By type
2022-11-05 04:59:31,046 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-11-05 04:59:31,873 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-11-05 04:59:32.599 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Nov 05, 2022 4:59:34 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Nov 05, 2022 4:59:34 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Nov 05, 2022 4:59:34 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Nov 05, 2022 4:59:34 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-11-05 04:59:34.953 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-11-05 04:59:35.245 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-11-05 04:59:35.403 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-11-05 04:59:36.126 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-11-05 04:59:36.128 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-11-05 04:59:36.130 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-11-05 04:59:36.134 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-11-05 04:59:36.171 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) 2022-11-05 04:59:36.174 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-11-05 04:59:36.295 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-11-05 04:59:36.937 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Nov 05, 2022 4:59:37 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-11-05 04:59:37.932 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 7.66 seconds (JVM running for 9.276) Nov 05, 2022 5:00:07 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-11-05 05:00:21.090 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-05 05:00:21.096 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-05 05:00:21.152 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-11-05 05:00:21.155 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-05 05:00:21.174 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-11-05 05:00:21.176 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-05 05:00:21.177 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-05 05:00:21.179 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-05 05:00:21.179 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-05 05:00:21.183 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-05 05:00:21.191 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-05 05:00:21.195 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-05 05:00:21.249 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-05 05:00:21.257 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-05 05:00:21.257 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-05 05:00:21.261 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-05 05:00:21.873 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-05 05:00:21.875 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-05 05:00:21.876 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-05 05:00:21.877 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-05 05:00:21.887 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-05 05:00:21.888 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-05 05:00:21.888 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-05 05:00:21.889 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-05 05:00:21.889 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-05 05:00:21.903 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-05 05:00:21.904 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-05 05:00:21.904 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-05 05:00:21.910 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-05 05:00:21.911 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-05 05:00:21.911 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-05 05:00:21.913 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-05 05:00:21.943 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 40350770764094019195363803017877888586040847466 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 05 04:57:39 UTC 2022 Final Date: Thu Nov 04 04:57:38 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c3:f9:7e:50:04:f1:33:80:eb:0a:e4:75:5e:43:82:51:65:15:08:c2],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 121cea4e56b34d776bc3d41e11a4a2c69f33026c 686e742079e7a9a803975135ffe43abf37dc6288 544ed91fbad695695581465e2948fe9a10ea0272 a249c5bcdc366fc3a2f22b5fda31ded1bad5199a cb2c0cbf2ca00361f5f2b2313f6e795dcf17e423 f9ff682fea647a2cdd30abb1b736ff2c2e952186 5889ebe34395fb6dfd6a82e23309f392920c6199 9fb7d0831d1a41bd0a6968f6ed7eb7a6ff429a8c 59e1c5692b69b1c4a2fb9ffec9935b0cfd082d85 3d65f2f45498238a2cef46617826fe2ed3074c90 d4350e8f910506ccac644583ed3447f1ac50b97a 90b0f31fa7b0b03f55e5406960d77dd555d41147 44f9b6a93736fd77e9e5318ff21205661108e668 085bb23d5ffc477484a7fa1ba31185d7853ab3f3 91d7aedf3c59289bc1a0aa8319b9af9cd498e82a 4b9fbeb25ffa656892e3a227737b28bf743d1e89 d2e837fbe880e500c6d2ec0e5b3a60b12b104e24 f38d0fe016dd84628047ef0560f8736d7870738d 556c68dd856613f373fe0318d9ea5ad6e30bf163 6d5b1605 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2f:34:1f:ab:5c:53:01:74:ab:67:10:ca:b8:e9:bc:91:84:f1:a9:ba],[56:66:d1:a4] modulus: e89631cbafa2f779ad720da7e2b240263166eadc4855655f3346485c89fd2dafa3b6f74a313c2a9520b706686d8ac7663fafee700cbcc59df7bb4686b0e96338d3637e9a0a53d8acc09c1e0654564f7bb2b11263255c2d1fedd0c171d68f255af009510709786faf69a29fd789f4d0f809bab4263c728e70e27a329cbd30b347cf5b7fd0ad9d86498d83347f60207a6ae85395d827865282a946ff5fe1c3e9364843ed080b3bd429d6d7e41baae5969704eb207f3b180429995248d096e19aa420dd2db38c3363f6ff2d9ce5c21ba1a4a5893c9baa6ddb8c17cf83bfff8f056f1523c83003187041084ee0cc944f47495cb139186b31dd315ea78b7f4d565651 public exponent: 10001 ] 2022-11-05 06:22:43.670 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-05 06:22:43.675 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-05 06:22:43.678 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-05 06:22:43.679 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-05 06:22:43.680 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-05 06:22:43.680 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-05 06:22:43.681 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-05 06:22:43.681 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-05 06:22:43.682 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-05 06:22:43.682 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-05 06:22:43.687 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-05 06:22:43.688 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-05 06:22:43.689 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-05 06:22:43.689 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-05 06:22:43.875 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-05 06:22:43.876 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-05 06:22:43.877 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-05 06:22:43.877 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-05 06:22:43.883 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-05 06:22:43.884 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-05 06:22:43.885 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-05 06:22:43.886 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-05 06:22:43.886 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-05 06:22:43.888 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-05 06:22:43.888 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-05 06:22:43.889 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-05 06:22:43.890 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-05 06:22:43.890 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-05 06:22:43.891 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-05 06:22:43.892 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-05 06:22:43.898 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 40350770764094019195363803017877888586040847466 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 05 04:57:39 UTC 2022 Final Date: Thu Nov 04 04:57:38 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c3:f9:7e:50:04:f1:33:80:eb:0a:e4:75:5e:43:82:51:65:15:08:c2],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 121cea4e56b34d776bc3d41e11a4a2c69f33026c 686e742079e7a9a803975135ffe43abf37dc6288 544ed91fbad695695581465e2948fe9a10ea0272 a249c5bcdc366fc3a2f22b5fda31ded1bad5199a cb2c0cbf2ca00361f5f2b2313f6e795dcf17e423 f9ff682fea647a2cdd30abb1b736ff2c2e952186 5889ebe34395fb6dfd6a82e23309f392920c6199 9fb7d0831d1a41bd0a6968f6ed7eb7a6ff429a8c 59e1c5692b69b1c4a2fb9ffec9935b0cfd082d85 3d65f2f45498238a2cef46617826fe2ed3074c90 d4350e8f910506ccac644583ed3447f1ac50b97a 90b0f31fa7b0b03f55e5406960d77dd555d41147 44f9b6a93736fd77e9e5318ff21205661108e668 085bb23d5ffc477484a7fa1ba31185d7853ab3f3 91d7aedf3c59289bc1a0aa8319b9af9cd498e82a 4b9fbeb25ffa656892e3a227737b28bf743d1e89 d2e837fbe880e500c6d2ec0e5b3a60b12b104e24 f38d0fe016dd84628047ef0560f8736d7870738d 556c68dd856613f373fe0318d9ea5ad6e30bf163 6d5b1605 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2d:1f:fa:e8:f1:29:75:b9:db:1c:73:93:81:80:53:65:d4:22:36:62],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-05 06:24:31.413 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-05 06:24:31.414 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-05 06:24:31.416 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-11-05 06:24:31.417 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-05 06:24:31.418 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-11-05 06:24:31.418 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-05 06:24:31.419 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-05 06:24:31.420 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-05 06:24:31.420 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-05 06:24:31.421 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-05 06:24:31.425 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-05 06:24:31.426 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-05 06:24:31.427 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-05 06:24:31.427 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-05 06:24:31.571 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-05 06:24:31.572 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-05 06:24:31.572 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-05 06:24:31.573 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-05 06:24:31.576 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-05 06:24:31.576 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-05 06:24:31.577 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-05 06:24:31.578 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-05 06:24:31.578 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-05 06:24:31.579 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-05 06:24:31.580 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-05 06:24:31.580 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-05 06:24:31.581 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-05 06:24:31.582 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-05 06:24:31.582 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-05 06:24:31.584 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-05 06:24:31.588 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 40350770764094019195363803017877888586040847466 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 05 04:57:39 UTC 2022 Final Date: Thu Nov 04 04:57:38 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c3:f9:7e:50:04:f1:33:80:eb:0a:e4:75:5e:43:82:51:65:15:08:c2],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 121cea4e56b34d776bc3d41e11a4a2c69f33026c 686e742079e7a9a803975135ffe43abf37dc6288 544ed91fbad695695581465e2948fe9a10ea0272 a249c5bcdc366fc3a2f22b5fda31ded1bad5199a cb2c0cbf2ca00361f5f2b2313f6e795dcf17e423 f9ff682fea647a2cdd30abb1b736ff2c2e952186 5889ebe34395fb6dfd6a82e23309f392920c6199 9fb7d0831d1a41bd0a6968f6ed7eb7a6ff429a8c 59e1c5692b69b1c4a2fb9ffec9935b0cfd082d85 3d65f2f45498238a2cef46617826fe2ed3074c90 d4350e8f910506ccac644583ed3447f1ac50b97a 90b0f31fa7b0b03f55e5406960d77dd555d41147 44f9b6a93736fd77e9e5318ff21205661108e668 085bb23d5ffc477484a7fa1ba31185d7853ab3f3 91d7aedf3c59289bc1a0aa8319b9af9cd498e82a 4b9fbeb25ffa656892e3a227737b28bf743d1e89 d2e837fbe880e500c6d2ec0e5b3a60b12b104e24 f38d0fe016dd84628047ef0560f8736d7870738d 556c68dd856613f373fe0318d9ea5ad6e30bf163 6d5b1605 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [86:b9:7b:5e:01:4a:0b:dc:10:61:a1:10:d2:76:47:94:c7:5f:7f:72],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-05 06:25:39.641 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-05 06:25:39.642 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-05 06:25:39.643 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-11-05 06:25:39.644 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-05 06:25:39.644 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-11-05 06:25:39.645 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-05 06:25:39.645 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-05 06:25:39.646 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-05 06:25:39.646 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-05 06:25:39.647 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-05 06:25:39.651 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-05 06:25:39.651 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-05 06:25:39.652 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-05 06:25:39.652 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-05 06:25:39.827 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-05 06:25:39.828 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-05 06:25:39.828 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-05 06:25:39.829 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-05 06:25:39.830 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-05 06:25:39.830 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-05 06:25:39.831 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-05 06:25:39.831 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-05 06:25:39.832 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-05 06:25:39.832 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-05 06:25:39.833 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-05 06:25:39.833 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-05 06:25:39.834 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-05 06:25:39.834 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-05 06:25:39.834 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-05 06:25:39.835 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-05 06:25:39.839 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 40350770764094019195363803017877888586040847466 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 05 04:57:39 UTC 2022 Final Date: Thu Nov 04 04:57:38 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c3:f9:7e:50:04:f1:33:80:eb:0a:e4:75:5e:43:82:51:65:15:08:c2],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 121cea4e56b34d776bc3d41e11a4a2c69f33026c 686e742079e7a9a803975135ffe43abf37dc6288 544ed91fbad695695581465e2948fe9a10ea0272 a249c5bcdc366fc3a2f22b5fda31ded1bad5199a cb2c0cbf2ca00361f5f2b2313f6e795dcf17e423 f9ff682fea647a2cdd30abb1b736ff2c2e952186 5889ebe34395fb6dfd6a82e23309f392920c6199 9fb7d0831d1a41bd0a6968f6ed7eb7a6ff429a8c 59e1c5692b69b1c4a2fb9ffec9935b0cfd082d85 3d65f2f45498238a2cef46617826fe2ed3074c90 d4350e8f910506ccac644583ed3447f1ac50b97a 90b0f31fa7b0b03f55e5406960d77dd555d41147 44f9b6a93736fd77e9e5318ff21205661108e668 085bb23d5ffc477484a7fa1ba31185d7853ab3f3 91d7aedf3c59289bc1a0aa8319b9af9cd498e82a 4b9fbeb25ffa656892e3a227737b28bf743d1e89 d2e837fbe880e500c6d2ec0e5b3a60b12b104e24 f38d0fe016dd84628047ef0560f8736d7870738d 556c68dd856613f373fe0318d9ea5ad6e30bf163 6d5b1605 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [37:e2:94:da:ba:91:9b:d7:35:b1:63:00:f7:01:b4:4c:19:ef:e3:92],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-05 06:27:45.807 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-05 06:27:45.810 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-05 06:27:45.813 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-05 06:27:45.814 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-05 06:27:45.814 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-05 06:27:45.815 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-05 06:27:45.816 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-05 06:27:45.816 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-05 06:27:45.817 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-05 06:27:45.817 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-05 06:27:45.822 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-05 06:27:45.823 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-05 06:27:45.823 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-05 06:27:45.823 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-05 06:27:45.946 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-05 06:27:45.947 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-05 06:27:45.947 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-05 06:27:45.948 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-05 06:27:45.949 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-05 06:27:45.950 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-05 06:27:45.950 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-05 06:27:45.950 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-05 06:27:45.951 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-05 06:27:45.951 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-05 06:27:45.952 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-05 06:27:45.952 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-05 06:27:45.953 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-05 06:27:45.953 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-05 06:27:45.953 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-05 06:27:45.954 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-05 06:27:45.957 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 40350770764094019195363803017877888586040847466 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 05 04:57:39 UTC 2022 Final Date: Thu Nov 04 04:57:38 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c3:f9:7e:50:04:f1:33:80:eb:0a:e4:75:5e:43:82:51:65:15:08:c2],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 121cea4e56b34d776bc3d41e11a4a2c69f33026c 686e742079e7a9a803975135ffe43abf37dc6288 544ed91fbad695695581465e2948fe9a10ea0272 a249c5bcdc366fc3a2f22b5fda31ded1bad5199a cb2c0cbf2ca00361f5f2b2313f6e795dcf17e423 f9ff682fea647a2cdd30abb1b736ff2c2e952186 5889ebe34395fb6dfd6a82e23309f392920c6199 9fb7d0831d1a41bd0a6968f6ed7eb7a6ff429a8c 59e1c5692b69b1c4a2fb9ffec9935b0cfd082d85 3d65f2f45498238a2cef46617826fe2ed3074c90 d4350e8f910506ccac644583ed3447f1ac50b97a 90b0f31fa7b0b03f55e5406960d77dd555d41147 44f9b6a93736fd77e9e5318ff21205661108e668 085bb23d5ffc477484a7fa1ba31185d7853ab3f3 91d7aedf3c59289bc1a0aa8319b9af9cd498e82a 4b9fbeb25ffa656892e3a227737b28bf743d1e89 d2e837fbe880e500c6d2ec0e5b3a60b12b104e24 f38d0fe016dd84628047ef0560f8736d7870738d 556c68dd856613f373fe0318d9ea5ad6e30bf163 6d5b1605 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a7:94:0b:90:63:ff:12:c1:de:f4:ff:4a:14:52:c9:70:f0:a9:b3:5f],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-05 06:34:22.643 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-05 06:34:22.645 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-05 06:34:22.647 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-05 06:34:22.648 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-05 06:34:22.648 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-05 06:34:22.649 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-05 06:34:22.650 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-05 06:34:22.650 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-05 06:34:22.651 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-05 06:34:22.652 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-05 06:34:22.657 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-05 06:34:22.658 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-05 06:34:22.658 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-05 06:34:22.659 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-05 06:34:22.795 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-05 06:34:22.796 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-05 06:34:22.796 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-05 06:34:22.797 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-05 06:34:22.798 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-05 06:34:22.798 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-05 06:34:22.799 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-05 06:34:22.799 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-05 06:34:22.800 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-05 06:34:22.801 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-05 06:34:22.801 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-05 06:34:22.801 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-05 06:34:22.802 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-05 06:34:22.802 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-05 06:34:22.803 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-05 06:34:22.804 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-05 06:34:22.807 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 40350770764094019195363803017877888586040847466 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 05 04:57:39 UTC 2022 Final Date: Thu Nov 04 04:57:38 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c3:f9:7e:50:04:f1:33:80:eb:0a:e4:75:5e:43:82:51:65:15:08:c2],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 121cea4e56b34d776bc3d41e11a4a2c69f33026c 686e742079e7a9a803975135ffe43abf37dc6288 544ed91fbad695695581465e2948fe9a10ea0272 a249c5bcdc366fc3a2f22b5fda31ded1bad5199a cb2c0cbf2ca00361f5f2b2313f6e795dcf17e423 f9ff682fea647a2cdd30abb1b736ff2c2e952186 5889ebe34395fb6dfd6a82e23309f392920c6199 9fb7d0831d1a41bd0a6968f6ed7eb7a6ff429a8c 59e1c5692b69b1c4a2fb9ffec9935b0cfd082d85 3d65f2f45498238a2cef46617826fe2ed3074c90 d4350e8f910506ccac644583ed3447f1ac50b97a 90b0f31fa7b0b03f55e5406960d77dd555d41147 44f9b6a93736fd77e9e5318ff21205661108e668 085bb23d5ffc477484a7fa1ba31185d7853ab3f3 91d7aedf3c59289bc1a0aa8319b9af9cd498e82a 4b9fbeb25ffa656892e3a227737b28bf743d1e89 d2e837fbe880e500c6d2ec0e5b3a60b12b104e24 f38d0fe016dd84628047ef0560f8736d7870738d 556c68dd856613f373fe0318d9ea5ad6e30bf163 6d5b1605 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8f:55:6d:44:6a:da:b0:b8:37:c6:bf:ed:82:8d:41:da:7c:a5:df:99],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-05 06:38:20.618 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-05 06:38:20.624 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-05 06:38:20.630 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-05 06:38:20.631 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-05 06:38:20.632 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-05 06:38:20.633 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-05 06:38:20.634 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-05 06:38:20.635 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-05 06:38:20.635 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-05 06:38:20.637 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-05 06:38:20.642 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-05 06:38:20.643 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-05 06:38:20.644 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-05 06:38:20.644 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-05 06:38:20.787 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-05 06:38:20.788 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-05 06:38:20.789 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-05 06:38:20.789 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-05 06:38:20.790 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-05 06:38:20.791 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-05 06:38:20.791 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-05 06:38:20.792 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-05 06:38:20.792 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-05 06:38:20.793 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-05 06:38:20.793 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-05 06:38:20.794 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-05 06:38:20.795 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-05 06:38:20.795 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-05 06:38:20.795 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-05 06:38:20.796 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-05 06:38:20.799 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 40350770764094019195363803017877888586040847466 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 05 04:57:39 UTC 2022 Final Date: Thu Nov 04 04:57:38 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c3:f9:7e:50:04:f1:33:80:eb:0a:e4:75:5e:43:82:51:65:15:08:c2],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 121cea4e56b34d776bc3d41e11a4a2c69f33026c 686e742079e7a9a803975135ffe43abf37dc6288 544ed91fbad695695581465e2948fe9a10ea0272 a249c5bcdc366fc3a2f22b5fda31ded1bad5199a cb2c0cbf2ca00361f5f2b2313f6e795dcf17e423 f9ff682fea647a2cdd30abb1b736ff2c2e952186 5889ebe34395fb6dfd6a82e23309f392920c6199 9fb7d0831d1a41bd0a6968f6ed7eb7a6ff429a8c 59e1c5692b69b1c4a2fb9ffec9935b0cfd082d85 3d65f2f45498238a2cef46617826fe2ed3074c90 d4350e8f910506ccac644583ed3447f1ac50b97a 90b0f31fa7b0b03f55e5406960d77dd555d41147 44f9b6a93736fd77e9e5318ff21205661108e668 085bb23d5ffc477484a7fa1ba31185d7853ab3f3 91d7aedf3c59289bc1a0aa8319b9af9cd498e82a 4b9fbeb25ffa656892e3a227737b28bf743d1e89 d2e837fbe880e500c6d2ec0e5b3a60b12b104e24 f38d0fe016dd84628047ef0560f8736d7870738d 556c68dd856613f373fe0318d9ea5ad6e30bf163 6d5b1605 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f9:f4:c6:18:15:11:0a:ea:8e:96:29:28:ae:18:a3:2c:86:b1:97:61],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-05 06:44:37.368 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-05 06:44:37.371 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-05 06:44:37.373 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-11-05 06:44:37.374 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-05 06:44:37.375 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-11-05 06:44:37.375 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-05 06:44:37.376 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-05 06:44:37.377 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-05 06:44:37.377 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-05 06:44:37.378 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-05 06:44:37.382 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-05 06:44:37.383 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-05 06:44:37.383 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-05 06:44:37.384 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-05 06:44:37.557 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-05 06:44:37.557 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-05 06:44:37.558 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-05 06:44:37.558 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-05 06:44:37.560 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-05 06:44:37.560 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-05 06:44:37.560 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-05 06:44:37.561 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-05 06:44:37.561 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-05 06:44:37.562 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-05 06:44:37.562 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-05 06:44:37.562 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-05 06:44:37.563 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-05 06:44:37.564 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-05 06:44:37.564 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-05 06:44:37.565 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-05 06:44:37.568 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 40350770764094019195363803017877888586040847466 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 05 04:57:39 UTC 2022 Final Date: Thu Nov 04 04:57:38 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c3:f9:7e:50:04:f1:33:80:eb:0a:e4:75:5e:43:82:51:65:15:08:c2],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 121cea4e56b34d776bc3d41e11a4a2c69f33026c 686e742079e7a9a803975135ffe43abf37dc6288 544ed91fbad695695581465e2948fe9a10ea0272 a249c5bcdc366fc3a2f22b5fda31ded1bad5199a cb2c0cbf2ca00361f5f2b2313f6e795dcf17e423 f9ff682fea647a2cdd30abb1b736ff2c2e952186 5889ebe34395fb6dfd6a82e23309f392920c6199 9fb7d0831d1a41bd0a6968f6ed7eb7a6ff429a8c 59e1c5692b69b1c4a2fb9ffec9935b0cfd082d85 3d65f2f45498238a2cef46617826fe2ed3074c90 d4350e8f910506ccac644583ed3447f1ac50b97a 90b0f31fa7b0b03f55e5406960d77dd555d41147 44f9b6a93736fd77e9e5318ff21205661108e668 085bb23d5ffc477484a7fa1ba31185d7853ab3f3 91d7aedf3c59289bc1a0aa8319b9af9cd498e82a 4b9fbeb25ffa656892e3a227737b28bf743d1e89 d2e837fbe880e500c6d2ec0e5b3a60b12b104e24 f38d0fe016dd84628047ef0560f8736d7870738d 556c68dd856613f373fe0318d9ea5ad6e30bf163 6d5b1605 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [aa:6b:3e:df:07:18:30:b6:87:96:2a:25:40:9d:47:0a:8c:ad:5e:a4],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-05 06:49:21.358 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-05 06:49:21.361 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-05 06:49:21.364 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-05 06:49:21.365 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-05 06:49:21.366 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-05 06:49:21.366 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-05 06:49:21.367 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-05 06:49:21.367 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-05 06:49:21.368 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-05 06:49:21.369 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-05 06:49:21.373 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-05 06:49:21.374 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-05 06:49:21.374 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-05 06:49:21.375 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-05 06:49:21.506 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-05 06:49:21.507 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-05 06:49:21.508 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-05 06:49:21.508 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-05 06:49:21.511 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-05 06:49:21.512 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-05 06:49:21.513 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-05 06:49:21.513 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-05 06:49:21.514 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-05 06:49:21.515 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-05 06:49:21.515 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-05 06:49:21.515 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-05 06:49:21.516 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-05 06:49:21.517 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-05 06:49:21.517 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-05 06:49:21.518 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-05 06:49:21.524 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 40350770764094019195363803017877888586040847466 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 05 04:57:39 UTC 2022 Final Date: Thu Nov 04 04:57:38 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c3:f9:7e:50:04:f1:33:80:eb:0a:e4:75:5e:43:82:51:65:15:08:c2],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 121cea4e56b34d776bc3d41e11a4a2c69f33026c 686e742079e7a9a803975135ffe43abf37dc6288 544ed91fbad695695581465e2948fe9a10ea0272 a249c5bcdc366fc3a2f22b5fda31ded1bad5199a cb2c0cbf2ca00361f5f2b2313f6e795dcf17e423 f9ff682fea647a2cdd30abb1b736ff2c2e952186 5889ebe34395fb6dfd6a82e23309f392920c6199 9fb7d0831d1a41bd0a6968f6ed7eb7a6ff429a8c 59e1c5692b69b1c4a2fb9ffec9935b0cfd082d85 3d65f2f45498238a2cef46617826fe2ed3074c90 d4350e8f910506ccac644583ed3447f1ac50b97a 90b0f31fa7b0b03f55e5406960d77dd555d41147 44f9b6a93736fd77e9e5318ff21205661108e668 085bb23d5ffc477484a7fa1ba31185d7853ab3f3 91d7aedf3c59289bc1a0aa8319b9af9cd498e82a 4b9fbeb25ffa656892e3a227737b28bf743d1e89 d2e837fbe880e500c6d2ec0e5b3a60b12b104e24 f38d0fe016dd84628047ef0560f8736d7870738d 556c68dd856613f373fe0318d9ea5ad6e30bf163 6d5b1605 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ac:ea:3d:ae:35:2a:5f:e5:60:34:40:de:76:08:c9:c6:cb:01:e4:74],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-05 06:49:34.453 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-05 06:49:34.454 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-05 06:49:34.455 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-05 06:49:34.456 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-05 06:49:34.457 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-05 06:49:34.457 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-05 06:49:34.457 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-05 06:49:34.458 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-05 06:49:34.458 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-05 06:49:34.458 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-05 06:49:34.462 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-05 06:49:34.462 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-05 06:49:34.463 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-05 06:49:34.463 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-05 06:49:34.569 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-05 06:49:34.570 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-05 06:49:34.570 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-05 06:49:34.570 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-05 06:49:34.573 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-05 06:49:34.573 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-05 06:49:34.574 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-05 06:49:34.574 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-05 06:49:34.575 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-05 06:49:34.576 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-05 06:49:34.576 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-05 06:49:34.577 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-05 06:49:34.578 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-05 06:49:34.578 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-05 06:49:34.578 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-05 06:49:34.580 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-05 06:49:34.583 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 40350770764094019195363803017877888586040847466 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 05 04:57:39 UTC 2022 Final Date: Thu Nov 04 04:57:38 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c3:f9:7e:50:04:f1:33:80:eb:0a:e4:75:5e:43:82:51:65:15:08:c2],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 121cea4e56b34d776bc3d41e11a4a2c69f33026c 686e742079e7a9a803975135ffe43abf37dc6288 544ed91fbad695695581465e2948fe9a10ea0272 a249c5bcdc366fc3a2f22b5fda31ded1bad5199a cb2c0cbf2ca00361f5f2b2313f6e795dcf17e423 f9ff682fea647a2cdd30abb1b736ff2c2e952186 5889ebe34395fb6dfd6a82e23309f392920c6199 9fb7d0831d1a41bd0a6968f6ed7eb7a6ff429a8c 59e1c5692b69b1c4a2fb9ffec9935b0cfd082d85 3d65f2f45498238a2cef46617826fe2ed3074c90 d4350e8f910506ccac644583ed3447f1ac50b97a 90b0f31fa7b0b03f55e5406960d77dd555d41147 44f9b6a93736fd77e9e5318ff21205661108e668 085bb23d5ffc477484a7fa1ba31185d7853ab3f3 91d7aedf3c59289bc1a0aa8319b9af9cd498e82a 4b9fbeb25ffa656892e3a227737b28bf743d1e89 d2e837fbe880e500c6d2ec0e5b3a60b12b104e24 f38d0fe016dd84628047ef0560f8736d7870738d 556c68dd856613f373fe0318d9ea5ad6e30bf163 6d5b1605 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c3:3d:73:6e:ba:b5:84:bd:49:29:5b:1e:de:bd:8d:d8:33:86:48:17],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-05 07:10:19.372 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-05 07:10:19.375 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-05 07:10:19.378 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-05 07:10:19.378 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-05 07:10:19.379 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-05 07:10:19.379 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-05 07:10:19.380 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-05 07:10:19.380 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-05 07:10:19.381 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-05 07:10:19.381 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-05 07:10:19.385 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-05 07:10:19.386 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-05 07:10:19.386 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-05 07:10:19.387 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-05 07:10:19.539 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-05 07:10:19.539 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-05 07:10:19.540 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-05 07:10:19.540 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-05 07:10:19.541 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-05 07:10:19.542 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-05 07:10:19.542 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-05 07:10:19.543 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-05 07:10:19.543 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-05 07:10:19.544 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-05 07:10:19.544 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-05 07:10:19.544 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-05 07:10:19.545 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-05 07:10:19.546 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-05 07:10:19.546 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-05 07:10:19.547 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-05 07:10:19.551 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 40350770764094019195363803017877888586040847466 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 05 04:57:39 UTC 2022 Final Date: Thu Nov 04 04:57:38 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c3:f9:7e:50:04:f1:33:80:eb:0a:e4:75:5e:43:82:51:65:15:08:c2],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 121cea4e56b34d776bc3d41e11a4a2c69f33026c 686e742079e7a9a803975135ffe43abf37dc6288 544ed91fbad695695581465e2948fe9a10ea0272 a249c5bcdc366fc3a2f22b5fda31ded1bad5199a cb2c0cbf2ca00361f5f2b2313f6e795dcf17e423 f9ff682fea647a2cdd30abb1b736ff2c2e952186 5889ebe34395fb6dfd6a82e23309f392920c6199 9fb7d0831d1a41bd0a6968f6ed7eb7a6ff429a8c 59e1c5692b69b1c4a2fb9ffec9935b0cfd082d85 3d65f2f45498238a2cef46617826fe2ed3074c90 d4350e8f910506ccac644583ed3447f1ac50b97a 90b0f31fa7b0b03f55e5406960d77dd555d41147 44f9b6a93736fd77e9e5318ff21205661108e668 085bb23d5ffc477484a7fa1ba31185d7853ab3f3 91d7aedf3c59289bc1a0aa8319b9af9cd498e82a 4b9fbeb25ffa656892e3a227737b28bf743d1e89 d2e837fbe880e500c6d2ec0e5b3a60b12b104e24 f38d0fe016dd84628047ef0560f8736d7870738d 556c68dd856613f373fe0318d9ea5ad6e30bf163 6d5b1605 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c3:2d:72:17:f7:26:cd:df:9c:ca:66:6e:d0:aa:70:4e:2b:3e:63:71],[56:66:d1:a4] modulus: a7a60b9d2a0b0b3df6e2f17981f6534f652f8a30d2992ba4ca465f23a2522b365c8e506af8c6a1f887418f26f398a88cf673c0719fd1939689b7dbc0b3274e8fcbd363bce1468157605c94771c5b142625f3a23b5557159f5b7f80c06e171dcf56cbfc94dab05b4efe5e39813f2d0dfd307595f23c26573f78a9a493ad5c00052e2e889689ce99c4e70891702ce72b392e50a455c4af44403f81c5ff32f92ec070677cccee3a15874fe695bfe7c55d83f24bb646350b1f55869999edb2de50e415d8e25641e73e80ec968afe349c9a363b15f0ca97c94aa65cc300b358a1e780876b90806b2db5a93698f816a029c7a81172dcb4b1e7e8ba1887e6e74b97e1bb public exponent: 10001 ] 2022-11-05 07:10:24.470 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-05 07:10:24.471 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-05 07:10:24.473 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-05 07:10:24.474 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-05 07:10:24.474 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-05 07:10:24.474 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-05 07:10:24.475 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-05 07:10:24.475 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-05 07:10:24.476 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-05 07:10:24.476 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-05 07:10:24.480 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-05 07:10:24.480 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-05 07:10:24.481 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-05 07:10:24.481 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-05 07:10:24.585 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-05 07:10:24.586 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-05 07:10:24.586 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-05 07:10:24.586 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-05 07:10:24.587 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-05 07:10:24.588 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-05 07:10:24.588 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-05 07:10:24.589 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-05 07:10:24.589 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-05 07:10:24.589 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-05 07:10:24.590 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-05 07:10:24.590 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-05 07:10:24.591 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-05 07:10:24.591 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-05 07:10:24.591 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-05 07:10:24.592 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-05 07:10:24.595 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 40350770764094019195363803017877888586040847466 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Nov 05 04:57:39 UTC 2022 Final Date: Thu Nov 04 04:57:38 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c3:f9:7e:50:04:f1:33:80:eb:0a:e4:75:5e:43:82:51:65:15:08:c2],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 121cea4e56b34d776bc3d41e11a4a2c69f33026c 686e742079e7a9a803975135ffe43abf37dc6288 544ed91fbad695695581465e2948fe9a10ea0272 a249c5bcdc366fc3a2f22b5fda31ded1bad5199a cb2c0cbf2ca00361f5f2b2313f6e795dcf17e423 f9ff682fea647a2cdd30abb1b736ff2c2e952186 5889ebe34395fb6dfd6a82e23309f392920c6199 9fb7d0831d1a41bd0a6968f6ed7eb7a6ff429a8c 59e1c5692b69b1c4a2fb9ffec9935b0cfd082d85 3d65f2f45498238a2cef46617826fe2ed3074c90 d4350e8f910506ccac644583ed3447f1ac50b97a 90b0f31fa7b0b03f55e5406960d77dd555d41147 44f9b6a93736fd77e9e5318ff21205661108e668 085bb23d5ffc477484a7fa1ba31185d7853ab3f3 91d7aedf3c59289bc1a0aa8319b9af9cd498e82a 4b9fbeb25ffa656892e3a227737b28bf743d1e89 d2e837fbe880e500c6d2ec0e5b3a60b12b104e24 f38d0fe016dd84628047ef0560f8736d7870738d 556c68dd856613f373fe0318d9ea5ad6e30bf163 6d5b1605 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d3:fb:a1:00:1a:ae:12:3a:b2:39:b4:d4:74:19:02:5f:8f:a4:cc:cd],[56:66:d1:a4] modulus: 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 public exponent: 10001 ]