By type
2022-11-06 05:00:36,250 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-11-06 05:00:37,205 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-11-06 05:00:37.938 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Nov 06, 2022 5:00:39 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Nov 06, 2022 5:00:39 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Nov 06, 2022 5:00:39 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Nov 06, 2022 5:00:39 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-11-06 05:00:40.427 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-11-06 05:00:40.740 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-11-06 05:00:40.912 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-11-06 05:00:41.673 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-11-06 05:00:41.676 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-11-06 05:00:41.678 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-11-06 05:00:41.682 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-11-06 05:00:41.721 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-11-06 05:00:41.725 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-11-06 05:00:41.843 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-11-06 05:00:42.584 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Nov 06, 2022 5:00:43 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-11-06 05:00:43.633 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 8.242 seconds (JVM running for 9.975) Nov 06, 2022 5:01:11 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-11-06 05:01:36.644 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-06 05:01:36.650 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-06 05:01:36.692 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-11-06 05:01:36.695 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-06 05:01:36.709 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-11-06 05:01:36.711 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-06 05:01:36.711 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-06 05:01:36.713 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-06 05:01:36.713 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-06 05:01:36.716 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-06 05:01:36.724 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-06 05:01:36.728 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-06 05:01:36.778 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-06 05:01:36.783 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-06 05:01:36.784 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-06 05:01:36.787 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-06 05:01:37.452 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-06 05:01:37.455 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-06 05:01:37.456 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-06 05:01:37.458 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-06 05:01:37.469 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-06 05:01:37.470 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-06 05:01:37.470 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-06 05:01:37.471 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-06 05:01:37.471 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-06 05:01:37.488 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-06 05:01:37.489 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-06 05:01:37.489 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-06 05:01:37.496 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-06 05:01:37.497 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-06 05:01:37.497 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-06 05:01:37.499 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-06 05:01:37.535 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 684447545981728896190409730367065714107922352657 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 06 04:58:38 UTC 2022 Final Date: Fri Nov 05 04:58:37 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [10:d8:8e:cf:52:8b:d1:2b:70:c5:01:c4:82:03:7b:86:6f:b6:37:eb],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5482d33caf29ca868674cb47a7291a99c54bf887 ce92424dec8e6d25f862df2599496a1136824974 2aa98c3ed6e730dbf588d9471baf9dc6438832f5 5ca0e46424d869eccdddb28f1dbe44f3d5b76a8d 2845ee1044f37613a63fa196952fd141ba156113 2599ae30309b0891415986adf55d95615a5769c2 d733c2ec56bcba196baf46d2ba391b30c092b90f 1facc0273e4aca948e70307bb2e0c06bc2e08de1 67de8bd69b38191178743903ba69fdfc65726a25 1f7429fe7df967eef2a40325c167433b584d038e e605bc7fe80296eb569a092a4c031bde567d7355 1a7acd711073564cc33512506d9cdb5dc483e96e 63ccb3d84285f02747cbed387743f7d56f89882d a3ac8303ceed35e8b343daaad7f3dc6b1269dccc d32859a5cb2d5c46393a0746ed89c3b89ca12dc8 2444ec20ae39e4dd16568d41e02128bd7899ca64 1af7aab629228e19adfcbb59137f5dc264a2b745 54e9109564edd3b3a036ceec0768738950c89c06 1225f9663f7cdd9da3827a6707b4737677c7e48e 2b9b6cff Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d4:39:d9:5a:3b:94:ab:11:af:e5:ae:e3:ca:b7:bd:85:22:95:01:8a],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-06 06:21:38.929 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-06 06:21:38.933 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-06 06:21:38.937 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-06 06:21:38.938 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-06 06:21:38.939 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-06 06:21:38.940 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-06 06:21:38.941 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-06 06:21:38.941 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-06 06:21:38.942 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-06 06:21:38.943 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-06 06:21:38.949 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-06 06:21:38.951 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-06 06:21:38.951 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-06 06:21:38.952 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-06 06:21:39.187 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-06 06:21:39.188 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-06 06:21:39.189 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-06 06:21:39.190 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-06 06:21:39.192 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-06 06:21:39.193 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-06 06:21:39.194 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-06 06:21:39.194 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-06 06:21:39.194 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-06 06:21:39.196 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-06 06:21:39.196 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-06 06:21:39.196 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-06 06:21:39.197 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-06 06:21:39.198 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-06 06:21:39.198 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-06 06:21:39.199 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-06 06:21:39.204 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 684447545981728896190409730367065714107922352657 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 06 04:58:38 UTC 2022 Final Date: Fri Nov 05 04:58:37 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [10:d8:8e:cf:52:8b:d1:2b:70:c5:01:c4:82:03:7b:86:6f:b6:37:eb],[56:66:d1:a4] modulus: afa1df14f95fb94cef9e561ff57db4d3cf22558d5a37eafa7fd083d112c3c0c097cf028ad374cb53af144cc9d5d2a3cf3c32722c10c69074857cb680728d02f974db3c7b0b7edebe457d68865e4e2dd26cccd0278f66c6045b0542e7af4513644a5511b5b4e63a5779d8a3ed80985fe1827717b4f22d7dddf2dc73fc447adf060558a438c5aa005a6f255e52b2998862be8a19637e803491de4044195048c1acc4b24cb5d76504ce7e389d8820ca093bc4e467a2a9a212b2a4e11b6792f3b67d2020ff9bacafac8ae5e3dd922def3ec9deb08ec2759ca9be0ae5b9cbe951aaf50326c01d97ccf6436fa40a763eb37ae2566b09c9e7fe8399a5e88db559db90ac9a3765527a229567d888b259fa8c9e1b31aefa3d200d49942cfeb84240443ddd25d771de80be7e70e5e1b21bd81d7e4ff16dc7c1cae727255a306a99cb139d8405aac3628fa27deb167b219fc9718b699a12a57fc6f2aadde7aa9b9fed46c6b4e64e351ee588cd1a5b4866453644a818db2b3ec60497a93d4668b49ddd889bd3 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5482d33caf29ca868674cb47a7291a99c54bf887 ce92424dec8e6d25f862df2599496a1136824974 2aa98c3ed6e730dbf588d9471baf9dc6438832f5 5ca0e46424d869eccdddb28f1dbe44f3d5b76a8d 2845ee1044f37613a63fa196952fd141ba156113 2599ae30309b0891415986adf55d95615a5769c2 d733c2ec56bcba196baf46d2ba391b30c092b90f 1facc0273e4aca948e70307bb2e0c06bc2e08de1 67de8bd69b38191178743903ba69fdfc65726a25 1f7429fe7df967eef2a40325c167433b584d038e e605bc7fe80296eb569a092a4c031bde567d7355 1a7acd711073564cc33512506d9cdb5dc483e96e 63ccb3d84285f02747cbed387743f7d56f89882d a3ac8303ceed35e8b343daaad7f3dc6b1269dccc d32859a5cb2d5c46393a0746ed89c3b89ca12dc8 2444ec20ae39e4dd16568d41e02128bd7899ca64 1af7aab629228e19adfcbb59137f5dc264a2b745 54e9109564edd3b3a036ceec0768738950c89c06 1225f9663f7cdd9da3827a6707b4737677c7e48e 2b9b6cff Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [69:2e:09:3a:36:0e:3c:91:ef:29:63:20:c4:95:b7:f6:67:34:37:b0],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-06 06:23:26.710 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-06 06:23:26.711 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-06 06:23:26.715 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-11-06 06:23:26.716 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-06 06:23:26.717 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-11-06 06:23:26.721 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-06 06:23:26.721 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-06 06:23:26.723 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-06 06:23:26.724 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-06 06:23:26.725 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-06 06:23:26.729 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-06 06:23:26.730 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-06 06:23:26.730 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-06 06:23:26.730 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-06 06:23:26.887 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-06 06:23:26.887 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-06 06:23:26.888 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-06 06:23:26.888 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-06 06:23:26.891 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-06 06:23:26.891 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-06 06:23:26.891 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-06 06:23:26.892 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-06 06:23:26.892 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-06 06:23:26.893 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-06 06:23:26.893 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-06 06:23:26.894 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-06 06:23:26.895 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-06 06:23:26.895 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-06 06:23:26.895 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-06 06:23:26.896 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-06 06:23:26.900 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 684447545981728896190409730367065714107922352657 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 06 04:58:38 UTC 2022 Final Date: Fri Nov 05 04:58:37 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [10:d8:8e:cf:52:8b:d1:2b:70:c5:01:c4:82:03:7b:86:6f:b6:37:eb],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5482d33caf29ca868674cb47a7291a99c54bf887 ce92424dec8e6d25f862df2599496a1136824974 2aa98c3ed6e730dbf588d9471baf9dc6438832f5 5ca0e46424d869eccdddb28f1dbe44f3d5b76a8d 2845ee1044f37613a63fa196952fd141ba156113 2599ae30309b0891415986adf55d95615a5769c2 d733c2ec56bcba196baf46d2ba391b30c092b90f 1facc0273e4aca948e70307bb2e0c06bc2e08de1 67de8bd69b38191178743903ba69fdfc65726a25 1f7429fe7df967eef2a40325c167433b584d038e e605bc7fe80296eb569a092a4c031bde567d7355 1a7acd711073564cc33512506d9cdb5dc483e96e 63ccb3d84285f02747cbed387743f7d56f89882d a3ac8303ceed35e8b343daaad7f3dc6b1269dccc d32859a5cb2d5c46393a0746ed89c3b89ca12dc8 2444ec20ae39e4dd16568d41e02128bd7899ca64 1af7aab629228e19adfcbb59137f5dc264a2b745 54e9109564edd3b3a036ceec0768738950c89c06 1225f9663f7cdd9da3827a6707b4737677c7e48e 2b9b6cff Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [57:e7:d3:4d:f3:e5:5a:62:02:b7:70:4a:80:c4:2f:e5:4b:b4:1b:bf],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-06 06:24:20.673 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-06 06:24:20.674 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-06 06:24:20.675 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-11-06 06:24:20.676 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-06 06:24:20.677 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-11-06 06:24:20.677 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-06 06:24:20.678 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-06 06:24:20.678 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-06 06:24:20.678 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-06 06:24:20.679 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-06 06:24:20.683 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-06 06:24:20.683 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-06 06:24:20.684 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-06 06:24:20.684 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-06 06:24:20.846 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-06 06:24:20.846 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-06 06:24:20.847 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-06 06:24:20.847 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-06 06:24:20.849 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-06 06:24:20.849 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-06 06:24:20.850 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-06 06:24:20.850 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-06 06:24:20.851 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-06 06:24:20.851 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-06 06:24:20.852 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-06 06:24:20.852 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-06 06:24:20.853 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-06 06:24:20.853 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-06 06:24:20.854 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-06 06:24:20.854 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-06 06:24:20.859 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 684447545981728896190409730367065714107922352657 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 06 04:58:38 UTC 2022 Final Date: Fri Nov 05 04:58:37 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [10:d8:8e:cf:52:8b:d1:2b:70:c5:01:c4:82:03:7b:86:6f:b6:37:eb],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5482d33caf29ca868674cb47a7291a99c54bf887 ce92424dec8e6d25f862df2599496a1136824974 2aa98c3ed6e730dbf588d9471baf9dc6438832f5 5ca0e46424d869eccdddb28f1dbe44f3d5b76a8d 2845ee1044f37613a63fa196952fd141ba156113 2599ae30309b0891415986adf55d95615a5769c2 d733c2ec56bcba196baf46d2ba391b30c092b90f 1facc0273e4aca948e70307bb2e0c06bc2e08de1 67de8bd69b38191178743903ba69fdfc65726a25 1f7429fe7df967eef2a40325c167433b584d038e e605bc7fe80296eb569a092a4c031bde567d7355 1a7acd711073564cc33512506d9cdb5dc483e96e 63ccb3d84285f02747cbed387743f7d56f89882d a3ac8303ceed35e8b343daaad7f3dc6b1269dccc d32859a5cb2d5c46393a0746ed89c3b89ca12dc8 2444ec20ae39e4dd16568d41e02128bd7899ca64 1af7aab629228e19adfcbb59137f5dc264a2b745 54e9109564edd3b3a036ceec0768738950c89c06 1225f9663f7cdd9da3827a6707b4737677c7e48e 2b9b6cff Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [39:1f:af:ba:30:51:53:a3:9a:a5:09:24:3f:44:53:84:0d:86:24:da],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-06 06:26:21.236 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-06 06:26:21.240 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-06 06:26:21.243 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-06 06:26:21.244 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-06 06:26:21.244 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-06 06:26:21.245 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-06 06:26:21.246 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-06 06:26:21.246 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-06 06:26:21.247 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-06 06:26:21.247 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-06 06:26:21.252 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-06 06:26:21.253 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-06 06:26:21.253 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-06 06:26:21.254 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-06 06:26:21.446 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-06 06:26:21.447 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-06 06:26:21.447 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-06 06:26:21.448 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-06 06:26:21.449 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-06 06:26:21.449 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-06 06:26:21.450 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-06 06:26:21.450 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-06 06:26:21.450 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-06 06:26:21.452 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-06 06:26:21.452 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-06 06:26:21.452 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-06 06:26:21.453 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-06 06:26:21.453 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-06 06:26:21.453 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-06 06:26:21.454 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-06 06:26:21.458 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 684447545981728896190409730367065714107922352657 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 06 04:58:38 UTC 2022 Final Date: Fri Nov 05 04:58:37 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [10:d8:8e:cf:52:8b:d1:2b:70:c5:01:c4:82:03:7b:86:6f:b6:37:eb],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5482d33caf29ca868674cb47a7291a99c54bf887 ce92424dec8e6d25f862df2599496a1136824974 2aa98c3ed6e730dbf588d9471baf9dc6438832f5 5ca0e46424d869eccdddb28f1dbe44f3d5b76a8d 2845ee1044f37613a63fa196952fd141ba156113 2599ae30309b0891415986adf55d95615a5769c2 d733c2ec56bcba196baf46d2ba391b30c092b90f 1facc0273e4aca948e70307bb2e0c06bc2e08de1 67de8bd69b38191178743903ba69fdfc65726a25 1f7429fe7df967eef2a40325c167433b584d038e e605bc7fe80296eb569a092a4c031bde567d7355 1a7acd711073564cc33512506d9cdb5dc483e96e 63ccb3d84285f02747cbed387743f7d56f89882d a3ac8303ceed35e8b343daaad7f3dc6b1269dccc d32859a5cb2d5c46393a0746ed89c3b89ca12dc8 2444ec20ae39e4dd16568d41e02128bd7899ca64 1af7aab629228e19adfcbb59137f5dc264a2b745 54e9109564edd3b3a036ceec0768738950c89c06 1225f9663f7cdd9da3827a6707b4737677c7e48e 2b9b6cff Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [de:29:ff:0d:e6:ee:3c:57:0e:9f:14:8e:48:19:69:4f:38:a5:6a:0e],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-06 06:35:20.120 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-06 06:35:20.123 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-06 06:35:20.126 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-11-06 06:35:20.127 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-06 06:35:20.128 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-11-06 06:35:20.129 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-06 06:35:20.129 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-06 06:35:20.130 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-06 06:35:20.130 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-06 06:35:20.131 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-06 06:35:20.136 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-06 06:35:20.137 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-06 06:35:20.138 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-06 06:35:20.138 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-06 06:35:20.318 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-06 06:35:20.319 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-06 06:35:20.319 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-06 06:35:20.319 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-06 06:35:20.325 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-06 06:35:20.326 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-06 06:35:20.326 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-06 06:35:20.327 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-06 06:35:20.327 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-06 06:35:20.328 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-06 06:35:20.329 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-06 06:35:20.329 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-06 06:35:20.330 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-06 06:35:20.330 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-06 06:35:20.330 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-06 06:35:20.331 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-06 06:35:20.334 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 684447545981728896190409730367065714107922352657 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 06 04:58:38 UTC 2022 Final Date: Fri Nov 05 04:58:37 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [10:d8:8e:cf:52:8b:d1:2b:70:c5:01:c4:82:03:7b:86:6f:b6:37:eb],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5482d33caf29ca868674cb47a7291a99c54bf887 ce92424dec8e6d25f862df2599496a1136824974 2aa98c3ed6e730dbf588d9471baf9dc6438832f5 5ca0e46424d869eccdddb28f1dbe44f3d5b76a8d 2845ee1044f37613a63fa196952fd141ba156113 2599ae30309b0891415986adf55d95615a5769c2 d733c2ec56bcba196baf46d2ba391b30c092b90f 1facc0273e4aca948e70307bb2e0c06bc2e08de1 67de8bd69b38191178743903ba69fdfc65726a25 1f7429fe7df967eef2a40325c167433b584d038e e605bc7fe80296eb569a092a4c031bde567d7355 1a7acd711073564cc33512506d9cdb5dc483e96e 63ccb3d84285f02747cbed387743f7d56f89882d a3ac8303ceed35e8b343daaad7f3dc6b1269dccc d32859a5cb2d5c46393a0746ed89c3b89ca12dc8 2444ec20ae39e4dd16568d41e02128bd7899ca64 1af7aab629228e19adfcbb59137f5dc264a2b745 54e9109564edd3b3a036ceec0768738950c89c06 1225f9663f7cdd9da3827a6707b4737677c7e48e 2b9b6cff Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [77:79:fb:f4:4b:1b:8a:fc:58:6e:d1:11:9f:43:e9:95:7f:dd:7e:12],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-06 06:40:32.836 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-06 06:40:32.841 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-06 06:40:32.844 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-06 06:40:32.845 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-06 06:40:32.845 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-06 06:40:32.846 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-06 06:40:32.846 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-06 06:40:32.847 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-06 06:40:32.847 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-06 06:40:32.848 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-06 06:40:32.852 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-06 06:40:32.853 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-06 06:40:32.853 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-06 06:40:32.854 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-06 06:40:33.023 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-06 06:40:33.024 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-06 06:40:33.025 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-06 06:40:33.025 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-06 06:40:33.026 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-06 06:40:33.027 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-06 06:40:33.027 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-06 06:40:33.028 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-06 06:40:33.028 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-06 06:40:33.029 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-06 06:40:33.029 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-06 06:40:33.029 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-06 06:40:33.030 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-06 06:40:33.031 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-06 06:40:33.031 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-06 06:40:33.032 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-06 06:40:33.036 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 684447545981728896190409730367065714107922352657 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 06 04:58:38 UTC 2022 Final Date: Fri Nov 05 04:58:37 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [10:d8:8e:cf:52:8b:d1:2b:70:c5:01:c4:82:03:7b:86:6f:b6:37:eb],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5482d33caf29ca868674cb47a7291a99c54bf887 ce92424dec8e6d25f862df2599496a1136824974 2aa98c3ed6e730dbf588d9471baf9dc6438832f5 5ca0e46424d869eccdddb28f1dbe44f3d5b76a8d 2845ee1044f37613a63fa196952fd141ba156113 2599ae30309b0891415986adf55d95615a5769c2 d733c2ec56bcba196baf46d2ba391b30c092b90f 1facc0273e4aca948e70307bb2e0c06bc2e08de1 67de8bd69b38191178743903ba69fdfc65726a25 1f7429fe7df967eef2a40325c167433b584d038e e605bc7fe80296eb569a092a4c031bde567d7355 1a7acd711073564cc33512506d9cdb5dc483e96e 63ccb3d84285f02747cbed387743f7d56f89882d a3ac8303ceed35e8b343daaad7f3dc6b1269dccc d32859a5cb2d5c46393a0746ed89c3b89ca12dc8 2444ec20ae39e4dd16568d41e02128bd7899ca64 1af7aab629228e19adfcbb59137f5dc264a2b745 54e9109564edd3b3a036ceec0768738950c89c06 1225f9663f7cdd9da3827a6707b4737677c7e48e 2b9b6cff Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b3:62:bd:81:18:59:bc:43:eb:7d:69:bf:63:0b:15:0e:67:4f:4c:91],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-06 06:40:49.760 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-06 06:40:49.762 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-06 06:40:49.763 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-06 06:40:49.764 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-06 06:40:49.764 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-06 06:40:49.765 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-06 06:40:49.765 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-06 06:40:49.765 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-06 06:40:49.766 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-06 06:40:49.766 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-06 06:40:49.771 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-06 06:40:49.771 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-06 06:40:49.771 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-06 06:40:49.772 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-06 06:40:49.937 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-06 06:40:49.938 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-06 06:40:49.938 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-06 06:40:49.938 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-06 06:40:49.940 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-06 06:40:49.940 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-06 06:40:49.941 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-06 06:40:49.941 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-06 06:40:49.941 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-06 06:40:49.942 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-06 06:40:49.943 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-06 06:40:49.943 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-06 06:40:49.944 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-06 06:40:49.944 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-06 06:40:49.944 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-06 06:40:49.945 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-06 06:40:49.948 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 684447545981728896190409730367065714107922352657 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 06 04:58:38 UTC 2022 Final Date: Fri Nov 05 04:58:37 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [10:d8:8e:cf:52:8b:d1:2b:70:c5:01:c4:82:03:7b:86:6f:b6:37:eb],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5482d33caf29ca868674cb47a7291a99c54bf887 ce92424dec8e6d25f862df2599496a1136824974 2aa98c3ed6e730dbf588d9471baf9dc6438832f5 5ca0e46424d869eccdddb28f1dbe44f3d5b76a8d 2845ee1044f37613a63fa196952fd141ba156113 2599ae30309b0891415986adf55d95615a5769c2 d733c2ec56bcba196baf46d2ba391b30c092b90f 1facc0273e4aca948e70307bb2e0c06bc2e08de1 67de8bd69b38191178743903ba69fdfc65726a25 1f7429fe7df967eef2a40325c167433b584d038e e605bc7fe80296eb569a092a4c031bde567d7355 1a7acd711073564cc33512506d9cdb5dc483e96e 63ccb3d84285f02747cbed387743f7d56f89882d a3ac8303ceed35e8b343daaad7f3dc6b1269dccc d32859a5cb2d5c46393a0746ed89c3b89ca12dc8 2444ec20ae39e4dd16568d41e02128bd7899ca64 1af7aab629228e19adfcbb59137f5dc264a2b745 54e9109564edd3b3a036ceec0768738950c89c06 1225f9663f7cdd9da3827a6707b4737677c7e48e 2b9b6cff Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0f:de:a5:ac:ff:ca:f6:ae:1d:24:4e:01:ea:3e:35:1b:c9:d2:02:d6],[56:66:d1:a4] modulus: c79a6f60646c86e1952dcd12a3b05b70243ece9710c5122311fb0d88a383a1553dc1bf4e6d6ba00493a1e5acdebe2e1ba0a0ef0eafa3c9245a70be389ee7ccb967721ae4afdb578792316eb3e4ec099ba21c7c980733c6e91063492993667b4b3a1fb6b5dae497513bcf1922ec287d58bfb0197526174a595eca0058ac177b6ceb39fe4be0e7863c6c5cbadcdd8f63106ca28e756c2090da34bba5a93e8b2a79a8140a9a55b28a5f8ed58bcd8d12a0a5c46c2861b8772f4ddb1aa4e319edb6cf09ec35b5daf649a1725412fa1d83ac7cdc85a4fd8ebb2ed54c88cc4a5b41bdc098f57f928970dc21be8c50fb774241bb5ee825209adcc82c8ab9fe75dd70c9c3 public exponent: 10001 ] 2022-11-06 06:59:33.751 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-06 06:59:33.754 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-06 06:59:33.756 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-06 06:59:33.757 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-06 06:59:33.758 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-06 06:59:33.758 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-06 06:59:33.759 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-06 06:59:33.759 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-06 06:59:33.760 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-06 06:59:33.760 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-06 06:59:33.764 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-06 06:59:33.765 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-06 06:59:33.765 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-06 06:59:33.766 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-06 06:59:33.918 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-06 06:59:33.919 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-06 06:59:33.919 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-06 06:59:33.919 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-06 06:59:33.921 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-06 06:59:33.921 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-06 06:59:33.922 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-06 06:59:33.922 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-06 06:59:33.922 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-06 06:59:33.923 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-06 06:59:33.923 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-06 06:59:33.924 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-06 06:59:33.924 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-06 06:59:33.925 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-06 06:59:33.925 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-06 06:59:33.925 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-06 06:59:33.929 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 684447545981728896190409730367065714107922352657 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 06 04:58:38 UTC 2022 Final Date: Fri Nov 05 04:58:37 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [10:d8:8e:cf:52:8b:d1:2b:70:c5:01:c4:82:03:7b:86:6f:b6:37:eb],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5482d33caf29ca868674cb47a7291a99c54bf887 ce92424dec8e6d25f862df2599496a1136824974 2aa98c3ed6e730dbf588d9471baf9dc6438832f5 5ca0e46424d869eccdddb28f1dbe44f3d5b76a8d 2845ee1044f37613a63fa196952fd141ba156113 2599ae30309b0891415986adf55d95615a5769c2 d733c2ec56bcba196baf46d2ba391b30c092b90f 1facc0273e4aca948e70307bb2e0c06bc2e08de1 67de8bd69b38191178743903ba69fdfc65726a25 1f7429fe7df967eef2a40325c167433b584d038e e605bc7fe80296eb569a092a4c031bde567d7355 1a7acd711073564cc33512506d9cdb5dc483e96e 63ccb3d84285f02747cbed387743f7d56f89882d a3ac8303ceed35e8b343daaad7f3dc6b1269dccc d32859a5cb2d5c46393a0746ed89c3b89ca12dc8 2444ec20ae39e4dd16568d41e02128bd7899ca64 1af7aab629228e19adfcbb59137f5dc264a2b745 54e9109564edd3b3a036ceec0768738950c89c06 1225f9663f7cdd9da3827a6707b4737677c7e48e 2b9b6cff Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [81:03:db:84:37:a3:ea:5c:1d:e8:b2:62:be:ee:34:ff:0f:85:c5:f9],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-06 06:59:38.486 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-06 06:59:38.487 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-06 06:59:38.488 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-06 06:59:38.489 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-06 06:59:38.490 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-06 06:59:38.490 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-06 06:59:38.491 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-06 06:59:38.491 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-06 06:59:38.492 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-06 06:59:38.492 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-06 06:59:38.498 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-06 06:59:38.498 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-06 06:59:38.499 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-06 06:59:38.499 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-06 06:59:38.611 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-06 06:59:38.611 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-06 06:59:38.612 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-06 06:59:38.612 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-06 06:59:38.613 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-06 06:59:38.613 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-06 06:59:38.614 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-06 06:59:38.614 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-06 06:59:38.614 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-06 06:59:38.615 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-06 06:59:38.615 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-06 06:59:38.615 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-06 06:59:38.616 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-06 06:59:38.616 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-06 06:59:38.616 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-06 06:59:38.617 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-06 06:59:38.619 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 684447545981728896190409730367065714107922352657 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Nov 06 04:58:38 UTC 2022 Final Date: Fri Nov 05 04:58:37 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [10:d8:8e:cf:52:8b:d1:2b:70:c5:01:c4:82:03:7b:86:6f:b6:37:eb],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5482d33caf29ca868674cb47a7291a99c54bf887 ce92424dec8e6d25f862df2599496a1136824974 2aa98c3ed6e730dbf588d9471baf9dc6438832f5 5ca0e46424d869eccdddb28f1dbe44f3d5b76a8d 2845ee1044f37613a63fa196952fd141ba156113 2599ae30309b0891415986adf55d95615a5769c2 d733c2ec56bcba196baf46d2ba391b30c092b90f 1facc0273e4aca948e70307bb2e0c06bc2e08de1 67de8bd69b38191178743903ba69fdfc65726a25 1f7429fe7df967eef2a40325c167433b584d038e e605bc7fe80296eb569a092a4c031bde567d7355 1a7acd711073564cc33512506d9cdb5dc483e96e 63ccb3d84285f02747cbed387743f7d56f89882d a3ac8303ceed35e8b343daaad7f3dc6b1269dccc d32859a5cb2d5c46393a0746ed89c3b89ca12dc8 2444ec20ae39e4dd16568d41e02128bd7899ca64 1af7aab629228e19adfcbb59137f5dc264a2b745 54e9109564edd3b3a036ceec0768738950c89c06 1225f9663f7cdd9da3827a6707b4737677c7e48e 2b9b6cff Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2e:4d:ee:5a:0e:64:d8:f9:0a:81:ae:29:87:a5:f3:4c:f8:ac:4c:3c],[56:66:d1:a4] modulus: ac1100fc9adb5937200de9430f371f641fb01e77b82415601e16c11d3f779308f931a209342898d5ff71ccb4cb37f3e1311cfb1f0b9e4959b82d5405bfc05acac2b68e9bd79e460d16a167a1dd5a170220c153792ff5d837944958d932364eab8d747eb15099a6c1c9c49a2b21f53c09d96047c0701cca76b02d232da47bbd81ef88bb2a421ca4a78da36caf6063b3cb0cc4c6a2f44088b989a67c32f6e4172441db21ffc4553236f2d1653dd90342b9e55a7d4e0a19f19b4d65073a2c5200d0564507767ab1ad249dfc1a21c0c9d93653e4a56d8cd7549ecae39b7c5156c56690708a597b13537c42e38e4e40c322d22f3626b0fa5b9410fe7b96cd037d8fbb public exponent: 10001 ]