd3928df92b3d 1f9ae03a932cad94bdd5413058db868f2023fea0 71e1ba27bf405f5fa1a10ea0d7dde12a0b2656d9 dc43d01e34bf8585c7c4c7ca838524a164b9afcc 12ff197d9ccc84c111bc5c1a4c79032d4050f919 af80e805a894659afd12af7d152225fd48d3d323 c4f476626cf98e9c674ec1e386e1b4788378d2f0 0b5896ec12f2a7180c9c1069b44cc5c059a1aa3c dd780d780a28987d3c1fc32564ccfe0f6498fd7b 2c0d8b23f36c5545a2b9272452794d57bd10d705 76bbdba9883141488b3ac0a1a472c8c5bafcb4b3 e56e48377bd60792e0ce94d63fb7d16a7113648e cdeaf6e0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [83:6c:3d:9f:3a:45:ce:4d:2b:79:ce:08:01:ab:06:ae:18:fb:97:f1] modulus: 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 public exponent: 10001 ] 2022-07-03 06:47:39.459 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-03 06:47:39.461 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-03 06:47:39.462 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-07-03 06:47:39.463 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-03 06:47:39.464 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-07-03 06:47:39.465 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-03 06:47:39.465 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-03 06:47:39.466 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-03 06:47:39.466 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-03 06:47:39.467 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-03 06:47:39.474 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-03 06:47:39.475 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-03 06:47:39.475 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-03 06:47:39.476 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-03 06:47:39.624 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-03 06:47:39.627 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-03 06:47:39.628 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-03 06:47:39.629 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-03 06:47:39.638 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-03 06:47:39.639 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-03 06:47:39.640 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-03 06:47:39.641 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-03 06:47:39.641 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-03 06:47:39.643 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-03 06:47:39.647 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-03 06:47:39.647 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-03 06:47:39.648 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-03 06:47:39.649 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-03 06:47:39.649 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-03 06:47:39.653 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-03 06:47:39.657 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 98918862840996890597710955844662879879620974957 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jul 03 05:21:03 UTC 2022 Final Date: Fri Jul 02 05:21:02 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c0:b2:17:07:ae:68:35:23:f4:e3:42:f8:de:3a:44:e3:91:6f:10:ed] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: cbe02dd23d898c1d9774fe00f374f16a0ac53084 245945479122d3d0bc13b468b1c29ec7995e3c2d 3c2b4e483d092b2d7b54911ae7b7ccdf9f22cdad 37b44a7fca2771931d28262edb9dcfd141ec739a 3b45f18f6bd5c07ec1eec86b42c52b1b20fe2ee7 bf490de07cc098fca9b4fae3b20ba065d3732c6e ff32bf1ff0948802d825061697ebb658f678bb26 e6a9375e1cf07ec33f6817dbc15bd3928df92b3d 1f9ae03a932cad94bdd5413058db868f2023fea0 71e1ba27bf405f5fa1a10ea0d7dde12a0b2656d9 dc43d01e34bf8585c7c4c7ca838524a164b9afcc 12ff197d9ccc84c111bc5c1a4c79032d4050f919 af80e805a894659afd12af7d152225fd48d3d323 c4f476626cf98e9c674ec1e386e1b4788378d2f0 0b5896ec12f2a7180c9c1069b44cc5c059a1aa3c dd780d780a28987d3c1fc32564ccfe0f6498fd7b 2c0d8b23f36c5545a2b9272452794d57bd10d705 76bbdba9883141488b3ac0a1a472c8c5bafcb4b3 e56e48377bd60792e0ce94d63fb7d16a7113648e cdeaf6e0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9d:c5:7b:d4:81:33:46:c3:e0:15:89:69:4b:16:5a:c6:5d:35:7e:b6] modulus: 9dcf5490ce85cffc52a0e2a70ece9db9ee3008ebb27752c11db36005bfd802311d73f3c1239d71fd18f0e22c3d3470dcb45390ee6b7302bf8cd3292ccae9c6099e228409aaf69b323208cedde7a7ee8a8055189770d8897a5c19711e93fe6103f547f9ae6c6109181d1fd6879accfcff58b98c9aa9b0062b21d32c2727daf28a525f9b346fe7147df386a0d6f9d377525920301b216f7dd3120c96177e8354805c1618b9f0c55b3cec20790bef3450dce99e5869031ab9ac798f07e8fb9174f3df412f907ecfe7fe7f09bf477cf33e1255df043de32ba7e5ca6c6c7e73e9bfac1a04e3599f7e587b43282fa80868ad64a8f80528477513fc1ba232884e3032af public exponent: 10001 ] 2022-07-03 06:48:41.269 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-03 06:48:41.272 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-03 06:48:41.275 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-07-03 06:48:41.280 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-03 06:48:41.281 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-07-03 06:48:41.282 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-03 06:48:41.282 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-03 06:48:41.283 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-03 06:48:41.284 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-03 06:48:41.284 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-03 06:48:41.292 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-03 06:48:41.293 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-03 06:48:41.294 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-03 06:48:41.294 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-03 06:48:41.688 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-03 06:48:41.690 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-03 06:48:41.691 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-03 06:48:41.692 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-03 06:48:41.694 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-03 06:48:41.694 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-03 06:48:41.695 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-03 06:48:41.695 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-03 06:48:41.696 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-03 06:48:41.697 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-03 06:48:41.698 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-03 06:48:41.698 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-03 06:48:41.699 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-03 06:48:41.700 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-03 06:48:41.700 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-03 06:48:41.702 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-03 06:48:41.706 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 98918862840996890597710955844662879879620974957 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jul 03 05:21:03 UTC 2022 Final Date: Fri Jul 02 05:21:02 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c0:b2:17:07:ae:68:35:23:f4:e3:42:f8:de:3a:44:e3:91:6f:10:ed] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: cbe02dd23d898c1d9774fe00f374f16a0ac53084 245945479122d3d0bc13b468b1c29ec7995e3c2d 3c2b4e483d092b2d7b54911ae7b7ccdf9f22cdad 37b44a7fca2771931d28262edb9dcfd141ec739a 3b45f18f6bd5c07ec1eec86b42c52b1b20fe2ee7 bf490de07cc098fca9b4fae3b20ba065d3732c6e ff32bf1ff0948802d825061697ebb658f678bb26 e6a9375e1cf07ec33f6817dbc15bd3928df92b3d 1f9ae03a932cad94bdd5413058db868f2023fea0 71e1ba27bf405f5fa1a10ea0d7dde12a0b2656d9 dc43d01e34bf8585c7c4c7ca838524a164b9afcc 12ff197d9ccc84c111bc5c1a4c79032d4050f919 af80e805a894659afd12af7d152225fd48d3d323 c4f476626cf98e9c674ec1e386e1b4788378d2f0 0b5896ec12f2a7180c9c1069b44cc5c059a1aa3c dd780d780a28987d3c1fc32564ccfe0f6498fd7b 2c0d8b23f36c5545a2b9272452794d57bd10d705 76bbdba9883141488b3ac0a1a472c8c5bafcb4b3 e56e48377bd60792e0ce94d63fb7d16a7113648e cdeaf6e0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c8:58:e1:2d:50:21:99:81:e8:3d:3e:82:e4:25:03:b3:32:f8:4d:e3] modulus: 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 public exponent: 10001 ] 2022-07-03 06:50:39.474 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-03 06:50:39.475 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-03 06:50:39.477 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-03 06:50:39.478 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-03 06:50:39.479 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-03 06:50:39.480 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-03 06:50:39.481 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-03 06:50:39.481 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-03 06:50:39.482 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-03 06:50:39.482 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-03 06:50:39.489 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-03 06:50:39.490 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-03 06:50:39.490 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-03 06:50:39.491 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-03 06:50:39.670 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-03 06:50:39.671 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-03 06:50:39.672 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-03 06:50:39.674 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-03 06:50:39.677 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-03 06:50:39.678 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-03 06:50:39.683 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-03 06:50:39.683 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-03 06:50:39.684 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-03 06:50:39.685 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-03 06:50:39.685 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-03 06:50:39.687 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-03 06:50:39.689 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-03 06:50:39.689 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-03 06:50:39.689 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-03 06:50:39.691 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-03 06:50:39.698 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 98918862840996890597710955844662879879620974957 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jul 03 05:21:03 UTC 2022 Final Date: Fri Jul 02 05:21:02 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c0:b2:17:07:ae:68:35:23:f4:e3:42:f8:de:3a:44:e3:91:6f:10:ed] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: cbe02dd23d898c1d9774fe00f374f16a0ac53084 245945479122d3d0bc13b468b1c29ec7995e3c2d 3c2b4e483d092b2d7b54911ae7b7ccdf9f22cdad 37b44a7fca2771931d28262edb9dcfd141ec739a 3b45f18f6bd5c07ec1eec86b42c52b1b20fe2ee7 bf490de07cc098fca9b4fae3b20ba065d3732c6e ff32bf1ff0948802d825061697ebb658f678bb26 e6a9375e1cf07ec33f6817dbc15bd3928df92b3d 1f9ae03a932cad94bdd5413058db868f2023fea0 71e1ba27bf405f5fa1a10ea0d7dde12a0b2656d9 dc43d01e34bf8585c7c4c7ca838524a164b9afcc 12ff197d9ccc84c111bc5c1a4c79032d4050f919 af80e805a894659afd12af7d152225fd48d3d323 c4f476626cf98e9c674ec1e386e1b4788378d2f0 0b5896ec12f2a7180c9c1069b44cc5c059a1aa3c dd780d780a28987d3c1fc32564ccfe0f6498fd7b 2c0d8b23f36c5545a2b9272452794d57bd10d705 76bbdba9883141488b3ac0a1a472c8c5bafcb4b3 e56e48377bd60792e0ce94d63fb7d16a7113648e cdeaf6e0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [75:17:ff:aa:9d:d0:fb:53:52:77:ea:61:3b:0c:a3:d3:38:5f:8e:b6] modulus: a313e9a9547ac613e2f6d66c73e849a6e7945169cf293888feefd3418da0022d9bd0d90014e01a69c9921a9e3988cb9364a8a010b01fa120f163a912808a165d68f68a882acb65f0b353f5986fb8e223198c6b7f8907d8bee902abfd7107c0326836a5b7e4008f57d508968191f93e3ef99c165435eb2a970f8e9821bb8c683f651456a235e2d299e79ad866f0628f578e86ecb93615c7d117591cb9b9b0f4f67615fe0e165d79036bcd7802adb22c8aca7e0d7e3d1d4b9b51b14aa803d93c417ed68294bf0511eaf4deafc1cbf9e5eb4c05ee869fcc68e9bad70a0184ffdc1b1b2bc99c19742e86e2ae165cc6aac41184023840c719980382d07c2195851c55 public exponent: 10001 ] 2022-07-03 07:01:51.744 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-03 07:01:51.747 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-03 07:01:51.752 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-07-03 07:01:51.753 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-03 07:01:51.754 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-07-03 07:01:51.755 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-03 07:01:51.756 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-03 07:01:51.756 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-03 07:01:51.757 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-03 07:01:51.757 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-03 07:01:51.765 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-03 07:01:51.767 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-03 07:01:51.768 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-03 07:01:51.768 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-03 07:01:51.975 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-03 07:01:51.976 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-03 07:01:51.976 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-03 07:01:51.977 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-03 07:01:51.978 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-03 07:01:51.980 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-03 07:01:51.981 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-03 07:01:51.981 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-03 07:01:51.981 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-03 07:01:51.982 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-03 07:01:51.983 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-03 07:01:51.983 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-03 07:01:51.984 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-03 07:01:51.984 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-03 07:01:51.984 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-03 07:01:51.985 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-03 07:01:51.990 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 98918862840996890597710955844662879879620974957 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jul 03 05:21:03 UTC 2022 Final Date: Fri Jul 02 05:21:02 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c0:b2:17:07:ae:68:35:23:f4:e3:42:f8:de:3a:44:e3:91:6f:10:ed] modulus: e6081d6ac65c9d2e902e0a050c1c71f7447488b51af8f8178419aca1a033384511f70b37abf1e5f892b9ad7bc14398c4c781210e4aa0810d17d753f9b4858f32ba5e2a6f3055f6045145efc42b7d6104227b44a15b0ed5a3442eec97a24cd57a16d4a39c04d7b52460aa08a3338087d16cec1a959a12118d449e7e00219a7b6560b77e4ac3aaca0f891d652c0ce2c55a42ef9aba9de7a5f41b9c371f01671301bf8ea014741cbf71618cac356bd6ca846eebc0ecc8078bb732ff3be0104e80dc07385518dc6f5e38924c5748dca0e8b5843b2cbf22e024e1b8a9d493baff78c66c8abeadf921690eb855f0de2bad59f00dcefe5028dcb023a54682aa734572338dc8a00b6404d1ff6ae874ea40c122c2b4e060ae2beacc09a8f8ca690a26858ff62d87503cdfdd26c41b433828eeef2c25c4c3067e48a46036443706afd6be7a2c89e32045a6d81e5044037a6c0f8617a739b7d0387762f35653fb97fed71bece45175955087cb4563fa67867a6d5f2e4d09f8b2392848fd4dcfc1c6925952ad public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: cbe02dd23d898c1d9774fe00f374f16a0ac53084 245945479122d3d0bc13b468b1c29ec7995e3c2d 3c2b4e483d092b2d7b54911ae7b7ccdf9f22cdad 37b44a7fca2771931d28262edb9dcfd141ec739a 3b45f18f6bd5c07ec1eec86b42c52b1b20fe2ee7 bf490de07cc098fca9b4fae3b20ba065d3732c6e ff32bf1ff0948802d825061697ebb658f678bb26 e6a9375e1cf07ec33f6817dbc15bd3928df92b3d 1f9ae03a932cad94bdd5413058db868f2023fea0 71e1ba27bf405f5fa1a10ea0d7dde12a0b2656d9 dc43d01e34bf8585c7c4c7ca838524a164b9afcc 12ff197d9ccc84c111bc5c1a4c79032d4050f919 af80e805a894659afd12af7d152225fd48d3d323 c4f476626cf98e9c674ec1e386e1b4788378d2f0 0b5896ec12f2a7180c9c1069b44cc5c059a1aa3c dd780d780a28987d3c1fc32564ccfe0f6498fd7b 2c0d8b23f36c5545a2b9272452794d57bd10d705 76bbdba9883141488b3ac0a1a472c8c5bafcb4b3 e56e48377bd60792e0ce94d63fb7d16a7113648e cdeaf6e0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5e:f6:11:07:b7:08:33:be:1f:1b:53:3b:a3:61:36:2f:5b:24:f1:7f] modulus: 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 public exponent: 10001 ] 2022-07-03 07:06:36.822 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-03 07:06:36.824 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-03 07:06:36.825 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-07-03 07:06:36.826 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-03 07:06:36.826 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-07-03 07:06:36.827 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-03 07:06:36.827 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-03 07:06:36.828 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-03 07:06:36.828 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-03 07:06:36.829 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-03 07:06:36.839 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-03 07:06:36.840 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-03 07:06:36.840 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-03 07:06:36.840 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-03 07:06:37.006 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-03 07:06:37.008 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-03 07:06:37.009 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-03 07:06:37.011 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-03 07:06:37.015 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-03 07:06:37.015 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-03 07:06:37.016 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-03 07:06:37.017 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-03 07:06:37.020 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-03 07:06:37.022 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-03 07:06:37.022 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-03 07:06:37.023 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-03 07:06:37.024 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-03 07:06:37.024 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-03 07:06:37.025 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-03 07:06:37.026 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-03 07:06:37.030 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 98918862840996890597710955844662879879620974957 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jul 03 05:21:03 UTC 2022 Final Date: Fri Jul 02 05:21:02 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c0:b2:17:07:ae:68:35:23:f4:e3:42:f8:de:3a:44:e3:91:6f:10:ed] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: cbe02dd23d898c1d9774fe00f374f16a0ac53084 245945479122d3d0bc13b468b1c29ec7995e3c2d 3c2b4e483d092b2d7b54911ae7b7ccdf9f22cdad 37b44a7fca2771931d28262edb9dcfd141ec739a 3b45f18f6bd5c07ec1eec86b42c52b1b20fe2ee7 bf490de07cc098fca9b4fae3b20ba065d3732c6e ff32bf1ff0948802d825061697ebb658f678bb26 e6a9375e1cf07ec33f6817dbc15bd3928df92b3d 1f9ae03a932cad94bdd5413058db868f2023fea0 71e1ba27bf405f5fa1a10ea0d7dde12a0b2656d9 dc43d01e34bf8585c7c4c7ca838524a164b9afcc 12ff197d9ccc84c111bc5c1a4c79032d4050f919 af80e805a894659afd12af7d152225fd48d3d323 c4f476626cf98e9c674ec1e386e1b4788378d2f0 0b5896ec12f2a7180c9c1069b44cc5c059a1aa3c dd780d780a28987d3c1fc32564ccfe0f6498fd7b 2c0d8b23f36c5545a2b9272452794d57bd10d705 76bbdba9883141488b3ac0a1a472c8c5bafcb4b3 e56e48377bd60792e0ce94d63fb7d16a7113648e cdeaf6e0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b4:5d:e5:22:eb:bf:3c:be:49:90:67:19:2c:92:e1:96:b6:5a:fd:d9] modulus: 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 public exponent: 10001 ] 2022-07-03 07:06:55.415 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-07-03 07:06:55.417 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-07-03 07:06:55.419 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-07-03 07:06:55.420 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-03 07:06:55.421 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-07-03 07:06:55.421 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-07-03 07:06:55.422 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-07-03 07:06:55.423 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-07-03 07:06:55.423 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-07-03 07:06:55.424 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-07-03 07:06:55.432 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-07-03 07:06:55.432 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-03 07:06:55.433 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-07-03 07:06:55.433 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-03 07:06:55.567 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-07-03 07:06:55.568 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-07-03 07:06:55.568 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-07-03 07:06:55.569 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-07-03 07:06:55.571 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-07-03 07:06:55.572 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-07-03 07:06:55.572 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-03 07:06:55.573 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-03 07:06:55.573 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-03 07:06:55.574 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-03 07:06:55.575 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-03 07:06:55.575 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-03 07:06:55.576 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-03 07:06:55.577 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-07-03 07:06:55.577 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-07-03 07:06:55.578 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-03 07:06:55.582 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 98918862840996890597710955844662879879620974957 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jul 03 05:21:03 UTC 2022 Final Date: Fri Jul 02 05:21:02 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c0:b2:17:07:ae:68:35:23:f4:e3:42:f8:de:3a:44:e3:91:6f:10:ed] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: cbe02dd23d898c1d9774fe00f374f16a0ac53084 245945479122d3d0bc13b468b1c29ec7995e3c2d 3c2b4e483d092b2d7b54911ae7b7ccdf9f22cdad 37b44a7fca2771931d28262edb9dcfd141ec739a 3b45f18f6bd5c07ec1eec86b42c52b1b20fe2ee7 bf490de07cc098fca9b4fae3b20ba065d3732c6e ff32bf1ff0948802d825061697ebb658f678bb26 e6a9375e1cf07ec33f6817dbc15bd3928df92b3d 1f9ae03a932cad94bdd5413058db868f2023fea0 71e1ba27bf405f5fa1a10ea0d7dde12a0b2656d9 dc43d01e34bf8585c7c4c7ca838524a164b9afcc 12ff197d9ccc84c111bc5c1a4c79032d4050f919 af80e805a894659afd12af7d152225fd48d3d323 c4f476626cf98e9c674ec1e386e1b4788378d2f0 0b5896ec12f2a7180c9c1069b44cc5c059a1aa3c dd780d780a28987d3c1fc32564ccfe0f6498fd7b 2c0d8b23f36c5545a2b9272452794d57bd10d705 76bbdba9883141488b3ac0a1a472c8c5bafcb4b3 e56e48377bd60792e0ce94d63fb7d16a7113648e cdeaf6e0 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f9:69:ce:9b:f4:ae:a0:fd:55:c7:fb:4c:c8:c5:ab:a4:b1:19:b6:0e] modulus: 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 public exponent: 10001 ]