By type
2022-11-09 04:58:33,780 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-11-09 04:58:35,082 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-11-09 04:58:35.728 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Nov 09, 2022 4:58:37 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Nov 09, 2022 4:58:37 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Nov 09, 2022 4:58:37 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Nov 09, 2022 4:58:37 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-11-09 04:58:37.992 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-11-09 04:58:38.254 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-11-09 04:58:38.411 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-11-09 04:58:39.057 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-11-09 04:58:39.060 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-11-09 04:58:39.061 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-11-09 04:58:39.065 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-11-09 04:58:39.108 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-11-09 04:58:39.111 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-11-09 04:58:39.228 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-11-09 04:58:40.001 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Nov 09, 2022 4:58:40 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-11-09 04:58:40.847 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 7.881 seconds (JVM running for 9.643) Nov 09, 2022 4:59:07 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-11-09 04:59:33.257 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-09 04:59:33.264 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-09 04:59:33.305 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-11-09 04:59:33.308 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-09 04:59:33.324 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-11-09 04:59:33.327 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-09 04:59:33.327 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-09 04:59:33.329 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-09 04:59:33.329 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-09 04:59:33.333 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-09 04:59:33.341 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-09 04:59:33.345 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-09 04:59:33.396 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-09 04:59:33.403 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-09 04:59:33.403 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-09 04:59:33.408 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-09 04:59:33.992 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-09 04:59:33.994 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-09 04:59:33.995 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-09 04:59:33.996 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-09 04:59:34.006 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-09 04:59:34.007 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-09 04:59:34.008 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-09 04:59:34.008 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-09 04:59:34.009 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-09 04:59:34.024 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-09 04:59:34.024 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-09 04:59:34.025 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-09 04:59:34.031 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-09 04:59:34.032 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-09 04:59:34.033 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-09 04:59:34.035 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-09 04:59:34.071 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 278444683596101070385710211879529582979721449986 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 09 04:56:21 UTC 2022 Final Date: Mon Nov 08 04:56:20 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [53:37:7c:d5:ac:48:9c:8b:bc:ee:3a:2b:ad:f2:e8:2a:d5:b3:09:24],[56:66:d1:a4] modulus: c5bc25caa3ed6768a5574e0e716f27f59e385a3766644b134b010131076c4953459c30cace689af71e65e5d84c90e41ad8dbac8dc0397aa92fd670880bbd45450d4a5cfee0822e7a5b6053a0590bcd6c612234616eecb39ca0add9391086bed66417694cc3d408682b9f8909967670e82280166898a49b5749563b4da77a2168fcbd76a6e2c4d6a2e0b2f6bd461bb95458e10188bbbf5eb1229445bee61674921a055b4aa99419535dff8ace6dd106bb25b542f192cba8af9159e06b6562b5734fe0297440ed2aab32443f8aab3a51283e77d48fc9ec6fdabd92bdf94088a1a4f70948f4620a768fe0a70947f5f103b40c5a30baf9304ee7f83a34372bc20427b95192e998af458e673358ad4e9ea7621fc444ce82276fe67d0a5a01de1cf2e4b458648acf40d6cf062b2af14763bce3a1d6ac598eff5e46d67fb4fa851c3b5cd2606c50b6222f8c903fe4a6a7ca2db1a044dc5269d9a05795e7650b22ee2baa52019cbd1688366d1013100a6f5ad1d8f8a8a2b5fc822e3246cf22b124c8a5f9 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3a54dda77af54437b88a6e6c59285ea65fa4d6f6 014bfd63fb1c51b09c9a203f1b562b88c3186a3a 674e1d090a602c04c2d4a97e7354129cdfbb80fb 6d8a1d35ee713696b20221d8c0f31a1aeea2a90c 8b6f267cc5e7d8d5c44966c49a439eeecd8dd9e3 920173bd9c9245148224878a65c8d1168c6d34db 2ea72af3629754789c7cd9b6ea2ad730346c1be5 4f427cf3407dc1eee8515dd1299e2e7246c7deff 1aa2fc1400dded16bace489dc871162732530c24 fbb4853ccabc61b1d197ac548b59f8b5e526026a 626d3217cc0e73f6a1ac2de6369a9ae4c8e4fdbe dc1ca7f87cdf960d3a09fa8cb565e4d386efbcdb a94f90b453c1a108a5672869d3b6958c897afcb1 08eda90d00f615f8bb0d104be8b5c829dd6f299c 4533917848bf25314ef249ca788371b937785d5d 5e8149e83017d45658362f6bb969d8819d8967ad b5b0d2db277a0362504f78618bd08cd0cad47d82 f773139be5d4b0076d8b3ecae11e7727c758085b f5f58c5193a291dfdbd52025958adf81f78e2d4e 58db3094 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [66:f7:3e:d1:ef:c3:59:eb:c1:48:e5:5e:e6:b4:09:43:c1:ee:aa:6a],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-09 06:11:09.202 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-09 06:11:09.207 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-09 06:11:09.210 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-09 06:11:09.211 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-09 06:11:09.212 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-09 06:11:09.213 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-09 06:11:09.214 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-09 06:11:09.214 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-09 06:11:09.215 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-09 06:11:09.215 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-09 06:11:09.221 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-09 06:11:09.222 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-09 06:11:09.223 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-09 06:11:09.223 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-09 06:11:09.446 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-09 06:11:09.447 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-09 06:11:09.447 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-09 06:11:09.448 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-09 06:11:09.450 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-09 06:11:09.451 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-09 06:11:09.452 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-09 06:11:09.452 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-09 06:11:09.452 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-09 06:11:09.454 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-09 06:11:09.454 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-09 06:11:09.454 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-09 06:11:09.455 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-09 06:11:09.456 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-09 06:11:09.456 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-09 06:11:09.457 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-09 06:11:09.461 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 278444683596101070385710211879529582979721449986 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 09 04:56:21 UTC 2022 Final Date: Mon Nov 08 04:56:20 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [53:37:7c:d5:ac:48:9c:8b:bc:ee:3a:2b:ad:f2:e8:2a:d5:b3:09:24],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3a54dda77af54437b88a6e6c59285ea65fa4d6f6 014bfd63fb1c51b09c9a203f1b562b88c3186a3a 674e1d090a602c04c2d4a97e7354129cdfbb80fb 6d8a1d35ee713696b20221d8c0f31a1aeea2a90c 8b6f267cc5e7d8d5c44966c49a439eeecd8dd9e3 920173bd9c9245148224878a65c8d1168c6d34db 2ea72af3629754789c7cd9b6ea2ad730346c1be5 4f427cf3407dc1eee8515dd1299e2e7246c7deff 1aa2fc1400dded16bace489dc871162732530c24 fbb4853ccabc61b1d197ac548b59f8b5e526026a 626d3217cc0e73f6a1ac2de6369a9ae4c8e4fdbe dc1ca7f87cdf960d3a09fa8cb565e4d386efbcdb a94f90b453c1a108a5672869d3b6958c897afcb1 08eda90d00f615f8bb0d104be8b5c829dd6f299c 4533917848bf25314ef249ca788371b937785d5d 5e8149e83017d45658362f6bb969d8819d8967ad b5b0d2db277a0362504f78618bd08cd0cad47d82 f773139be5d4b0076d8b3ecae11e7727c758085b f5f58c5193a291dfdbd52025958adf81f78e2d4e 58db3094 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1e:ad:b8:2d:28:e3:b0:ee:75:a3:ed:80:21:80:f6:71:e5:62:bb:c9],[56:66:d1:a4] modulus: de687a10961fce4482ccb9c9773b1d7d9e4671d37a6b37d9510b17c5686e2444151a8ec2494ec86cae5995f01b98bf3c68213696c152c275a0136ffb8d502adbf19adca9dbacdd0876c8643ca1563dd9d9da0a806e7600817de171d8a7e95c787acb8133554821865f8f62fc7e59c328b577eb37a12b679331bdd5c6d268b922d5bbe2383adaa22e44f68a8230fd11e6b7d9897f137e48765c501174d68e564de75e095a2d901e6f249e606613ecb32207f681e5bc2e1d85eda1eca268d56f300eab13d0f314a68b253b4b067e7d81560d4b821fcad1765313e087702c7f1e3bc5155f58e6e3103a3f499b9a0a11d0c932cfee9fb07c647f0f6f50990d1edb7f public exponent: 10001 ] 2022-11-09 06:12:57.257 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-09 06:12:57.258 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-09 06:12:57.260 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-11-09 06:12:57.261 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-09 06:12:57.262 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-11-09 06:12:57.263 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-09 06:12:57.264 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-09 06:12:57.264 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-09 06:12:57.265 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-09 06:12:57.266 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-09 06:12:57.271 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-09 06:12:57.272 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-09 06:12:57.272 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-09 06:12:57.273 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-09 06:12:57.410 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-09 06:12:57.415 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-09 06:12:57.416 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-09 06:12:57.416 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-09 06:12:57.419 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-09 06:12:57.420 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-09 06:12:57.420 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-09 06:12:57.421 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-09 06:12:57.421 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-09 06:12:57.422 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-09 06:12:57.423 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-09 06:12:57.424 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-09 06:12:57.424 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-09 06:12:57.425 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-09 06:12:57.425 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-09 06:12:57.437 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-09 06:12:57.442 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 278444683596101070385710211879529582979721449986 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 09 04:56:21 UTC 2022 Final Date: Mon Nov 08 04:56:20 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [53:37:7c:d5:ac:48:9c:8b:bc:ee:3a:2b:ad:f2:e8:2a:d5:b3:09:24],[56:66:d1:a4] modulus: c5bc25caa3ed6768a5574e0e716f27f59e385a3766644b134b010131076c4953459c30cace689af71e65e5d84c90e41ad8dbac8dc0397aa92fd670880bbd45450d4a5cfee0822e7a5b6053a0590bcd6c612234616eecb39ca0add9391086bed66417694cc3d408682b9f8909967670e82280166898a49b5749563b4da77a2168fcbd76a6e2c4d6a2e0b2f6bd461bb95458e10188bbbf5eb1229445bee61674921a055b4aa99419535dff8ace6dd106bb25b542f192cba8af9159e06b6562b5734fe0297440ed2aab32443f8aab3a51283e77d48fc9ec6fdabd92bdf94088a1a4f70948f4620a768fe0a70947f5f103b40c5a30baf9304ee7f83a34372bc20427b95192e998af458e673358ad4e9ea7621fc444ce82276fe67d0a5a01de1cf2e4b458648acf40d6cf062b2af14763bce3a1d6ac598eff5e46d67fb4fa851c3b5cd2606c50b6222f8c903fe4a6a7ca2db1a044dc5269d9a05795e7650b22ee2baa52019cbd1688366d1013100a6f5ad1d8f8a8a2b5fc822e3246cf22b124c8a5f9 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3a54dda77af54437b88a6e6c59285ea65fa4d6f6 014bfd63fb1c51b09c9a203f1b562b88c3186a3a 674e1d090a602c04c2d4a97e7354129cdfbb80fb 6d8a1d35ee713696b20221d8c0f31a1aeea2a90c 8b6f267cc5e7d8d5c44966c49a439eeecd8dd9e3 920173bd9c9245148224878a65c8d1168c6d34db 2ea72af3629754789c7cd9b6ea2ad730346c1be5 4f427cf3407dc1eee8515dd1299e2e7246c7deff 1aa2fc1400dded16bace489dc871162732530c24 fbb4853ccabc61b1d197ac548b59f8b5e526026a 626d3217cc0e73f6a1ac2de6369a9ae4c8e4fdbe dc1ca7f87cdf960d3a09fa8cb565e4d386efbcdb a94f90b453c1a108a5672869d3b6958c897afcb1 08eda90d00f615f8bb0d104be8b5c829dd6f299c 4533917848bf25314ef249ca788371b937785d5d 5e8149e83017d45658362f6bb969d8819d8967ad b5b0d2db277a0362504f78618bd08cd0cad47d82 f773139be5d4b0076d8b3ecae11e7727c758085b f5f58c5193a291dfdbd52025958adf81f78e2d4e 58db3094 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a0:0f:81:ca:58:8d:d0:78:a9:e4:68:9d:9b:43:f9:44:a3:42:24:8b],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-09 06:14:22.978 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-09 06:14:22.983 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-09 06:14:22.988 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-11-09 06:14:22.989 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-09 06:14:22.990 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-11-09 06:14:22.991 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-09 06:14:22.992 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-09 06:14:22.993 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-09 06:14:22.994 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-09 06:14:22.995 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-09 06:14:23.000 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-09 06:14:23.001 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-09 06:14:23.002 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-09 06:14:23.002 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-09 06:14:23.171 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-09 06:14:23.172 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-09 06:14:23.173 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-09 06:14:23.173 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-09 06:14:23.175 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-09 06:14:23.176 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-09 06:14:23.179 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-09 06:14:23.180 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-09 06:14:23.180 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-09 06:14:23.181 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-09 06:14:23.182 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-09 06:14:23.182 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-09 06:14:23.184 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-09 06:14:23.184 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-09 06:14:23.185 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-09 06:14:23.186 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-09 06:14:23.192 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 278444683596101070385710211879529582979721449986 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 09 04:56:21 UTC 2022 Final Date: Mon Nov 08 04:56:20 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [53:37:7c:d5:ac:48:9c:8b:bc:ee:3a:2b:ad:f2:e8:2a:d5:b3:09:24],[56:66:d1:a4] modulus: c5bc25caa3ed6768a5574e0e716f27f59e385a3766644b134b010131076c4953459c30cace689af71e65e5d84c90e41ad8dbac8dc0397aa92fd670880bbd45450d4a5cfee0822e7a5b6053a0590bcd6c612234616eecb39ca0add9391086bed66417694cc3d408682b9f8909967670e82280166898a49b5749563b4da77a2168fcbd76a6e2c4d6a2e0b2f6bd461bb95458e10188bbbf5eb1229445bee61674921a055b4aa99419535dff8ace6dd106bb25b542f192cba8af9159e06b6562b5734fe0297440ed2aab32443f8aab3a51283e77d48fc9ec6fdabd92bdf94088a1a4f70948f4620a768fe0a70947f5f103b40c5a30baf9304ee7f83a34372bc20427b95192e998af458e673358ad4e9ea7621fc444ce82276fe67d0a5a01de1cf2e4b458648acf40d6cf062b2af14763bce3a1d6ac598eff5e46d67fb4fa851c3b5cd2606c50b6222f8c903fe4a6a7ca2db1a044dc5269d9a05795e7650b22ee2baa52019cbd1688366d1013100a6f5ad1d8f8a8a2b5fc822e3246cf22b124c8a5f9 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3a54dda77af54437b88a6e6c59285ea65fa4d6f6 014bfd63fb1c51b09c9a203f1b562b88c3186a3a 674e1d090a602c04c2d4a97e7354129cdfbb80fb 6d8a1d35ee713696b20221d8c0f31a1aeea2a90c 8b6f267cc5e7d8d5c44966c49a439eeecd8dd9e3 920173bd9c9245148224878a65c8d1168c6d34db 2ea72af3629754789c7cd9b6ea2ad730346c1be5 4f427cf3407dc1eee8515dd1299e2e7246c7deff 1aa2fc1400dded16bace489dc871162732530c24 fbb4853ccabc61b1d197ac548b59f8b5e526026a 626d3217cc0e73f6a1ac2de6369a9ae4c8e4fdbe dc1ca7f87cdf960d3a09fa8cb565e4d386efbcdb a94f90b453c1a108a5672869d3b6958c897afcb1 08eda90d00f615f8bb0d104be8b5c829dd6f299c 4533917848bf25314ef249ca788371b937785d5d 5e8149e83017d45658362f6bb969d8819d8967ad b5b0d2db277a0362504f78618bd08cd0cad47d82 f773139be5d4b0076d8b3ecae11e7727c758085b f5f58c5193a291dfdbd52025958adf81f78e2d4e 58db3094 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [07:ea:c2:55:8a:e2:5a:e5:2a:34:d0:cf:87:a3:c3:46:5b:67:02:26],[56:66:d1:a4] modulus: c5f343bfdac366eec99c78195a885628f66a0221708d6a8e3e724e70b62410e0a6e4c57b825c9988c2f8b068575962efb1e8c15a75fd3d707681a6eae7ab0e555c62776f8423ee3ffb55cae023844fb122d135cba3950ea80eb2b6ed1dff803bf7abf87d6b87d2d57f2289b7322ca4bb49ee82ed2325be6bfd261a792cea86d880a066261e16861b6955527be584867a96decd311e63f6dbffd7a4a3031dad1ef618e97413e5288da0f32d7f798854ee258323efdb4bb8cccb758723b1173e265476b25a21a0c68dd26711fcb9ddae5bc4e2aa88cfefe7011e13ffdd6d912dacddd1bdd3d7419b9365fd94ecb8afc669ff76b38d64111f65ace833c44559fd9b public exponent: 10001 ] 2022-11-09 06:16:31.410 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-09 06:16:31.412 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-09 06:16:31.414 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-09 06:16:31.416 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-09 06:16:31.416 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-09 06:16:31.417 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-09 06:16:31.418 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-09 06:16:31.419 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-09 06:16:31.419 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-09 06:16:31.420 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-09 06:16:31.425 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-09 06:16:31.426 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-09 06:16:31.426 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-09 06:16:31.427 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-09 06:16:31.561 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-09 06:16:31.562 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-09 06:16:31.563 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-09 06:16:31.563 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-09 06:16:31.565 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-09 06:16:31.566 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-09 06:16:31.567 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-09 06:16:31.568 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-09 06:16:31.568 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-09 06:16:31.569 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-09 06:16:31.570 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-09 06:16:31.570 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-09 06:16:31.571 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-09 06:16:31.572 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-09 06:16:31.573 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-09 06:16:31.574 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-09 06:16:31.578 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 278444683596101070385710211879529582979721449986 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 09 04:56:21 UTC 2022 Final Date: Mon Nov 08 04:56:20 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [53:37:7c:d5:ac:48:9c:8b:bc:ee:3a:2b:ad:f2:e8:2a:d5:b3:09:24],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3a54dda77af54437b88a6e6c59285ea65fa4d6f6 014bfd63fb1c51b09c9a203f1b562b88c3186a3a 674e1d090a602c04c2d4a97e7354129cdfbb80fb 6d8a1d35ee713696b20221d8c0f31a1aeea2a90c 8b6f267cc5e7d8d5c44966c49a439eeecd8dd9e3 920173bd9c9245148224878a65c8d1168c6d34db 2ea72af3629754789c7cd9b6ea2ad730346c1be5 4f427cf3407dc1eee8515dd1299e2e7246c7deff 1aa2fc1400dded16bace489dc871162732530c24 fbb4853ccabc61b1d197ac548b59f8b5e526026a 626d3217cc0e73f6a1ac2de6369a9ae4c8e4fdbe dc1ca7f87cdf960d3a09fa8cb565e4d386efbcdb a94f90b453c1a108a5672869d3b6958c897afcb1 08eda90d00f615f8bb0d104be8b5c829dd6f299c 4533917848bf25314ef249ca788371b937785d5d 5e8149e83017d45658362f6bb969d8819d8967ad b5b0d2db277a0362504f78618bd08cd0cad47d82 f773139be5d4b0076d8b3ecae11e7727c758085b f5f58c5193a291dfdbd52025958adf81f78e2d4e 58db3094 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c9:45:33:87:80:e6:54:72:a1:75:0d:17:9d:b3:ee:1c:f2:16:4e:55],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-09 06:21:56.302 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-09 06:21:56.313 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-09 06:21:56.315 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-09 06:21:56.316 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-09 06:21:56.317 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-09 06:21:56.318 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-09 06:21:56.318 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-09 06:21:56.319 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-09 06:21:56.320 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-09 06:21:56.320 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-09 06:21:56.326 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-09 06:21:56.328 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-09 06:21:56.328 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-09 06:21:56.329 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-09 06:21:56.491 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-09 06:21:56.492 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-09 06:21:56.493 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-09 06:21:56.493 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-09 06:21:56.494 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-09 06:21:56.495 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-09 06:21:56.495 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-09 06:21:56.496 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-09 06:21:56.496 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-09 06:21:56.497 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-09 06:21:56.498 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-09 06:21:56.498 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-09 06:21:56.499 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-09 06:21:56.499 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-09 06:21:56.500 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-09 06:21:56.501 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-09 06:21:56.504 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 278444683596101070385710211879529582979721449986 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 09 04:56:21 UTC 2022 Final Date: Mon Nov 08 04:56:20 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [53:37:7c:d5:ac:48:9c:8b:bc:ee:3a:2b:ad:f2:e8:2a:d5:b3:09:24],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3a54dda77af54437b88a6e6c59285ea65fa4d6f6 014bfd63fb1c51b09c9a203f1b562b88c3186a3a 674e1d090a602c04c2d4a97e7354129cdfbb80fb 6d8a1d35ee713696b20221d8c0f31a1aeea2a90c 8b6f267cc5e7d8d5c44966c49a439eeecd8dd9e3 920173bd9c9245148224878a65c8d1168c6d34db 2ea72af3629754789c7cd9b6ea2ad730346c1be5 4f427cf3407dc1eee8515dd1299e2e7246c7deff 1aa2fc1400dded16bace489dc871162732530c24 fbb4853ccabc61b1d197ac548b59f8b5e526026a 626d3217cc0e73f6a1ac2de6369a9ae4c8e4fdbe dc1ca7f87cdf960d3a09fa8cb565e4d386efbcdb a94f90b453c1a108a5672869d3b6958c897afcb1 08eda90d00f615f8bb0d104be8b5c829dd6f299c 4533917848bf25314ef249ca788371b937785d5d 5e8149e83017d45658362f6bb969d8819d8967ad b5b0d2db277a0362504f78618bd08cd0cad47d82 f773139be5d4b0076d8b3ecae11e7727c758085b f5f58c5193a291dfdbd52025958adf81f78e2d4e 58db3094 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7f:58:84:c0:14:74:97:ce:7f:d4:cb:8f:70:de:bb:c3:33:fc:9d:0e],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-09 06:25:50.384 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-09 06:25:50.387 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-09 06:25:50.395 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-09 06:25:50.396 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-09 06:25:50.396 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-09 06:25:50.397 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-09 06:25:50.398 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-09 06:25:50.398 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-09 06:25:50.399 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-09 06:25:50.399 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-09 06:25:50.404 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-09 06:25:50.405 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-09 06:25:50.405 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-09 06:25:50.405 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-09 06:25:50.565 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-09 06:25:50.566 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-09 06:25:50.566 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-09 06:25:50.566 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-09 06:25:50.568 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-09 06:25:50.568 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-09 06:25:50.569 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-09 06:25:50.569 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-09 06:25:50.570 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-09 06:25:50.571 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-09 06:25:50.571 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-09 06:25:50.572 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-09 06:25:50.572 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-09 06:25:50.573 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-09 06:25:50.573 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-09 06:25:50.574 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-09 06:25:50.578 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 278444683596101070385710211879529582979721449986 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 09 04:56:21 UTC 2022 Final Date: Mon Nov 08 04:56:20 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [53:37:7c:d5:ac:48:9c:8b:bc:ee:3a:2b:ad:f2:e8:2a:d5:b3:09:24],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3a54dda77af54437b88a6e6c59285ea65fa4d6f6 014bfd63fb1c51b09c9a203f1b562b88c3186a3a 674e1d090a602c04c2d4a97e7354129cdfbb80fb 6d8a1d35ee713696b20221d8c0f31a1aeea2a90c 8b6f267cc5e7d8d5c44966c49a439eeecd8dd9e3 920173bd9c9245148224878a65c8d1168c6d34db 2ea72af3629754789c7cd9b6ea2ad730346c1be5 4f427cf3407dc1eee8515dd1299e2e7246c7deff 1aa2fc1400dded16bace489dc871162732530c24 fbb4853ccabc61b1d197ac548b59f8b5e526026a 626d3217cc0e73f6a1ac2de6369a9ae4c8e4fdbe dc1ca7f87cdf960d3a09fa8cb565e4d386efbcdb a94f90b453c1a108a5672869d3b6958c897afcb1 08eda90d00f615f8bb0d104be8b5c829dd6f299c 4533917848bf25314ef249ca788371b937785d5d 5e8149e83017d45658362f6bb969d8819d8967ad b5b0d2db277a0362504f78618bd08cd0cad47d82 f773139be5d4b0076d8b3ecae11e7727c758085b f5f58c5193a291dfdbd52025958adf81f78e2d4e 58db3094 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [aa:dd:c0:a5:3e:01:66:ab:94:e5:98:87:e0:df:ce:ae:e0:23:ac:cc],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-09 06:31:04.558 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-09 06:31:04.560 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-09 06:31:04.562 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-11-09 06:31:04.563 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-09 06:31:04.563 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-11-09 06:31:04.564 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-09 06:31:04.565 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-09 06:31:04.565 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-09 06:31:04.566 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-09 06:31:04.566 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-09 06:31:04.570 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-09 06:31:04.571 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-09 06:31:04.571 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-09 06:31:04.571 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-09 06:31:04.749 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-09 06:31:04.750 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-09 06:31:04.750 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-09 06:31:04.751 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-09 06:31:04.752 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-09 06:31:04.753 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-09 06:31:04.753 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-09 06:31:04.753 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-09 06:31:04.754 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-09 06:31:04.754 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-09 06:31:04.754 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-09 06:31:04.755 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-09 06:31:04.755 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-09 06:31:04.756 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-09 06:31:04.756 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-09 06:31:04.756 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-09 06:31:04.760 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 278444683596101070385710211879529582979721449986 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 09 04:56:21 UTC 2022 Final Date: Mon Nov 08 04:56:20 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [53:37:7c:d5:ac:48:9c:8b:bc:ee:3a:2b:ad:f2:e8:2a:d5:b3:09:24],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3a54dda77af54437b88a6e6c59285ea65fa4d6f6 014bfd63fb1c51b09c9a203f1b562b88c3186a3a 674e1d090a602c04c2d4a97e7354129cdfbb80fb 6d8a1d35ee713696b20221d8c0f31a1aeea2a90c 8b6f267cc5e7d8d5c44966c49a439eeecd8dd9e3 920173bd9c9245148224878a65c8d1168c6d34db 2ea72af3629754789c7cd9b6ea2ad730346c1be5 4f427cf3407dc1eee8515dd1299e2e7246c7deff 1aa2fc1400dded16bace489dc871162732530c24 fbb4853ccabc61b1d197ac548b59f8b5e526026a 626d3217cc0e73f6a1ac2de6369a9ae4c8e4fdbe dc1ca7f87cdf960d3a09fa8cb565e4d386efbcdb a94f90b453c1a108a5672869d3b6958c897afcb1 08eda90d00f615f8bb0d104be8b5c829dd6f299c 4533917848bf25314ef249ca788371b937785d5d 5e8149e83017d45658362f6bb969d8819d8967ad b5b0d2db277a0362504f78618bd08cd0cad47d82 f773139be5d4b0076d8b3ecae11e7727c758085b f5f58c5193a291dfdbd52025958adf81f78e2d4e 58db3094 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [63:e1:e0:e2:2a:ae:f8:c6:3e:4b:d5:e9:5b:0f:a5:4a:02:39:d8:7b],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-09 06:36:35.033 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-09 06:36:35.036 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-09 06:36:35.039 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-09 06:36:35.040 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-09 06:36:35.040 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-09 06:36:35.041 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-09 06:36:35.041 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-09 06:36:35.042 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-09 06:36:35.042 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-09 06:36:35.043 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-09 06:36:35.046 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-09 06:36:35.047 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-09 06:36:35.048 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-09 06:36:35.048 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-09 06:36:35.230 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-09 06:36:35.231 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-09 06:36:35.231 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-09 06:36:35.231 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-09 06:36:35.233 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-09 06:36:35.234 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-09 06:36:35.234 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-09 06:36:35.235 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-09 06:36:35.235 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-09 06:36:35.236 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-09 06:36:35.237 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-09 06:36:35.237 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-09 06:36:35.238 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-09 06:36:35.239 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-09 06:36:35.239 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-09 06:36:35.241 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-09 06:36:35.245 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 278444683596101070385710211879529582979721449986 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 09 04:56:21 UTC 2022 Final Date: Mon Nov 08 04:56:20 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [53:37:7c:d5:ac:48:9c:8b:bc:ee:3a:2b:ad:f2:e8:2a:d5:b3:09:24],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3a54dda77af54437b88a6e6c59285ea65fa4d6f6 014bfd63fb1c51b09c9a203f1b562b88c3186a3a 674e1d090a602c04c2d4a97e7354129cdfbb80fb 6d8a1d35ee713696b20221d8c0f31a1aeea2a90c 8b6f267cc5e7d8d5c44966c49a439eeecd8dd9e3 920173bd9c9245148224878a65c8d1168c6d34db 2ea72af3629754789c7cd9b6ea2ad730346c1be5 4f427cf3407dc1eee8515dd1299e2e7246c7deff 1aa2fc1400dded16bace489dc871162732530c24 fbb4853ccabc61b1d197ac548b59f8b5e526026a 626d3217cc0e73f6a1ac2de6369a9ae4c8e4fdbe dc1ca7f87cdf960d3a09fa8cb565e4d386efbcdb a94f90b453c1a108a5672869d3b6958c897afcb1 08eda90d00f615f8bb0d104be8b5c829dd6f299c 4533917848bf25314ef249ca788371b937785d5d 5e8149e83017d45658362f6bb969d8819d8967ad b5b0d2db277a0362504f78618bd08cd0cad47d82 f773139be5d4b0076d8b3ecae11e7727c758085b f5f58c5193a291dfdbd52025958adf81f78e2d4e 58db3094 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3d:2e:35:10:61:5c:df:54:f6:80:69:59:2b:44:45:7e:f2:c0:0f:b7],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-09 06:36:55.770 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-09 06:36:55.771 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-09 06:36:55.773 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-09 06:36:55.774 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-09 06:36:55.774 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-09 06:36:55.774 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-09 06:36:55.775 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-09 06:36:55.775 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-09 06:36:55.775 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-09 06:36:55.776 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-09 06:36:55.779 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-09 06:36:55.780 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-09 06:36:55.780 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-09 06:36:55.781 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-09 06:36:56.000 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-09 06:36:56.001 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-09 06:36:56.001 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-09 06:36:56.001 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-09 06:36:56.002 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-09 06:36:56.003 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-09 06:36:56.003 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-09 06:36:56.003 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-09 06:36:56.004 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-09 06:36:56.004 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-09 06:36:56.005 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-09 06:36:56.005 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-09 06:36:56.006 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-09 06:36:56.006 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-09 06:36:56.006 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-09 06:36:56.007 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-09 06:36:56.009 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 278444683596101070385710211879529582979721449986 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 09 04:56:21 UTC 2022 Final Date: Mon Nov 08 04:56:20 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [53:37:7c:d5:ac:48:9c:8b:bc:ee:3a:2b:ad:f2:e8:2a:d5:b3:09:24],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3a54dda77af54437b88a6e6c59285ea65fa4d6f6 014bfd63fb1c51b09c9a203f1b562b88c3186a3a 674e1d090a602c04c2d4a97e7354129cdfbb80fb 6d8a1d35ee713696b20221d8c0f31a1aeea2a90c 8b6f267cc5e7d8d5c44966c49a439eeecd8dd9e3 920173bd9c9245148224878a65c8d1168c6d34db 2ea72af3629754789c7cd9b6ea2ad730346c1be5 4f427cf3407dc1eee8515dd1299e2e7246c7deff 1aa2fc1400dded16bace489dc871162732530c24 fbb4853ccabc61b1d197ac548b59f8b5e526026a 626d3217cc0e73f6a1ac2de6369a9ae4c8e4fdbe dc1ca7f87cdf960d3a09fa8cb565e4d386efbcdb a94f90b453c1a108a5672869d3b6958c897afcb1 08eda90d00f615f8bb0d104be8b5c829dd6f299c 4533917848bf25314ef249ca788371b937785d5d 5e8149e83017d45658362f6bb969d8819d8967ad b5b0d2db277a0362504f78618bd08cd0cad47d82 f773139be5d4b0076d8b3ecae11e7727c758085b f5f58c5193a291dfdbd52025958adf81f78e2d4e 58db3094 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8d:b7:63:bf:17:c2:dc:ba:33:77:86:f3:20:b0:a1:bf:80:17:e4:1a],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-09 06:55:00.661 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-09 06:55:00.664 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-09 06:55:00.667 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-09 06:55:00.668 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-09 06:55:00.669 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-09 06:55:00.671 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-09 06:55:00.672 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-09 06:55:00.672 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-09 06:55:00.673 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-09 06:55:00.674 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-09 06:55:00.678 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-09 06:55:00.679 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-09 06:55:00.679 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-09 06:55:00.680 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-09 06:55:00.849 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-09 06:55:00.849 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-09 06:55:00.850 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-09 06:55:00.850 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-09 06:55:00.851 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-09 06:55:00.852 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-09 06:55:00.852 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-09 06:55:00.852 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-09 06:55:00.853 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-09 06:55:00.853 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-09 06:55:00.854 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-09 06:55:00.854 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-09 06:55:00.855 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-09 06:55:00.855 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-09 06:55:00.855 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-09 06:55:00.856 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-09 06:55:00.859 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 278444683596101070385710211879529582979721449986 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 09 04:56:21 UTC 2022 Final Date: Mon Nov 08 04:56:20 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [53:37:7c:d5:ac:48:9c:8b:bc:ee:3a:2b:ad:f2:e8:2a:d5:b3:09:24],[56:66:d1:a4] modulus: c5bc25caa3ed6768a5574e0e716f27f59e385a3766644b134b010131076c4953459c30cace689af71e65e5d84c90e41ad8dbac8dc0397aa92fd670880bbd45450d4a5cfee0822e7a5b6053a0590bcd6c612234616eecb39ca0add9391086bed66417694cc3d408682b9f8909967670e82280166898a49b5749563b4da77a2168fcbd76a6e2c4d6a2e0b2f6bd461bb95458e10188bbbf5eb1229445bee61674921a055b4aa99419535dff8ace6dd106bb25b542f192cba8af9159e06b6562b5734fe0297440ed2aab32443f8aab3a51283e77d48fc9ec6fdabd92bdf94088a1a4f70948f4620a768fe0a70947f5f103b40c5a30baf9304ee7f83a34372bc20427b95192e998af458e673358ad4e9ea7621fc444ce82276fe67d0a5a01de1cf2e4b458648acf40d6cf062b2af14763bce3a1d6ac598eff5e46d67fb4fa851c3b5cd2606c50b6222f8c903fe4a6a7ca2db1a044dc5269d9a05795e7650b22ee2baa52019cbd1688366d1013100a6f5ad1d8f8a8a2b5fc822e3246cf22b124c8a5f9 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3a54dda77af54437b88a6e6c59285ea65fa4d6f6 014bfd63fb1c51b09c9a203f1b562b88c3186a3a 674e1d090a602c04c2d4a97e7354129cdfbb80fb 6d8a1d35ee713696b20221d8c0f31a1aeea2a90c 8b6f267cc5e7d8d5c44966c49a439eeecd8dd9e3 920173bd9c9245148224878a65c8d1168c6d34db 2ea72af3629754789c7cd9b6ea2ad730346c1be5 4f427cf3407dc1eee8515dd1299e2e7246c7deff 1aa2fc1400dded16bace489dc871162732530c24 fbb4853ccabc61b1d197ac548b59f8b5e526026a 626d3217cc0e73f6a1ac2de6369a9ae4c8e4fdbe dc1ca7f87cdf960d3a09fa8cb565e4d386efbcdb a94f90b453c1a108a5672869d3b6958c897afcb1 08eda90d00f615f8bb0d104be8b5c829dd6f299c 4533917848bf25314ef249ca788371b937785d5d 5e8149e83017d45658362f6bb969d8819d8967ad b5b0d2db277a0362504f78618bd08cd0cad47d82 f773139be5d4b0076d8b3ecae11e7727c758085b f5f58c5193a291dfdbd52025958adf81f78e2d4e 58db3094 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [75:5e:c3:1c:4d:f7:b1:d2:fc:f7:c9:90:a3:56:0f:aa:2e:b5:b3:aa],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-09 06:55:06.159 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-09 06:55:06.160 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-09 06:55:06.161 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-09 06:55:06.161 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-09 06:55:06.162 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-09 06:55:06.162 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-09 06:55:06.163 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-09 06:55:06.163 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-09 06:55:06.163 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-09 06:55:06.164 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-09 06:55:06.167 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-09 06:55:06.168 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-09 06:55:06.168 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-09 06:55:06.168 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-09 06:55:06.266 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-09 06:55:06.266 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-09 06:55:06.267 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-09 06:55:06.267 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-09 06:55:06.268 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-09 06:55:06.269 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-09 06:55:06.269 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-09 06:55:06.270 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-09 06:55:06.270 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-09 06:55:06.270 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-09 06:55:06.271 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-09 06:55:06.271 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-09 06:55:06.272 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-09 06:55:06.272 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-09 06:55:06.272 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-09 06:55:06.273 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-09 06:55:06.276 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 278444683596101070385710211879529582979721449986 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 09 04:56:21 UTC 2022 Final Date: Mon Nov 08 04:56:20 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [53:37:7c:d5:ac:48:9c:8b:bc:ee:3a:2b:ad:f2:e8:2a:d5:b3:09:24],[56:66:d1:a4] modulus: c5bc25caa3ed6768a5574e0e716f27f59e385a3766644b134b010131076c4953459c30cace689af71e65e5d84c90e41ad8dbac8dc0397aa92fd670880bbd45450d4a5cfee0822e7a5b6053a0590bcd6c612234616eecb39ca0add9391086bed66417694cc3d408682b9f8909967670e82280166898a49b5749563b4da77a2168fcbd76a6e2c4d6a2e0b2f6bd461bb95458e10188bbbf5eb1229445bee61674921a055b4aa99419535dff8ace6dd106bb25b542f192cba8af9159e06b6562b5734fe0297440ed2aab32443f8aab3a51283e77d48fc9ec6fdabd92bdf94088a1a4f70948f4620a768fe0a70947f5f103b40c5a30baf9304ee7f83a34372bc20427b95192e998af458e673358ad4e9ea7621fc444ce82276fe67d0a5a01de1cf2e4b458648acf40d6cf062b2af14763bce3a1d6ac598eff5e46d67fb4fa851c3b5cd2606c50b6222f8c903fe4a6a7ca2db1a044dc5269d9a05795e7650b22ee2baa52019cbd1688366d1013100a6f5ad1d8f8a8a2b5fc822e3246cf22b124c8a5f9 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 3a54dda77af54437b88a6e6c59285ea65fa4d6f6 014bfd63fb1c51b09c9a203f1b562b88c3186a3a 674e1d090a602c04c2d4a97e7354129cdfbb80fb 6d8a1d35ee713696b20221d8c0f31a1aeea2a90c 8b6f267cc5e7d8d5c44966c49a439eeecd8dd9e3 920173bd9c9245148224878a65c8d1168c6d34db 2ea72af3629754789c7cd9b6ea2ad730346c1be5 4f427cf3407dc1eee8515dd1299e2e7246c7deff 1aa2fc1400dded16bace489dc871162732530c24 fbb4853ccabc61b1d197ac548b59f8b5e526026a 626d3217cc0e73f6a1ac2de6369a9ae4c8e4fdbe dc1ca7f87cdf960d3a09fa8cb565e4d386efbcdb a94f90b453c1a108a5672869d3b6958c897afcb1 08eda90d00f615f8bb0d104be8b5c829dd6f299c 4533917848bf25314ef249ca788371b937785d5d 5e8149e83017d45658362f6bb969d8819d8967ad b5b0d2db277a0362504f78618bd08cd0cad47d82 f773139be5d4b0076d8b3ecae11e7727c758085b f5f58c5193a291dfdbd52025958adf81f78e2d4e 58db3094 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0c:28:21:e4:d0:ea:cb:ae:65:93:94:9a:f0:2f:45:1e:34:86:e3:0e],[56:66:d1:a4] modulus: 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 public exponent: 10001 ]