By type
2022-11-02 05:05:25,508 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-11-02 05:05:27,403 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-11-02 05:05:28.463 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Nov 02, 2022 5:05:31 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Nov 02, 2022 5:05:31 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Nov 02, 2022 5:05:31 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Nov 02, 2022 5:05:31 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-11-02 05:05:32.830 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-11-02 05:05:33.258 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-11-02 05:05:33.601 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-11-02 05:05:34.836 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-11-02 05:05:34.839 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-11-02 05:05:34.841 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-11-02 05:05:34.845 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-11-02 05:05:34.914 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-11-02 05:05:34.923 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-11-02 05:05:35.100 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-11-02 05:05:36.252 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Nov 02, 2022 5:05:37 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-11-02 05:05:38.043 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 13.641 seconds (JVM running for 16.3) Nov 02, 2022 5:06:00 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-11-02 05:06:14.776 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-02 05:06:14.790 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-02 05:06:14.840 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-11-02 05:06:14.844 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-02 05:06:14.865 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-11-02 05:06:14.868 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-02 05:06:14.870 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-02 05:06:14.872 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-02 05:06:14.872 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-02 05:06:14.878 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-02 05:06:14.895 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-02 05:06:14.903 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-02 05:06:14.978 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-02 05:06:14.989 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-02 05:06:14.990 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-02 05:06:15.000 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-02 05:06:15.676 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-02 05:06:15.680 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-02 05:06:15.680 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-02 05:06:15.682 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-02 05:06:15.696 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-02 05:06:15.697 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-02 05:06:15.698 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-02 05:06:15.698 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-02 05:06:15.699 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-02 05:06:15.737 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-02 05:06:15.738 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-02 05:06:15.738 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-02 05:06:15.748 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-02 05:06:15.749 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-02 05:06:15.749 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-02 05:06:15.751 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-02 05:06:15.807 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 42909093588342475197152615879451886816262916637 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 02 05:02:31 UTC 2022 Final Date: Mon Nov 01 05:02:30 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [77:10:f0:e0:bc:5b:7a:dd:ed:bc:6d:ab:c1:82:46:b8:fc:38:8a:98],[56:66:d1:a4] modulus: b4da0713806fb0d083a8cacd94c45dec70290de6e355f481bf7f2198e933ddb56e6298f150767b095f560fa835ca951bdda80fddf6516c6cb4a6e8170ede664083ace44f494bbdcd4c7f6fc7388657c93637e4060b380eecfbfadc7a14d50abc0ee813055aa037b03c900dd9ff3d6f8d514274ef22cebfef68c0ed9d8d42358979409b1dd87bc38aa4ccdefa7e4006e41e7c5719036b24f4c15944c640444c481144d9a2d63ff7a9e0fef9e8e7ddd86806248d244e4d01c3543bb606ae3eac89b48e7e968827175ab72c7bceb139741b437a210f8d562b12087052b1e1313e5bcea6581f126f9521d64d1b3b63a5e0dc44db27b7f7da8dfcc9a61a6de885d26c9ba57f45990b0f478d2008577f772de4a0f6435118b78c4e21ea624e8c5cc4e243af6d2afebac137873e02c1a8830933c722eb5553d79458c598b8586a19bdde10415674310b3b13b89ba5b11f615d0a9d62abda846c6079886ec80ee73c4314cb70a921199cc80d9469d72ab79005fb73092f38ce199c3f7018a9c9b26032ab public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a21319266ea0d2581eda5991330060ba807a900d 3dfb863548f97a08bcf3e254b0024b805c72204d 557452b804704186bfa33cb772c7c686e5a94ec5 9594580491a385c98eb8295171850259bc27f465 a0d5809a8e5ed41712ea6939717236a06f78702d 490804ec57f9a6f3eb1b8a425443cc4a47962138 d4c8814cb62ef1339179fcbf16216563901dc58a 28d127eaf6bf17846f8a2d6a8bd658bb6cb65f0b 0a06032579213207307424e7478b92a178a9c32b 3f2752f130cc4e11372e610f2e8829798d32a1e5 020aa15049946213f4e32b4bbd791cb2687ea879 bee8a09be81242e4ee910bdc165a3a6e4b8918c6 1019d6c8b38bae8dac90770194087037c60356fa f9d51ebe3d68e30dae01509c30acf9f043b5e125 bb4f8121541b64c6e0725ba142bff97cd4bd6751 b3f463fdd42eef3431106ed7e55e0fe0d48ad35a 51b4f1d60a55d0f94835b5d6fae8f5612efda4f0 de0c447c173b7511f77f23a4f819d3fc131f720a 13aba4110d2ba119baa9159c29d0785570a8cbd9 3a7f2068 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a5:1c:80:0d:16:01:f9:26:d2:59:72:51:c9:ca:f2:a5:b0:fc:56:19],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-02 06:21:59.505 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-02 06:21:59.511 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-02 06:21:59.519 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-02 06:21:59.521 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-02 06:21:59.522 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-02 06:21:59.529 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-02 06:21:59.530 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-02 06:21:59.531 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-02 06:21:59.532 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-02 06:21:59.533 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-02 06:21:59.544 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-02 06:21:59.547 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-02 06:21:59.548 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-02 06:21:59.549 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-02 06:21:59.784 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-02 06:21:59.786 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-02 06:21:59.786 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-02 06:21:59.787 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-02 06:21:59.791 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-02 06:21:59.791 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-02 06:21:59.792 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-02 06:21:59.792 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-02 06:21:59.793 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-02 06:21:59.795 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-02 06:21:59.795 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-02 06:21:59.796 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-02 06:21:59.806 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-02 06:21:59.807 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-02 06:21:59.808 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-02 06:21:59.810 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-02 06:21:59.817 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 42909093588342475197152615879451886816262916637 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 02 05:02:31 UTC 2022 Final Date: Mon Nov 01 05:02:30 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [77:10:f0:e0:bc:5b:7a:dd:ed:bc:6d:ab:c1:82:46:b8:fc:38:8a:98],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a21319266ea0d2581eda5991330060ba807a900d 3dfb863548f97a08bcf3e254b0024b805c72204d 557452b804704186bfa33cb772c7c686e5a94ec5 9594580491a385c98eb8295171850259bc27f465 a0d5809a8e5ed41712ea6939717236a06f78702d 490804ec57f9a6f3eb1b8a425443cc4a47962138 d4c8814cb62ef1339179fcbf16216563901dc58a 28d127eaf6bf17846f8a2d6a8bd658bb6cb65f0b 0a06032579213207307424e7478b92a178a9c32b 3f2752f130cc4e11372e610f2e8829798d32a1e5 020aa15049946213f4e32b4bbd791cb2687ea879 bee8a09be81242e4ee910bdc165a3a6e4b8918c6 1019d6c8b38bae8dac90770194087037c60356fa f9d51ebe3d68e30dae01509c30acf9f043b5e125 bb4f8121541b64c6e0725ba142bff97cd4bd6751 b3f463fdd42eef3431106ed7e55e0fe0d48ad35a 51b4f1d60a55d0f94835b5d6fae8f5612efda4f0 de0c447c173b7511f77f23a4f819d3fc131f720a 13aba4110d2ba119baa9159c29d0785570a8cbd9 3a7f2068 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [84:ef:c7:5d:07:3d:58:92:d0:7a:53:78:8d:40:d5:4d:90:b5:44:54],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-02 06:23:31.731 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-02 06:23:31.733 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-02 06:23:31.734 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-11-02 06:23:31.735 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-02 06:23:31.736 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-11-02 06:23:31.737 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-02 06:23:31.737 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-02 06:23:31.739 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-02 06:23:31.741 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-02 06:23:31.744 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-02 06:23:31.765 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-02 06:23:31.767 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-02 06:23:31.767 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-02 06:23:31.768 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-02 06:23:31.915 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-02 06:23:31.916 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-02 06:23:31.916 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-02 06:23:31.917 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-02 06:23:31.926 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-02 06:23:31.927 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-02 06:23:31.930 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-02 06:23:31.930 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-02 06:23:31.930 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-02 06:23:31.932 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-02 06:23:31.932 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-02 06:23:31.933 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-02 06:23:31.936 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-02 06:23:31.936 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-02 06:23:31.936 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-02 06:23:31.938 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-02 06:23:31.943 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 42909093588342475197152615879451886816262916637 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 02 05:02:31 UTC 2022 Final Date: Mon Nov 01 05:02:30 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [77:10:f0:e0:bc:5b:7a:dd:ed:bc:6d:ab:c1:82:46:b8:fc:38:8a:98],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a21319266ea0d2581eda5991330060ba807a900d 3dfb863548f97a08bcf3e254b0024b805c72204d 557452b804704186bfa33cb772c7c686e5a94ec5 9594580491a385c98eb8295171850259bc27f465 a0d5809a8e5ed41712ea6939717236a06f78702d 490804ec57f9a6f3eb1b8a425443cc4a47962138 d4c8814cb62ef1339179fcbf16216563901dc58a 28d127eaf6bf17846f8a2d6a8bd658bb6cb65f0b 0a06032579213207307424e7478b92a178a9c32b 3f2752f130cc4e11372e610f2e8829798d32a1e5 020aa15049946213f4e32b4bbd791cb2687ea879 bee8a09be81242e4ee910bdc165a3a6e4b8918c6 1019d6c8b38bae8dac90770194087037c60356fa f9d51ebe3d68e30dae01509c30acf9f043b5e125 bb4f8121541b64c6e0725ba142bff97cd4bd6751 b3f463fdd42eef3431106ed7e55e0fe0d48ad35a 51b4f1d60a55d0f94835b5d6fae8f5612efda4f0 de0c447c173b7511f77f23a4f819d3fc131f720a 13aba4110d2ba119baa9159c29d0785570a8cbd9 3a7f2068 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ef:0b:a9:9d:ab:86:b4:2a:44:3a:a9:21:f2:51:44:a1:d1:26:d7:c7],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-02 06:24:31.948 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-02 06:24:31.952 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-02 06:24:31.958 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-11-02 06:24:31.959 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-02 06:24:31.967 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-11-02 06:24:31.969 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-02 06:24:31.969 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-02 06:24:31.970 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-02 06:24:31.970 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-02 06:24:31.974 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-02 06:24:31.980 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-02 06:24:31.982 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-02 06:24:31.982 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-02 06:24:31.983 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-02 06:24:32.145 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-02 06:24:32.146 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-02 06:24:32.147 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-02 06:24:32.147 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-02 06:24:32.150 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-02 06:24:32.151 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-02 06:24:32.151 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-02 06:24:32.152 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-02 06:24:32.152 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-02 06:24:32.153 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-02 06:24:32.154 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-02 06:24:32.154 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-02 06:24:32.155 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-02 06:24:32.155 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-02 06:24:32.156 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-02 06:24:32.157 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-02 06:24:32.162 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 42909093588342475197152615879451886816262916637 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 02 05:02:31 UTC 2022 Final Date: Mon Nov 01 05:02:30 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [77:10:f0:e0:bc:5b:7a:dd:ed:bc:6d:ab:c1:82:46:b8:fc:38:8a:98],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a21319266ea0d2581eda5991330060ba807a900d 3dfb863548f97a08bcf3e254b0024b805c72204d 557452b804704186bfa33cb772c7c686e5a94ec5 9594580491a385c98eb8295171850259bc27f465 a0d5809a8e5ed41712ea6939717236a06f78702d 490804ec57f9a6f3eb1b8a425443cc4a47962138 d4c8814cb62ef1339179fcbf16216563901dc58a 28d127eaf6bf17846f8a2d6a8bd658bb6cb65f0b 0a06032579213207307424e7478b92a178a9c32b 3f2752f130cc4e11372e610f2e8829798d32a1e5 020aa15049946213f4e32b4bbd791cb2687ea879 bee8a09be81242e4ee910bdc165a3a6e4b8918c6 1019d6c8b38bae8dac90770194087037c60356fa f9d51ebe3d68e30dae01509c30acf9f043b5e125 bb4f8121541b64c6e0725ba142bff97cd4bd6751 b3f463fdd42eef3431106ed7e55e0fe0d48ad35a 51b4f1d60a55d0f94835b5d6fae8f5612efda4f0 de0c447c173b7511f77f23a4f819d3fc131f720a 13aba4110d2ba119baa9159c29d0785570a8cbd9 3a7f2068 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [11:5a:b9:ae:70:29:84:63:15:c6:0e:4d:88:cd:a0:93:d3:5d:ca:f9],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-02 06:26:26.021 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-02 06:26:26.024 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-02 06:26:26.027 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-02 06:26:26.028 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-02 06:26:26.029 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-02 06:26:26.030 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-02 06:26:26.031 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-02 06:26:26.032 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-02 06:26:26.032 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-02 06:26:26.033 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-02 06:26:26.040 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-02 06:26:26.043 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-02 06:26:26.043 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-02 06:26:26.044 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-02 06:26:26.218 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-02 06:26:26.218 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-02 06:26:26.219 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-02 06:26:26.219 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-02 06:26:26.220 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-02 06:26:26.221 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-02 06:26:26.221 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-02 06:26:26.221 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-02 06:26:26.222 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-02 06:26:26.223 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-02 06:26:26.223 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-02 06:26:26.224 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-02 06:26:26.225 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-02 06:26:26.225 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-02 06:26:26.225 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-02 06:26:26.227 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-02 06:26:26.232 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 42909093588342475197152615879451886816262916637 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 02 05:02:31 UTC 2022 Final Date: Mon Nov 01 05:02:30 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [77:10:f0:e0:bc:5b:7a:dd:ed:bc:6d:ab:c1:82:46:b8:fc:38:8a:98],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a21319266ea0d2581eda5991330060ba807a900d 3dfb863548f97a08bcf3e254b0024b805c72204d 557452b804704186bfa33cb772c7c686e5a94ec5 9594580491a385c98eb8295171850259bc27f465 a0d5809a8e5ed41712ea6939717236a06f78702d 490804ec57f9a6f3eb1b8a425443cc4a47962138 d4c8814cb62ef1339179fcbf16216563901dc58a 28d127eaf6bf17846f8a2d6a8bd658bb6cb65f0b 0a06032579213207307424e7478b92a178a9c32b 3f2752f130cc4e11372e610f2e8829798d32a1e5 020aa15049946213f4e32b4bbd791cb2687ea879 bee8a09be81242e4ee910bdc165a3a6e4b8918c6 1019d6c8b38bae8dac90770194087037c60356fa f9d51ebe3d68e30dae01509c30acf9f043b5e125 bb4f8121541b64c6e0725ba142bff97cd4bd6751 b3f463fdd42eef3431106ed7e55e0fe0d48ad35a 51b4f1d60a55d0f94835b5d6fae8f5612efda4f0 de0c447c173b7511f77f23a4f819d3fc131f720a 13aba4110d2ba119baa9159c29d0785570a8cbd9 3a7f2068 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e6:4e:c5:31:97:1e:c7:3b:01:f7:b0:cc:38:c7:bb:36:37:52:6b:b4],[56:66:d1:a4] modulus: c35323dd9925a726ddf47bc211692da5ee0379f71f583f064863375362ca5a63a448c05dd49b77064b07e5d33cf49a872d8dd0d9e9675a289c7b161da0bc2c7c5a41e232717504cb93b0062472897c04d33279f8f96d787ef9e7ed8e4702415cd7eb9cef992f56aced00310b7d0124eaef50aa1adcded6a52eea0fffc249c853f7b591b148173d5a9bf418b6dd920bd73d7f3fe8330fb2fa6b86eeca40a2d75cf8444a014c212f6e378d847c441c6324611d10bb4d5c19b1d3069821469c9d79dcbbe40e40d63da9efca40fd35b6bccde10a635e6ce3ab775f50f007c3f2a032f312ad4d318e73283f82f722684f69a14a03a7a8f2d3f6027d2d8793ca386a8f public exponent: 10001 ] 2022-11-02 06:32:36.545 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-02 06:32:36.550 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-02 06:32:36.559 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-02 06:32:36.562 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-02 06:32:36.563 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-02 06:32:36.564 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-02 06:32:36.564 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-02 06:32:36.573 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-02 06:32:36.574 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-02 06:32:36.575 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-02 06:32:36.583 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-02 06:32:36.584 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-02 06:32:36.584 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-02 06:32:36.585 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-02 06:32:36.747 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-02 06:32:36.748 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-02 06:32:36.748 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-02 06:32:36.749 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-02 06:32:36.750 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-02 06:32:36.751 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-02 06:32:36.752 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-02 06:32:36.752 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-02 06:32:36.753 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-02 06:32:36.754 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-02 06:32:36.754 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-02 06:32:36.754 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-02 06:32:36.755 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-02 06:32:36.756 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-02 06:32:36.756 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-02 06:32:36.757 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-02 06:32:36.761 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 42909093588342475197152615879451886816262916637 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 02 05:02:31 UTC 2022 Final Date: Mon Nov 01 05:02:30 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [77:10:f0:e0:bc:5b:7a:dd:ed:bc:6d:ab:c1:82:46:b8:fc:38:8a:98],[56:66:d1:a4] modulus: b4da0713806fb0d083a8cacd94c45dec70290de6e355f481bf7f2198e933ddb56e6298f150767b095f560fa835ca951bdda80fddf6516c6cb4a6e8170ede664083ace44f494bbdcd4c7f6fc7388657c93637e4060b380eecfbfadc7a14d50abc0ee813055aa037b03c900dd9ff3d6f8d514274ef22cebfef68c0ed9d8d42358979409b1dd87bc38aa4ccdefa7e4006e41e7c5719036b24f4c15944c640444c481144d9a2d63ff7a9e0fef9e8e7ddd86806248d244e4d01c3543bb606ae3eac89b48e7e968827175ab72c7bceb139741b437a210f8d562b12087052b1e1313e5bcea6581f126f9521d64d1b3b63a5e0dc44db27b7f7da8dfcc9a61a6de885d26c9ba57f45990b0f478d2008577f772de4a0f6435118b78c4e21ea624e8c5cc4e243af6d2afebac137873e02c1a8830933c722eb5553d79458c598b8586a19bdde10415674310b3b13b89ba5b11f615d0a9d62abda846c6079886ec80ee73c4314cb70a921199cc80d9469d72ab79005fb73092f38ce199c3f7018a9c9b26032ab public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a21319266ea0d2581eda5991330060ba807a900d 3dfb863548f97a08bcf3e254b0024b805c72204d 557452b804704186bfa33cb772c7c686e5a94ec5 9594580491a385c98eb8295171850259bc27f465 a0d5809a8e5ed41712ea6939717236a06f78702d 490804ec57f9a6f3eb1b8a425443cc4a47962138 d4c8814cb62ef1339179fcbf16216563901dc58a 28d127eaf6bf17846f8a2d6a8bd658bb6cb65f0b 0a06032579213207307424e7478b92a178a9c32b 3f2752f130cc4e11372e610f2e8829798d32a1e5 020aa15049946213f4e32b4bbd791cb2687ea879 bee8a09be81242e4ee910bdc165a3a6e4b8918c6 1019d6c8b38bae8dac90770194087037c60356fa f9d51ebe3d68e30dae01509c30acf9f043b5e125 bb4f8121541b64c6e0725ba142bff97cd4bd6751 b3f463fdd42eef3431106ed7e55e0fe0d48ad35a 51b4f1d60a55d0f94835b5d6fae8f5612efda4f0 de0c447c173b7511f77f23a4f819d3fc131f720a 13aba4110d2ba119baa9159c29d0785570a8cbd9 3a7f2068 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b2:f6:aa:50:bc:10:71:3f:10:81:4b:79:3a:19:a3:10:79:a5:28:69],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-02 06:36:32.500 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-02 06:36:32.503 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-02 06:36:32.507 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-02 06:36:32.507 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-02 06:36:32.508 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-02 06:36:32.509 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-02 06:36:32.509 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-02 06:36:32.510 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-02 06:36:32.510 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-02 06:36:32.511 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-02 06:36:32.518 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-02 06:36:32.520 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-02 06:36:32.520 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-02 06:36:32.521 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-02 06:36:32.674 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-02 06:36:32.675 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-02 06:36:32.676 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-02 06:36:32.676 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-02 06:36:32.679 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-02 06:36:32.679 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-02 06:36:32.680 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-02 06:36:32.681 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-02 06:36:32.681 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-02 06:36:32.682 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-02 06:36:32.683 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-02 06:36:32.683 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-02 06:36:32.684 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-02 06:36:32.685 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-02 06:36:32.685 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-02 06:36:32.686 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-02 06:36:32.690 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 42909093588342475197152615879451886816262916637 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 02 05:02:31 UTC 2022 Final Date: Mon Nov 01 05:02:30 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [77:10:f0:e0:bc:5b:7a:dd:ed:bc:6d:ab:c1:82:46:b8:fc:38:8a:98],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a21319266ea0d2581eda5991330060ba807a900d 3dfb863548f97a08bcf3e254b0024b805c72204d 557452b804704186bfa33cb772c7c686e5a94ec5 9594580491a385c98eb8295171850259bc27f465 a0d5809a8e5ed41712ea6939717236a06f78702d 490804ec57f9a6f3eb1b8a425443cc4a47962138 d4c8814cb62ef1339179fcbf16216563901dc58a 28d127eaf6bf17846f8a2d6a8bd658bb6cb65f0b 0a06032579213207307424e7478b92a178a9c32b 3f2752f130cc4e11372e610f2e8829798d32a1e5 020aa15049946213f4e32b4bbd791cb2687ea879 bee8a09be81242e4ee910bdc165a3a6e4b8918c6 1019d6c8b38bae8dac90770194087037c60356fa f9d51ebe3d68e30dae01509c30acf9f043b5e125 bb4f8121541b64c6e0725ba142bff97cd4bd6751 b3f463fdd42eef3431106ed7e55e0fe0d48ad35a 51b4f1d60a55d0f94835b5d6fae8f5612efda4f0 de0c447c173b7511f77f23a4f819d3fc131f720a 13aba4110d2ba119baa9159c29d0785570a8cbd9 3a7f2068 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8d:b5:36:5c:52:83:b8:d3:ac:7d:b7:7e:8d:8c:14:21:f6:a5:b8:a2],[56:66:d1:a4] modulus: c12d34ebbd9fe2d5757a1533268e7d93057de26a83adbc30cd2683b819f5ec07654fe039fa40700a12f9e862250746c0a7a09895d32042527f0c219d2de9b79e847ceadd782742f7053f0adc3f398fcd84e566c2217149b6b8e0166472f6954e5c37d52e443f6e5bdd52a4971b0b225fd865482e7ef1f3c490da01d13ae230f3fbaf58ff5a1719f699379a6a6bec9104dd6e8c6dd9c9335c0818ea9967e67aa6ffe9453e2f4286b55adc4fc637c8037ac6f7f3c8c30f18941123f6cd60c82b2abfa84d0526267ec80bc9b9bdfcd3a91910731e5c29ab737e2f8680b435d6ff36cf3c5c572a55bafdd03a54262bb96856ec3c5bcf18ff23d9ea6529a5d86b4eeb public exponent: 10001 ] 2022-11-02 06:42:33.342 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-02 06:42:33.345 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-02 06:42:33.348 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-11-02 06:42:33.349 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-02 06:42:33.350 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-11-02 06:42:33.350 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-02 06:42:33.351 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-02 06:42:33.351 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-02 06:42:33.352 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-02 06:42:33.353 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-02 06:42:33.357 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-02 06:42:33.358 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-02 06:42:33.359 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-02 06:42:33.359 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-02 06:42:33.564 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-02 06:42:33.565 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-02 06:42:33.565 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-02 06:42:33.566 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-02 06:42:33.567 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-02 06:42:33.568 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-02 06:42:33.568 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-02 06:42:33.569 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-02 06:42:33.569 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-02 06:42:33.571 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-02 06:42:33.571 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-02 06:42:33.571 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-02 06:42:33.572 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-02 06:42:33.573 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-02 06:42:33.573 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-02 06:42:33.574 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-02 06:42:33.577 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 42909093588342475197152615879451886816262916637 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 02 05:02:31 UTC 2022 Final Date: Mon Nov 01 05:02:30 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [77:10:f0:e0:bc:5b:7a:dd:ed:bc:6d:ab:c1:82:46:b8:fc:38:8a:98],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a21319266ea0d2581eda5991330060ba807a900d 3dfb863548f97a08bcf3e254b0024b805c72204d 557452b804704186bfa33cb772c7c686e5a94ec5 9594580491a385c98eb8295171850259bc27f465 a0d5809a8e5ed41712ea6939717236a06f78702d 490804ec57f9a6f3eb1b8a425443cc4a47962138 d4c8814cb62ef1339179fcbf16216563901dc58a 28d127eaf6bf17846f8a2d6a8bd658bb6cb65f0b 0a06032579213207307424e7478b92a178a9c32b 3f2752f130cc4e11372e610f2e8829798d32a1e5 020aa15049946213f4e32b4bbd791cb2687ea879 bee8a09be81242e4ee910bdc165a3a6e4b8918c6 1019d6c8b38bae8dac90770194087037c60356fa f9d51ebe3d68e30dae01509c30acf9f043b5e125 bb4f8121541b64c6e0725ba142bff97cd4bd6751 b3f463fdd42eef3431106ed7e55e0fe0d48ad35a 51b4f1d60a55d0f94835b5d6fae8f5612efda4f0 de0c447c173b7511f77f23a4f819d3fc131f720a 13aba4110d2ba119baa9159c29d0785570a8cbd9 3a7f2068 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c7:d8:13:1a:87:16:33:e7:b5:fe:27:ac:b8:ff:3d:bf:73:51:e1:28],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-02 06:47:48.915 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-02 06:47:48.923 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-02 06:47:48.934 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-02 06:47:48.935 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-02 06:47:48.936 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-02 06:47:48.937 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-02 06:47:48.938 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-02 06:47:48.939 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-02 06:47:48.940 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-02 06:47:48.940 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-02 06:47:48.945 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-02 06:47:48.946 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-02 06:47:48.946 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-02 06:47:48.947 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-02 06:47:49.122 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-02 06:47:49.123 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-02 06:47:49.124 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-02 06:47:49.124 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-02 06:47:49.126 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-02 06:47:49.126 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-02 06:47:49.127 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-02 06:47:49.127 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-02 06:47:49.128 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-02 06:47:49.128 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-02 06:47:49.129 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-02 06:47:49.129 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-02 06:47:49.130 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-02 06:47:49.131 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-02 06:47:49.131 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-02 06:47:49.132 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-02 06:47:49.137 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 42909093588342475197152615879451886816262916637 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 02 05:02:31 UTC 2022 Final Date: Mon Nov 01 05:02:30 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [77:10:f0:e0:bc:5b:7a:dd:ed:bc:6d:ab:c1:82:46:b8:fc:38:8a:98],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a21319266ea0d2581eda5991330060ba807a900d 3dfb863548f97a08bcf3e254b0024b805c72204d 557452b804704186bfa33cb772c7c686e5a94ec5 9594580491a385c98eb8295171850259bc27f465 a0d5809a8e5ed41712ea6939717236a06f78702d 490804ec57f9a6f3eb1b8a425443cc4a47962138 d4c8814cb62ef1339179fcbf16216563901dc58a 28d127eaf6bf17846f8a2d6a8bd658bb6cb65f0b 0a06032579213207307424e7478b92a178a9c32b 3f2752f130cc4e11372e610f2e8829798d32a1e5 020aa15049946213f4e32b4bbd791cb2687ea879 bee8a09be81242e4ee910bdc165a3a6e4b8918c6 1019d6c8b38bae8dac90770194087037c60356fa f9d51ebe3d68e30dae01509c30acf9f043b5e125 bb4f8121541b64c6e0725ba142bff97cd4bd6751 b3f463fdd42eef3431106ed7e55e0fe0d48ad35a 51b4f1d60a55d0f94835b5d6fae8f5612efda4f0 de0c447c173b7511f77f23a4f819d3fc131f720a 13aba4110d2ba119baa9159c29d0785570a8cbd9 3a7f2068 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c9:d8:8d:ae:d8:ac:4c:5d:c1:db:d5:05:43:3c:96:b1:b7:a5:eb:aa],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-02 06:48:03.956 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-02 06:48:03.958 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-02 06:48:03.960 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-02 06:48:03.961 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-02 06:48:03.962 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-02 06:48:03.963 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-02 06:48:03.963 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-02 06:48:03.964 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-02 06:48:03.964 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-02 06:48:03.964 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-02 06:48:03.971 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-02 06:48:03.972 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-02 06:48:03.972 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-02 06:48:03.972 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-02 06:48:04.090 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-02 06:48:04.091 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-02 06:48:04.091 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-02 06:48:04.092 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-02 06:48:04.094 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-02 06:48:04.094 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-02 06:48:04.095 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-02 06:48:04.095 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-02 06:48:04.095 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-02 06:48:04.097 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-02 06:48:04.097 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-02 06:48:04.097 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-02 06:48:04.098 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-02 06:48:04.099 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-02 06:48:04.099 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-02 06:48:04.100 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-02 06:48:04.103 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 42909093588342475197152615879451886816262916637 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 02 05:02:31 UTC 2022 Final Date: Mon Nov 01 05:02:30 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [77:10:f0:e0:bc:5b:7a:dd:ed:bc:6d:ab:c1:82:46:b8:fc:38:8a:98],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a21319266ea0d2581eda5991330060ba807a900d 3dfb863548f97a08bcf3e254b0024b805c72204d 557452b804704186bfa33cb772c7c686e5a94ec5 9594580491a385c98eb8295171850259bc27f465 a0d5809a8e5ed41712ea6939717236a06f78702d 490804ec57f9a6f3eb1b8a425443cc4a47962138 d4c8814cb62ef1339179fcbf16216563901dc58a 28d127eaf6bf17846f8a2d6a8bd658bb6cb65f0b 0a06032579213207307424e7478b92a178a9c32b 3f2752f130cc4e11372e610f2e8829798d32a1e5 020aa15049946213f4e32b4bbd791cb2687ea879 bee8a09be81242e4ee910bdc165a3a6e4b8918c6 1019d6c8b38bae8dac90770194087037c60356fa f9d51ebe3d68e30dae01509c30acf9f043b5e125 bb4f8121541b64c6e0725ba142bff97cd4bd6751 b3f463fdd42eef3431106ed7e55e0fe0d48ad35a 51b4f1d60a55d0f94835b5d6fae8f5612efda4f0 de0c447c173b7511f77f23a4f819d3fc131f720a 13aba4110d2ba119baa9159c29d0785570a8cbd9 3a7f2068 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [da:83:ec:be:a5:6f:32:3a:93:a5:7c:5a:83:1a:2f:ed:42:18:b8:43],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-02 07:07:35.535 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-02 07:07:35.538 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-02 07:07:35.541 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-02 07:07:35.542 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-02 07:07:35.543 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-02 07:07:35.543 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-02 07:07:35.544 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-02 07:07:35.544 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-02 07:07:35.545 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-02 07:07:35.545 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-02 07:07:35.552 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-02 07:07:35.553 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-02 07:07:35.553 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-02 07:07:35.554 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-02 07:07:35.713 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-02 07:07:35.714 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-02 07:07:35.714 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-02 07:07:35.715 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-02 07:07:35.717 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-02 07:07:35.717 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-02 07:07:35.718 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-02 07:07:35.718 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-02 07:07:35.718 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-02 07:07:35.719 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-02 07:07:35.720 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-02 07:07:35.722 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-02 07:07:35.723 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-02 07:07:35.724 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-02 07:07:35.724 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-02 07:07:35.725 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-02 07:07:35.730 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 42909093588342475197152615879451886816262916637 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 02 05:02:31 UTC 2022 Final Date: Mon Nov 01 05:02:30 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [77:10:f0:e0:bc:5b:7a:dd:ed:bc:6d:ab:c1:82:46:b8:fc:38:8a:98],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a21319266ea0d2581eda5991330060ba807a900d 3dfb863548f97a08bcf3e254b0024b805c72204d 557452b804704186bfa33cb772c7c686e5a94ec5 9594580491a385c98eb8295171850259bc27f465 a0d5809a8e5ed41712ea6939717236a06f78702d 490804ec57f9a6f3eb1b8a425443cc4a47962138 d4c8814cb62ef1339179fcbf16216563901dc58a 28d127eaf6bf17846f8a2d6a8bd658bb6cb65f0b 0a06032579213207307424e7478b92a178a9c32b 3f2752f130cc4e11372e610f2e8829798d32a1e5 020aa15049946213f4e32b4bbd791cb2687ea879 bee8a09be81242e4ee910bdc165a3a6e4b8918c6 1019d6c8b38bae8dac90770194087037c60356fa f9d51ebe3d68e30dae01509c30acf9f043b5e125 bb4f8121541b64c6e0725ba142bff97cd4bd6751 b3f463fdd42eef3431106ed7e55e0fe0d48ad35a 51b4f1d60a55d0f94835b5d6fae8f5612efda4f0 de0c447c173b7511f77f23a4f819d3fc131f720a 13aba4110d2ba119baa9159c29d0785570a8cbd9 3a7f2068 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [bb:e0:76:e7:39:a7:9d:80:45:05:bc:d7:34:9d:b7:3b:5f:36:49:14],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-02 07:07:42.090 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-02 07:07:42.091 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-02 07:07:42.093 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-02 07:07:42.094 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-02 07:07:42.094 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-02 07:07:42.095 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-02 07:07:42.095 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-02 07:07:42.096 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-02 07:07:42.096 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-02 07:07:42.097 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-02 07:07:42.103 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-02 07:07:42.111 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-02 07:07:42.112 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-02 07:07:42.112 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-02 07:07:42.246 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-02 07:07:42.247 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-02 07:07:42.247 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-02 07:07:42.247 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-02 07:07:42.249 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-02 07:07:42.249 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-02 07:07:42.250 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-02 07:07:42.250 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-02 07:07:42.251 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-02 07:07:42.252 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-02 07:07:42.252 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-02 07:07:42.252 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-02 07:07:42.253 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-02 07:07:42.254 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-02 07:07:42.254 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-02 07:07:42.255 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-02 07:07:42.259 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 42909093588342475197152615879451886816262916637 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 02 05:02:31 UTC 2022 Final Date: Mon Nov 01 05:02:30 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [77:10:f0:e0:bc:5b:7a:dd:ed:bc:6d:ab:c1:82:46:b8:fc:38:8a:98],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a21319266ea0d2581eda5991330060ba807a900d 3dfb863548f97a08bcf3e254b0024b805c72204d 557452b804704186bfa33cb772c7c686e5a94ec5 9594580491a385c98eb8295171850259bc27f465 a0d5809a8e5ed41712ea6939717236a06f78702d 490804ec57f9a6f3eb1b8a425443cc4a47962138 d4c8814cb62ef1339179fcbf16216563901dc58a 28d127eaf6bf17846f8a2d6a8bd658bb6cb65f0b 0a06032579213207307424e7478b92a178a9c32b 3f2752f130cc4e11372e610f2e8829798d32a1e5 020aa15049946213f4e32b4bbd791cb2687ea879 bee8a09be81242e4ee910bdc165a3a6e4b8918c6 1019d6c8b38bae8dac90770194087037c60356fa f9d51ebe3d68e30dae01509c30acf9f043b5e125 bb4f8121541b64c6e0725ba142bff97cd4bd6751 b3f463fdd42eef3431106ed7e55e0fe0d48ad35a 51b4f1d60a55d0f94835b5d6fae8f5612efda4f0 de0c447c173b7511f77f23a4f819d3fc131f720a 13aba4110d2ba119baa9159c29d0785570a8cbd9 3a7f2068 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8d:ba:e6:b4:50:b2:b1:37:f6:aa:f8:10:7d:94:9c:8d:04:98:1b:0a],[56:66:d1:a4] modulus: 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 public exponent: 10001 ]