By type
2022-11-03 04:54:47,920 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-11-03 04:54:49,071 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-11-03 04:54:49.896 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Nov 03, 2022 4:54:52 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Nov 03, 2022 4:54:52 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Nov 03, 2022 4:54:52 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Nov 03, 2022 4:54:52 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-11-03 04:54:53.174 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-11-03 04:54:53.504 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-11-03 04:54:53.707 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-11-03 04:54:54.650 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-11-03 04:54:54.655 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-11-03 04:54:54.657 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-11-03 04:54:54.662 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-11-03 04:54:54.711 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-11-03 04:54:54.717 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-11-03 04:54:54.866 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-11-03 04:54:55.747 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Nov 03, 2022 4:54:56 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-11-03 04:54:57.018 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 10.182 seconds (JVM running for 12.182) Nov 03, 2022 4:55:19 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-11-03 04:55:46.020 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-03 04:55:46.026 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-03 04:55:46.072 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-11-03 04:55:46.077 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-03 04:55:46.104 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-11-03 04:55:46.107 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-03 04:55:46.108 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-03 04:55:46.109 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-03 04:55:46.110 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-03 04:55:46.114 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-03 04:55:46.123 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-03 04:55:46.127 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-03 04:55:46.178 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-03 04:55:46.184 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-03 04:55:46.185 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-03 04:55:46.188 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-03 04:55:46.805 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-03 04:55:46.808 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-03 04:55:46.808 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-03 04:55:46.810 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-03 04:55:46.821 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-03 04:55:46.823 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-03 04:55:46.824 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-03 04:55:46.825 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-03 04:55:46.825 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-03 04:55:46.848 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-03 04:55:46.849 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-03 04:55:46.850 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-03 04:55:46.858 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-03 04:55:46.859 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-03 04:55:46.860 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-03 04:55:46.863 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-03 04:55:46.911 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 8417012875567550026241547682768134288645821280 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 03 04:50:30 UTC 2022 Final Date: Tue Nov 02 04:50:29 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [77:e5:86:da:c5:59:eb:30:e8:bc:83:24:52:61:37:be:0e:8c:4a:4c],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2f807a32710523ab379e89735ad30ac15886c4ce 03f823504808ae88e563a6d927e4356f30a00cfe 716c7fc15df7171cb3797c4f600686765f5b5e5a 4de9c5ee1653dbf65a896c2142c9e4dc2d15621a 6545cfd1873133c23d559d325a8ddd027a693871 044b5cba2d85bec279498e3fa00c8899455b817b 2f249b35516806ef73c8644383126f3d5e94475b d2fcd11762926bb38ce28016e3c7638903b8906a 94977841e3a33b377bca7d1c068e0d9f4905dc38 32a96b53175c31368c92ae33f3b4760973ff1556 3dc8078091ad36f436305706d6e1f54c14821297 c3ba782ac3b155d6134a52ca4d70ef8e5cf6c677 18d6969e3108b5f6740ab9f67df5efaf0ca01b52 490abae4260ca10b5219e2467de1de1a1efd7a21 e663695fbe3df510c19ea062d67be22f718f8e1a fae2217d4b0b52290c5449612374ffbf57ffc747 68805b8714bdd9ed39ad9e5c580eb85040890459 7198011d2962e7c99189d5785662c2cdb84a8fd7 520ec80f963592f4e1390fb5aab6d51e29c8cbcf 21883887 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b0:80:e0:5a:64:f3:b8:72:8e:48:cb:11:9c:44:ab:8f:a2:91:98:27],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-03 06:03:02.587 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-03 06:03:02.591 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-03 06:03:02.596 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-03 06:03:02.598 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-03 06:03:02.599 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-03 06:03:02.600 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-03 06:03:02.601 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-03 06:03:02.602 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-03 06:03:02.602 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-03 06:03:02.603 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-03 06:03:02.608 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-03 06:03:02.610 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-03 06:03:02.610 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-03 06:03:02.611 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-03 06:03:02.852 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-03 06:03:02.853 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-03 06:03:02.854 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-03 06:03:02.854 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-03 06:03:02.858 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-03 06:03:02.859 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-03 06:03:02.860 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-03 06:03:02.860 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-03 06:03:02.861 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-03 06:03:02.863 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-03 06:03:02.863 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-03 06:03:02.864 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-03 06:03:02.865 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-03 06:03:02.866 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-03 06:03:02.866 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-03 06:03:02.868 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-03 06:03:02.874 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 8417012875567550026241547682768134288645821280 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 03 04:50:30 UTC 2022 Final Date: Tue Nov 02 04:50:29 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [77:e5:86:da:c5:59:eb:30:e8:bc:83:24:52:61:37:be:0e:8c:4a:4c],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2f807a32710523ab379e89735ad30ac15886c4ce 03f823504808ae88e563a6d927e4356f30a00cfe 716c7fc15df7171cb3797c4f600686765f5b5e5a 4de9c5ee1653dbf65a896c2142c9e4dc2d15621a 6545cfd1873133c23d559d325a8ddd027a693871 044b5cba2d85bec279498e3fa00c8899455b817b 2f249b35516806ef73c8644383126f3d5e94475b d2fcd11762926bb38ce28016e3c7638903b8906a 94977841e3a33b377bca7d1c068e0d9f4905dc38 32a96b53175c31368c92ae33f3b4760973ff1556 3dc8078091ad36f436305706d6e1f54c14821297 c3ba782ac3b155d6134a52ca4d70ef8e5cf6c677 18d6969e3108b5f6740ab9f67df5efaf0ca01b52 490abae4260ca10b5219e2467de1de1a1efd7a21 e663695fbe3df510c19ea062d67be22f718f8e1a fae2217d4b0b52290c5449612374ffbf57ffc747 68805b8714bdd9ed39ad9e5c580eb85040890459 7198011d2962e7c99189d5785662c2cdb84a8fd7 520ec80f963592f4e1390fb5aab6d51e29c8cbcf 21883887 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a1:a5:b0:df:63:7e:46:67:88:96:93:d1:1d:62:89:b9:d1:b3:b6:1b],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-03 06:04:50.372 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-03 06:04:50.374 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-03 06:04:50.375 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-11-03 06:04:50.376 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-03 06:04:50.377 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-11-03 06:04:50.377 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-03 06:04:50.378 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-03 06:04:50.378 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-03 06:04:50.379 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-03 06:04:50.380 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-03 06:04:50.390 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-03 06:04:50.392 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-03 06:04:50.392 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-03 06:04:50.392 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-03 06:04:50.542 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-03 06:04:50.543 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-03 06:04:50.543 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-03 06:04:50.544 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-03 06:04:50.551 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-03 06:04:50.552 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-03 06:04:50.553 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-03 06:04:50.553 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-03 06:04:50.554 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-03 06:04:50.555 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-03 06:04:50.555 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-03 06:04:50.555 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-03 06:04:50.556 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-03 06:04:50.556 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-03 06:04:50.557 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-03 06:04:50.558 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-03 06:04:50.562 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 8417012875567550026241547682768134288645821280 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 03 04:50:30 UTC 2022 Final Date: Tue Nov 02 04:50:29 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [77:e5:86:da:c5:59:eb:30:e8:bc:83:24:52:61:37:be:0e:8c:4a:4c],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2f807a32710523ab379e89735ad30ac15886c4ce 03f823504808ae88e563a6d927e4356f30a00cfe 716c7fc15df7171cb3797c4f600686765f5b5e5a 4de9c5ee1653dbf65a896c2142c9e4dc2d15621a 6545cfd1873133c23d559d325a8ddd027a693871 044b5cba2d85bec279498e3fa00c8899455b817b 2f249b35516806ef73c8644383126f3d5e94475b d2fcd11762926bb38ce28016e3c7638903b8906a 94977841e3a33b377bca7d1c068e0d9f4905dc38 32a96b53175c31368c92ae33f3b4760973ff1556 3dc8078091ad36f436305706d6e1f54c14821297 c3ba782ac3b155d6134a52ca4d70ef8e5cf6c677 18d6969e3108b5f6740ab9f67df5efaf0ca01b52 490abae4260ca10b5219e2467de1de1a1efd7a21 e663695fbe3df510c19ea062d67be22f718f8e1a fae2217d4b0b52290c5449612374ffbf57ffc747 68805b8714bdd9ed39ad9e5c580eb85040890459 7198011d2962e7c99189d5785662c2cdb84a8fd7 520ec80f963592f4e1390fb5aab6d51e29c8cbcf 21883887 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4b:08:80:80:6d:2a:d2:87:c6:9c:62:62:64:21:2a:2a:3d:b0:c8:2a],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-03 06:05:50.571 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-03 06:05:50.572 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-03 06:05:50.574 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-11-03 06:05:50.575 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-03 06:05:50.575 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-11-03 06:05:50.576 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-03 06:05:50.576 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-03 06:05:50.576 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-03 06:05:50.577 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-03 06:05:50.577 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-03 06:05:50.581 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-03 06:05:50.581 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-03 06:05:50.582 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-03 06:05:50.583 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-03 06:05:50.741 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-03 06:05:50.742 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-03 06:05:50.743 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-03 06:05:50.743 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-03 06:05:50.746 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-03 06:05:50.747 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-03 06:05:50.748 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-03 06:05:50.749 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-03 06:05:50.749 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-03 06:05:50.751 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-03 06:05:50.751 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-03 06:05:50.752 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-03 06:05:50.753 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-03 06:05:50.754 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-03 06:05:50.755 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-03 06:05:50.756 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-03 06:05:50.761 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 8417012875567550026241547682768134288645821280 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 03 04:50:30 UTC 2022 Final Date: Tue Nov 02 04:50:29 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [77:e5:86:da:c5:59:eb:30:e8:bc:83:24:52:61:37:be:0e:8c:4a:4c],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2f807a32710523ab379e89735ad30ac15886c4ce 03f823504808ae88e563a6d927e4356f30a00cfe 716c7fc15df7171cb3797c4f600686765f5b5e5a 4de9c5ee1653dbf65a896c2142c9e4dc2d15621a 6545cfd1873133c23d559d325a8ddd027a693871 044b5cba2d85bec279498e3fa00c8899455b817b 2f249b35516806ef73c8644383126f3d5e94475b d2fcd11762926bb38ce28016e3c7638903b8906a 94977841e3a33b377bca7d1c068e0d9f4905dc38 32a96b53175c31368c92ae33f3b4760973ff1556 3dc8078091ad36f436305706d6e1f54c14821297 c3ba782ac3b155d6134a52ca4d70ef8e5cf6c677 18d6969e3108b5f6740ab9f67df5efaf0ca01b52 490abae4260ca10b5219e2467de1de1a1efd7a21 e663695fbe3df510c19ea062d67be22f718f8e1a fae2217d4b0b52290c5449612374ffbf57ffc747 68805b8714bdd9ed39ad9e5c580eb85040890459 7198011d2962e7c99189d5785662c2cdb84a8fd7 520ec80f963592f4e1390fb5aab6d51e29c8cbcf 21883887 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [74:d2:16:9d:5e:5e:4a:c0:70:e8:e4:d7:03:3f:41:b0:6e:0d:fc:05],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-03 06:07:59.218 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-03 06:07:59.221 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-03 06:07:59.223 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-03 06:07:59.225 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-03 06:07:59.225 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-03 06:07:59.226 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-03 06:07:59.227 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-03 06:07:59.227 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-03 06:07:59.228 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-03 06:07:59.229 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-03 06:07:59.237 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-03 06:07:59.239 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-03 06:07:59.241 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-03 06:07:59.242 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-03 06:08:00.253 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-03 06:08:00.254 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-03 06:08:00.255 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-03 06:08:00.255 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-03 06:08:00.257 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-03 06:08:00.258 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-03 06:08:00.258 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-03 06:08:00.259 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-03 06:08:00.259 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-03 06:08:00.261 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-03 06:08:00.261 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-03 06:08:00.262 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-03 06:08:00.263 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-03 06:08:00.263 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-03 06:08:00.264 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-03 06:08:00.265 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-03 06:08:00.269 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 8417012875567550026241547682768134288645821280 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 03 04:50:30 UTC 2022 Final Date: Tue Nov 02 04:50:29 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [77:e5:86:da:c5:59:eb:30:e8:bc:83:24:52:61:37:be:0e:8c:4a:4c],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2f807a32710523ab379e89735ad30ac15886c4ce 03f823504808ae88e563a6d927e4356f30a00cfe 716c7fc15df7171cb3797c4f600686765f5b5e5a 4de9c5ee1653dbf65a896c2142c9e4dc2d15621a 6545cfd1873133c23d559d325a8ddd027a693871 044b5cba2d85bec279498e3fa00c8899455b817b 2f249b35516806ef73c8644383126f3d5e94475b d2fcd11762926bb38ce28016e3c7638903b8906a 94977841e3a33b377bca7d1c068e0d9f4905dc38 32a96b53175c31368c92ae33f3b4760973ff1556 3dc8078091ad36f436305706d6e1f54c14821297 c3ba782ac3b155d6134a52ca4d70ef8e5cf6c677 18d6969e3108b5f6740ab9f67df5efaf0ca01b52 490abae4260ca10b5219e2467de1de1a1efd7a21 e663695fbe3df510c19ea062d67be22f718f8e1a fae2217d4b0b52290c5449612374ffbf57ffc747 68805b8714bdd9ed39ad9e5c580eb85040890459 7198011d2962e7c99189d5785662c2cdb84a8fd7 520ec80f963592f4e1390fb5aab6d51e29c8cbcf 21883887 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8b:94:33:d3:e3:cd:e3:39:5d:76:3c:b6:d5:35:ab:98:da:90:d8:ca],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-03 06:22:04.873 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-03 06:22:04.876 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-03 06:22:04.879 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-11-03 06:22:04.880 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-03 06:22:04.880 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-11-03 06:22:04.881 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-03 06:22:04.882 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-03 06:22:04.882 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-03 06:22:04.883 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-03 06:22:04.883 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-03 06:22:04.891 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-03 06:22:04.892 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-03 06:22:04.892 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-03 06:22:04.893 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-03 06:22:05.051 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-03 06:22:05.052 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-03 06:22:05.052 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-03 06:22:05.053 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-03 06:22:05.055 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-03 06:22:05.055 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-03 06:22:05.056 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-03 06:22:05.057 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-03 06:22:05.057 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-03 06:22:05.058 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-03 06:22:05.059 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-03 06:22:05.059 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-03 06:22:05.060 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-03 06:22:05.061 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-03 06:22:05.061 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-03 06:22:05.062 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-03 06:22:05.067 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 8417012875567550026241547682768134288645821280 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 03 04:50:30 UTC 2022 Final Date: Tue Nov 02 04:50:29 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [77:e5:86:da:c5:59:eb:30:e8:bc:83:24:52:61:37:be:0e:8c:4a:4c],[56:66:d1:a4] modulus: a98a481c571972238b0a33db0110acd28066ef8c36abc7fb55f0d4e2003b2d69f674470a5925f32024f39c1a16296379d59226d0875194803272d640c5aaaf0c129b723a5e44aa314020cb8f7e1f771d5b4753184fe7c63f0d2903874f586680e5d21849655fbf50502c1e3a1b4367dc77dd0f6802bef12bb5940ae12f40adb3710452888952440630a25ad1c903e890974ac132470f20fb83f335b831786f5df9b662d46abec565b7dac748fe8f245216aadf4090be1f95e2497be88c239e62384a8e86085ebb7eab5c5e5f95879436fd2bf427c12579dc74de6f2f558995941caef899c45f0edf27b46a2c97ae83cfed9b72987e3250788ef885586d3e8721fd84c11ede79c2b5346f6152f800726f49780fbe9ffdb1e44b27526ca3048afd0d62f20dc43297b6967c9bf54ca050e19f1f66fda50d5e0549b1118f726c863f2134293284fd16883e87b3f51a1ab4daf22316658bea3f39e9efa1e2ef89c0caaede612836d5af14d883d34099a87d6aa61b78cf7f96ff48742aa45447452281 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2f807a32710523ab379e89735ad30ac15886c4ce 03f823504808ae88e563a6d927e4356f30a00cfe 716c7fc15df7171cb3797c4f600686765f5b5e5a 4de9c5ee1653dbf65a896c2142c9e4dc2d15621a 6545cfd1873133c23d559d325a8ddd027a693871 044b5cba2d85bec279498e3fa00c8899455b817b 2f249b35516806ef73c8644383126f3d5e94475b d2fcd11762926bb38ce28016e3c7638903b8906a 94977841e3a33b377bca7d1c068e0d9f4905dc38 32a96b53175c31368c92ae33f3b4760973ff1556 3dc8078091ad36f436305706d6e1f54c14821297 c3ba782ac3b155d6134a52ca4d70ef8e5cf6c677 18d6969e3108b5f6740ab9f67df5efaf0ca01b52 490abae4260ca10b5219e2467de1de1a1efd7a21 e663695fbe3df510c19ea062d67be22f718f8e1a fae2217d4b0b52290c5449612374ffbf57ffc747 68805b8714bdd9ed39ad9e5c580eb85040890459 7198011d2962e7c99189d5785662c2cdb84a8fd7 520ec80f963592f4e1390fb5aab6d51e29c8cbcf 21883887 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [73:e2:57:fe:1d:5a:f8:7c:4f:b4:b0:c9:8a:96:fa:fa:f0:b4:a9:af],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-03 06:27:24.236 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-03 06:27:24.239 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-03 06:27:24.243 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-03 06:27:24.245 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-03 06:27:24.246 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-03 06:27:24.247 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-03 06:27:24.247 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-03 06:27:24.248 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-03 06:27:24.248 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-03 06:27:24.249 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-03 06:27:24.256 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-03 06:27:24.258 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-03 06:27:24.258 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-03 06:27:24.259 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-03 06:27:24.401 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-03 06:27:24.402 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-03 06:27:24.402 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-03 06:27:24.403 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-03 06:27:24.405 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-03 06:27:24.406 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-03 06:27:24.406 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-03 06:27:24.407 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-03 06:27:24.407 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-03 06:27:24.408 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-03 06:27:24.409 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-03 06:27:24.409 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-03 06:27:24.410 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-03 06:27:24.410 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-03 06:27:24.411 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-03 06:27:24.412 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-03 06:27:24.418 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 8417012875567550026241547682768134288645821280 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 03 04:50:30 UTC 2022 Final Date: Tue Nov 02 04:50:29 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [77:e5:86:da:c5:59:eb:30:e8:bc:83:24:52:61:37:be:0e:8c:4a:4c],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2f807a32710523ab379e89735ad30ac15886c4ce 03f823504808ae88e563a6d927e4356f30a00cfe 716c7fc15df7171cb3797c4f600686765f5b5e5a 4de9c5ee1653dbf65a896c2142c9e4dc2d15621a 6545cfd1873133c23d559d325a8ddd027a693871 044b5cba2d85bec279498e3fa00c8899455b817b 2f249b35516806ef73c8644383126f3d5e94475b d2fcd11762926bb38ce28016e3c7638903b8906a 94977841e3a33b377bca7d1c068e0d9f4905dc38 32a96b53175c31368c92ae33f3b4760973ff1556 3dc8078091ad36f436305706d6e1f54c14821297 c3ba782ac3b155d6134a52ca4d70ef8e5cf6c677 18d6969e3108b5f6740ab9f67df5efaf0ca01b52 490abae4260ca10b5219e2467de1de1a1efd7a21 e663695fbe3df510c19ea062d67be22f718f8e1a fae2217d4b0b52290c5449612374ffbf57ffc747 68805b8714bdd9ed39ad9e5c580eb85040890459 7198011d2962e7c99189d5785662c2cdb84a8fd7 520ec80f963592f4e1390fb5aab6d51e29c8cbcf 21883887 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f4:6d:6a:2d:1e:5e:8f:d1:e8:0d:4a:21:be:f7:7f:1e:52:c8:b9:53],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-03 06:27:43.568 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-03 06:27:43.569 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-03 06:27:43.570 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-03 06:27:43.572 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-03 06:27:43.572 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-03 06:27:43.573 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-03 06:27:43.573 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-03 06:27:43.574 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-03 06:27:43.574 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-03 06:27:43.574 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-03 06:27:43.578 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-03 06:27:43.579 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-03 06:27:43.579 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-03 06:27:43.579 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-03 06:27:43.768 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-03 06:27:43.768 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-03 06:27:43.769 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-03 06:27:43.770 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-03 06:27:43.771 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-03 06:27:43.772 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-03 06:27:43.772 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-03 06:27:43.772 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-03 06:27:43.773 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-03 06:27:43.773 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-03 06:27:43.774 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-03 06:27:43.774 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-03 06:27:43.775 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-03 06:27:43.775 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-03 06:27:43.776 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-03 06:27:43.777 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-03 06:27:43.780 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 8417012875567550026241547682768134288645821280 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 03 04:50:30 UTC 2022 Final Date: Tue Nov 02 04:50:29 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [77:e5:86:da:c5:59:eb:30:e8:bc:83:24:52:61:37:be:0e:8c:4a:4c],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2f807a32710523ab379e89735ad30ac15886c4ce 03f823504808ae88e563a6d927e4356f30a00cfe 716c7fc15df7171cb3797c4f600686765f5b5e5a 4de9c5ee1653dbf65a896c2142c9e4dc2d15621a 6545cfd1873133c23d559d325a8ddd027a693871 044b5cba2d85bec279498e3fa00c8899455b817b 2f249b35516806ef73c8644383126f3d5e94475b d2fcd11762926bb38ce28016e3c7638903b8906a 94977841e3a33b377bca7d1c068e0d9f4905dc38 32a96b53175c31368c92ae33f3b4760973ff1556 3dc8078091ad36f436305706d6e1f54c14821297 c3ba782ac3b155d6134a52ca4d70ef8e5cf6c677 18d6969e3108b5f6740ab9f67df5efaf0ca01b52 490abae4260ca10b5219e2467de1de1a1efd7a21 e663695fbe3df510c19ea062d67be22f718f8e1a fae2217d4b0b52290c5449612374ffbf57ffc747 68805b8714bdd9ed39ad9e5c580eb85040890459 7198011d2962e7c99189d5785662c2cdb84a8fd7 520ec80f963592f4e1390fb5aab6d51e29c8cbcf 21883887 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [39:db:59:2a:92:bf:2c:fc:0b:09:c7:f4:38:6b:86:3b:c4:00:d7:3f],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-03 06:46:37.944 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-03 06:46:37.947 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-03 06:46:37.950 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-03 06:46:37.951 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-03 06:46:37.952 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-03 06:46:37.953 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-03 06:46:37.954 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-03 06:46:37.954 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-03 06:46:37.955 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-03 06:46:37.955 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-03 06:46:37.962 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-03 06:46:37.963 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-03 06:46:37.963 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-03 06:46:37.964 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-03 06:46:38.133 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-03 06:46:38.134 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-03 06:46:38.135 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-03 06:46:38.135 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-03 06:46:38.136 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-03 06:46:38.137 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-03 06:46:38.137 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-03 06:46:38.138 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-03 06:46:38.138 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-03 06:46:38.139 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-03 06:46:38.139 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-03 06:46:38.139 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-03 06:46:38.140 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-03 06:46:38.140 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-03 06:46:38.140 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-03 06:46:38.141 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-03 06:46:38.145 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 8417012875567550026241547682768134288645821280 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 03 04:50:30 UTC 2022 Final Date: Tue Nov 02 04:50:29 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [77:e5:86:da:c5:59:eb:30:e8:bc:83:24:52:61:37:be:0e:8c:4a:4c],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2f807a32710523ab379e89735ad30ac15886c4ce 03f823504808ae88e563a6d927e4356f30a00cfe 716c7fc15df7171cb3797c4f600686765f5b5e5a 4de9c5ee1653dbf65a896c2142c9e4dc2d15621a 6545cfd1873133c23d559d325a8ddd027a693871 044b5cba2d85bec279498e3fa00c8899455b817b 2f249b35516806ef73c8644383126f3d5e94475b d2fcd11762926bb38ce28016e3c7638903b8906a 94977841e3a33b377bca7d1c068e0d9f4905dc38 32a96b53175c31368c92ae33f3b4760973ff1556 3dc8078091ad36f436305706d6e1f54c14821297 c3ba782ac3b155d6134a52ca4d70ef8e5cf6c677 18d6969e3108b5f6740ab9f67df5efaf0ca01b52 490abae4260ca10b5219e2467de1de1a1efd7a21 e663695fbe3df510c19ea062d67be22f718f8e1a fae2217d4b0b52290c5449612374ffbf57ffc747 68805b8714bdd9ed39ad9e5c580eb85040890459 7198011d2962e7c99189d5785662c2cdb84a8fd7 520ec80f963592f4e1390fb5aab6d51e29c8cbcf 21883887 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f2:40:cd:c0:ef:a9:8d:9e:37:a8:0b:e3:4a:b7:3e:5f:e0:b7:f9:f6],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-03 06:46:45.859 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-03 06:46:45.861 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-03 06:46:45.863 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-03 06:46:45.863 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-03 06:46:45.864 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-03 06:46:45.864 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-03 06:46:45.865 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-03 06:46:45.865 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-03 06:46:45.866 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-03 06:46:45.866 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-03 06:46:45.871 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-03 06:46:45.872 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-03 06:46:45.872 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-03 06:46:45.873 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-03 06:46:45.975 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-03 06:46:45.975 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-03 06:46:45.976 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-03 06:46:45.976 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-03 06:46:45.977 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-03 06:46:45.977 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-03 06:46:45.978 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-03 06:46:45.978 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-03 06:46:45.978 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-03 06:46:45.978 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-03 06:46:45.979 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-03 06:46:45.979 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-03 06:46:45.979 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-03 06:46:45.980 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-03 06:46:45.980 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-03 06:46:45.980 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-03 06:46:45.983 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 8417012875567550026241547682768134288645821280 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Nov 03 04:50:30 UTC 2022 Final Date: Tue Nov 02 04:50:29 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [77:e5:86:da:c5:59:eb:30:e8:bc:83:24:52:61:37:be:0e:8c:4a:4c],[56:66:d1:a4] modulus: a98a481c571972238b0a33db0110acd28066ef8c36abc7fb55f0d4e2003b2d69f674470a5925f32024f39c1a16296379d59226d0875194803272d640c5aaaf0c129b723a5e44aa314020cb8f7e1f771d5b4753184fe7c63f0d2903874f586680e5d21849655fbf50502c1e3a1b4367dc77dd0f6802bef12bb5940ae12f40adb3710452888952440630a25ad1c903e890974ac132470f20fb83f335b831786f5df9b662d46abec565b7dac748fe8f245216aadf4090be1f95e2497be88c239e62384a8e86085ebb7eab5c5e5f95879436fd2bf427c12579dc74de6f2f558995941caef899c45f0edf27b46a2c97ae83cfed9b72987e3250788ef885586d3e8721fd84c11ede79c2b5346f6152f800726f49780fbe9ffdb1e44b27526ca3048afd0d62f20dc43297b6967c9bf54ca050e19f1f66fda50d5e0549b1118f726c863f2134293284fd16883e87b3f51a1ab4daf22316658bea3f39e9efa1e2ef89c0caaede612836d5af14d883d34099a87d6aa61b78cf7f96ff48742aa45447452281 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 2f807a32710523ab379e89735ad30ac15886c4ce 03f823504808ae88e563a6d927e4356f30a00cfe 716c7fc15df7171cb3797c4f600686765f5b5e5a 4de9c5ee1653dbf65a896c2142c9e4dc2d15621a 6545cfd1873133c23d559d325a8ddd027a693871 044b5cba2d85bec279498e3fa00c8899455b817b 2f249b35516806ef73c8644383126f3d5e94475b d2fcd11762926bb38ce28016e3c7638903b8906a 94977841e3a33b377bca7d1c068e0d9f4905dc38 32a96b53175c31368c92ae33f3b4760973ff1556 3dc8078091ad36f436305706d6e1f54c14821297 c3ba782ac3b155d6134a52ca4d70ef8e5cf6c677 18d6969e3108b5f6740ab9f67df5efaf0ca01b52 490abae4260ca10b5219e2467de1de1a1efd7a21 e663695fbe3df510c19ea062d67be22f718f8e1a fae2217d4b0b52290c5449612374ffbf57ffc747 68805b8714bdd9ed39ad9e5c580eb85040890459 7198011d2962e7c99189d5785662c2cdb84a8fd7 520ec80f963592f4e1390fb5aab6d51e29c8cbcf 21883887 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [49:e7:7f:43:3e:66:4d:06:b9:90:7a:dc:b3:24:a2:5f:3e:b1:c4:14],[56:66:d1:a4] modulus: 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 public exponent: 10001 ]