By type
2022-11-16 04:59:22,788 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-11-16 04:59:24,186 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-11-16 04:59:24.970 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Nov 16, 2022 4:59:26 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Nov 16, 2022 4:59:26 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Nov 16, 2022 4:59:26 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Nov 16, 2022 4:59:26 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-11-16 04:59:27.476 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-11-16 04:59:27.765 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-11-16 04:59:27.935 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-11-16 04:59:28.648 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-11-16 04:59:28.650 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-11-16 04:59:28.652 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-11-16 04:59:28.656 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-11-16 04:59:28.698 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-11-16 04:59:28.701 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-11-16 04:59:28.841 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-11-16 04:59:29.459 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Nov 16, 2022 4:59:30 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-11-16 04:59:30.475 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 8.565 seconds (JVM running for 10.359) Nov 16, 2022 4:59:50 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-11-16 05:00:06.375 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-16 05:00:06.382 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-16 05:00:06.419 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-11-16 05:00:06.422 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-16 05:00:06.438 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-11-16 05:00:06.440 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-16 05:00:06.440 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-16 05:00:06.442 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-16 05:00:06.442 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-16 05:00:06.446 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-16 05:00:06.454 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-16 05:00:06.457 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-16 05:00:06.510 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-16 05:00:06.516 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-16 05:00:06.516 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-16 05:00:06.519 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-16 05:00:07.104 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-16 05:00:07.107 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-16 05:00:07.107 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-16 05:00:07.109 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-16 05:00:07.119 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-16 05:00:07.120 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-16 05:00:07.121 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-16 05:00:07.121 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-16 05:00:07.122 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-16 05:00:07.139 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-16 05:00:07.140 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-16 05:00:07.140 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-16 05:00:07.146 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-16 05:00:07.147 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-16 05:00:07.147 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-16 05:00:07.149 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-16 05:00:07.184 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 413390169427257302193341568586567007919836384503 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 16 04:57:15 UTC 2022 Final Date: Mon Nov 15 04:57:14 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [27:68:37:71:f2:e8:30:d5:4d:08:3b:b5:e9:43:47:cb:7e:70:1e:3d],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8b1b1e5854c1c42a18025786f98ef5a2230188e7 5a4118de683cdd1831feaa906438d59db32efc33 a8cccabcc7c4f901469940cd5095e50c3880ee52 c8f15d5d8a2d1fbf7f91ca8b262a4fa51b8d0e31 6ec828cc0bb9d11f01b673dbde093fcca02ce7f8 ef38935095b81f67cbaea9aa213985e709250721 f5970e832ae8fa5e5a5e4413cf25b94fa9b5234b 24d8293d9bb701658fb98efdbae838f3a46daeeb 8e211852aa2f4b9f6f71e24ff4cd77f272b23a1a 81c0edb42b753f4c8f855557c88db34539b4239b c7f6ff2c1fc2afead1105194c9357f8611956113 0186d7d6f3b7772abd900a21d286234e6cc2696f 18b10b1148aea1299c4b36982cc971fbc3a673a1 8c8c96ff28ef2e3d08fc9ad924d7bd0a27e0cb57 e3da12774d65b39ed68f916d9e3dc32080242f66 7cf7f5776009829df6b785e977e94acddbda01de 99853c818493e4172769d9c9bbb9029033a4bc3c 7a861a8197e498aee0c78b74d2aacd889e36238d 8a6cf3599f8bd7f6dfae32b4b0c20a7bb69a8b9a e0b85818 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [36:a6:5b:9b:9e:76:98:ed:e1:c8:5e:11:f4:ff:94:27:b4:bd:2c:ed],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-16 06:25:53.429 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-16 06:25:53.433 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-16 06:25:53.436 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-16 06:25:53.437 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-16 06:25:53.438 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-16 06:25:53.438 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-16 06:25:53.439 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-16 06:25:53.439 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-16 06:25:53.440 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-16 06:25:53.441 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-16 06:25:53.445 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-16 06:25:53.447 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-16 06:25:53.447 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-16 06:25:53.447 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-16 06:25:53.642 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-16 06:25:53.643 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-16 06:25:53.643 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-16 06:25:53.643 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-16 06:25:53.648 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-16 06:25:53.649 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-16 06:25:53.650 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-16 06:25:53.651 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-16 06:25:53.651 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-16 06:25:53.653 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-16 06:25:53.654 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-16 06:25:53.655 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-16 06:25:53.657 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-16 06:25:53.657 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-16 06:25:53.659 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-16 06:25:53.660 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-16 06:25:53.669 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 413390169427257302193341568586567007919836384503 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 16 04:57:15 UTC 2022 Final Date: Mon Nov 15 04:57:14 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [27:68:37:71:f2:e8:30:d5:4d:08:3b:b5:e9:43:47:cb:7e:70:1e:3d],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8b1b1e5854c1c42a18025786f98ef5a2230188e7 5a4118de683cdd1831feaa906438d59db32efc33 a8cccabcc7c4f901469940cd5095e50c3880ee52 c8f15d5d8a2d1fbf7f91ca8b262a4fa51b8d0e31 6ec828cc0bb9d11f01b673dbde093fcca02ce7f8 ef38935095b81f67cbaea9aa213985e709250721 f5970e832ae8fa5e5a5e4413cf25b94fa9b5234b 24d8293d9bb701658fb98efdbae838f3a46daeeb 8e211852aa2f4b9f6f71e24ff4cd77f272b23a1a 81c0edb42b753f4c8f855557c88db34539b4239b c7f6ff2c1fc2afead1105194c9357f8611956113 0186d7d6f3b7772abd900a21d286234e6cc2696f 18b10b1148aea1299c4b36982cc971fbc3a673a1 8c8c96ff28ef2e3d08fc9ad924d7bd0a27e0cb57 e3da12774d65b39ed68f916d9e3dc32080242f66 7cf7f5776009829df6b785e977e94acddbda01de 99853c818493e4172769d9c9bbb9029033a4bc3c 7a861a8197e498aee0c78b74d2aacd889e36238d 8a6cf3599f8bd7f6dfae32b4b0c20a7bb69a8b9a e0b85818 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4b:ef:7b:bf:56:26:a9:46:a3:8c:e5:61:fa:6a:39:6f:a4:c4:90:14],[56:66:d1:a4] modulus: 96d4f964c5c4edd00a46a3303d34367233c5dca7631be84b9e2f71b9dd144e4c0145fdd0c1aa2fef3b70825bd345337949245ece5a92dd47feb858c88d787901fc9093427a2d860eb503ad612fdcb81449f893cfe0ddf9370771b9996e37efe1fa9a99064826650a366603baa77d6d08b768723441efb3dffef0addd37a8f28ead1d7a9e45e8318cba79d3605ba934bc3a01598b14a1fd07d3a2126765a33c6db020d965f507cccf2eb9981ef187a070605825a737e425d79d4a3eafe67fea6db2d9509dd85af2e779a90591b6926f5af63e62f4f3ef553969db644a01a08c165edc6892d6d8bbb1a8083f1d7e8415aa2f6b07102357139bf5217d77866c8fcb public exponent: 10001 ] 2022-11-16 06:27:24.889 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-16 06:27:24.891 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-16 06:27:24.894 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-11-16 06:27:24.895 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-16 06:27:24.896 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-11-16 06:27:24.904 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-16 06:27:24.905 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-16 06:27:24.906 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-16 06:27:24.906 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-16 06:27:24.908 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-16 06:27:24.919 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-16 06:27:24.920 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-16 06:27:24.921 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-16 06:27:24.921 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-16 06:27:25.080 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-16 06:27:25.081 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-16 06:27:25.082 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-16 06:27:25.082 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-16 06:27:25.084 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-16 06:27:25.085 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-16 06:27:25.086 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-16 06:27:25.086 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-16 06:27:25.087 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-16 06:27:25.088 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-16 06:27:25.088 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-16 06:27:25.089 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-16 06:27:25.089 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-16 06:27:25.090 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-16 06:27:25.090 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-16 06:27:25.091 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-16 06:27:25.095 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 413390169427257302193341568586567007919836384503 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 16 04:57:15 UTC 2022 Final Date: Mon Nov 15 04:57:14 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [27:68:37:71:f2:e8:30:d5:4d:08:3b:b5:e9:43:47:cb:7e:70:1e:3d],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8b1b1e5854c1c42a18025786f98ef5a2230188e7 5a4118de683cdd1831feaa906438d59db32efc33 a8cccabcc7c4f901469940cd5095e50c3880ee52 c8f15d5d8a2d1fbf7f91ca8b262a4fa51b8d0e31 6ec828cc0bb9d11f01b673dbde093fcca02ce7f8 ef38935095b81f67cbaea9aa213985e709250721 f5970e832ae8fa5e5a5e4413cf25b94fa9b5234b 24d8293d9bb701658fb98efdbae838f3a46daeeb 8e211852aa2f4b9f6f71e24ff4cd77f272b23a1a 81c0edb42b753f4c8f855557c88db34539b4239b c7f6ff2c1fc2afead1105194c9357f8611956113 0186d7d6f3b7772abd900a21d286234e6cc2696f 18b10b1148aea1299c4b36982cc971fbc3a673a1 8c8c96ff28ef2e3d08fc9ad924d7bd0a27e0cb57 e3da12774d65b39ed68f916d9e3dc32080242f66 7cf7f5776009829df6b785e977e94acddbda01de 99853c818493e4172769d9c9bbb9029033a4bc3c 7a861a8197e498aee0c78b74d2aacd889e36238d 8a6cf3599f8bd7f6dfae32b4b0c20a7bb69a8b9a e0b85818 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [01:7b:09:ba:a5:5a:59:41:1d:6c:63:1d:4d:9f:0e:45:d7:85:75:5c],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-16 06:29:17.938 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-16 06:29:17.942 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-16 06:29:17.944 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-11-16 06:29:17.945 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-16 06:29:17.946 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-11-16 06:29:17.947 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-16 06:29:17.947 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-16 06:29:17.948 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-16 06:29:17.948 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-16 06:29:17.948 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-16 06:29:17.953 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-16 06:29:17.954 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-16 06:29:17.955 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-16 06:29:17.955 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-16 06:29:18.104 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-16 06:29:18.109 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-16 06:29:18.109 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-16 06:29:18.109 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-16 06:29:18.118 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-16 06:29:18.119 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-16 06:29:18.119 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-16 06:29:18.120 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-16 06:29:18.123 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-16 06:29:18.124 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-16 06:29:18.125 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-16 06:29:18.125 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-16 06:29:18.126 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-16 06:29:18.126 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-16 06:29:18.127 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-16 06:29:18.128 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-16 06:29:18.133 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 413390169427257302193341568586567007919836384503 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 16 04:57:15 UTC 2022 Final Date: Mon Nov 15 04:57:14 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [27:68:37:71:f2:e8:30:d5:4d:08:3b:b5:e9:43:47:cb:7e:70:1e:3d],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8b1b1e5854c1c42a18025786f98ef5a2230188e7 5a4118de683cdd1831feaa906438d59db32efc33 a8cccabcc7c4f901469940cd5095e50c3880ee52 c8f15d5d8a2d1fbf7f91ca8b262a4fa51b8d0e31 6ec828cc0bb9d11f01b673dbde093fcca02ce7f8 ef38935095b81f67cbaea9aa213985e709250721 f5970e832ae8fa5e5a5e4413cf25b94fa9b5234b 24d8293d9bb701658fb98efdbae838f3a46daeeb 8e211852aa2f4b9f6f71e24ff4cd77f272b23a1a 81c0edb42b753f4c8f855557c88db34539b4239b c7f6ff2c1fc2afead1105194c9357f8611956113 0186d7d6f3b7772abd900a21d286234e6cc2696f 18b10b1148aea1299c4b36982cc971fbc3a673a1 8c8c96ff28ef2e3d08fc9ad924d7bd0a27e0cb57 e3da12774d65b39ed68f916d9e3dc32080242f66 7cf7f5776009829df6b785e977e94acddbda01de 99853c818493e4172769d9c9bbb9029033a4bc3c 7a861a8197e498aee0c78b74d2aacd889e36238d 8a6cf3599f8bd7f6dfae32b4b0c20a7bb69a8b9a e0b85818 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [39:d4:52:07:c1:1f:a2:00:5c:75:6a:e7:d2:15:3b:07:2a:5d:b9:a9],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-16 06:31:48.245 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-16 06:31:48.246 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-16 06:31:48.248 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-16 06:31:48.248 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-16 06:31:48.249 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-16 06:31:48.249 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-16 06:31:48.250 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-16 06:31:48.251 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-16 06:31:48.251 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-16 06:31:48.251 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-16 06:31:48.255 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-16 06:31:48.256 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-16 06:31:48.256 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-16 06:31:48.257 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-16 06:31:48.450 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-16 06:31:48.450 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-16 06:31:48.451 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-16 06:31:48.451 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-16 06:31:48.452 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-16 06:31:48.453 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-16 06:31:48.453 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-16 06:31:48.454 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-16 06:31:48.454 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-16 06:31:48.455 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-16 06:31:48.455 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-16 06:31:48.455 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-16 06:31:48.456 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-16 06:31:48.456 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-16 06:31:48.457 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-16 06:31:48.457 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-16 06:31:48.467 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 413390169427257302193341568586567007919836384503 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 16 04:57:15 UTC 2022 Final Date: Mon Nov 15 04:57:14 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [27:68:37:71:f2:e8:30:d5:4d:08:3b:b5:e9:43:47:cb:7e:70:1e:3d],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8b1b1e5854c1c42a18025786f98ef5a2230188e7 5a4118de683cdd1831feaa906438d59db32efc33 a8cccabcc7c4f901469940cd5095e50c3880ee52 c8f15d5d8a2d1fbf7f91ca8b262a4fa51b8d0e31 6ec828cc0bb9d11f01b673dbde093fcca02ce7f8 ef38935095b81f67cbaea9aa213985e709250721 f5970e832ae8fa5e5a5e4413cf25b94fa9b5234b 24d8293d9bb701658fb98efdbae838f3a46daeeb 8e211852aa2f4b9f6f71e24ff4cd77f272b23a1a 81c0edb42b753f4c8f855557c88db34539b4239b c7f6ff2c1fc2afead1105194c9357f8611956113 0186d7d6f3b7772abd900a21d286234e6cc2696f 18b10b1148aea1299c4b36982cc971fbc3a673a1 8c8c96ff28ef2e3d08fc9ad924d7bd0a27e0cb57 e3da12774d65b39ed68f916d9e3dc32080242f66 7cf7f5776009829df6b785e977e94acddbda01de 99853c818493e4172769d9c9bbb9029033a4bc3c 7a861a8197e498aee0c78b74d2aacd889e36238d 8a6cf3599f8bd7f6dfae32b4b0c20a7bb69a8b9a e0b85818 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [29:33:6d:f7:16:d4:8e:ec:27:88:8a:e1:b1:46:fc:06:01:5c:28:26],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-16 06:38:23.315 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-16 06:38:23.320 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-16 06:38:23.322 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-16 06:38:23.324 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-16 06:38:23.324 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-16 06:38:23.325 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-16 06:38:23.325 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-16 06:38:23.326 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-16 06:38:23.326 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-16 06:38:23.327 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-16 06:38:23.334 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-16 06:38:23.335 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-16 06:38:23.335 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-16 06:38:23.336 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-16 06:38:23.506 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-16 06:38:23.507 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-16 06:38:23.508 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-16 06:38:23.508 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-16 06:38:23.510 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-16 06:38:23.510 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-16 06:38:23.510 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-16 06:38:23.511 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-16 06:38:23.511 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-16 06:38:23.512 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-16 06:38:23.514 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-16 06:38:23.514 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-16 06:38:23.515 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-16 06:38:23.515 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-16 06:38:23.515 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-16 06:38:23.516 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-16 06:38:23.520 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 413390169427257302193341568586567007919836384503 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 16 04:57:15 UTC 2022 Final Date: Mon Nov 15 04:57:14 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [27:68:37:71:f2:e8:30:d5:4d:08:3b:b5:e9:43:47:cb:7e:70:1e:3d],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8b1b1e5854c1c42a18025786f98ef5a2230188e7 5a4118de683cdd1831feaa906438d59db32efc33 a8cccabcc7c4f901469940cd5095e50c3880ee52 c8f15d5d8a2d1fbf7f91ca8b262a4fa51b8d0e31 6ec828cc0bb9d11f01b673dbde093fcca02ce7f8 ef38935095b81f67cbaea9aa213985e709250721 f5970e832ae8fa5e5a5e4413cf25b94fa9b5234b 24d8293d9bb701658fb98efdbae838f3a46daeeb 8e211852aa2f4b9f6f71e24ff4cd77f272b23a1a 81c0edb42b753f4c8f855557c88db34539b4239b c7f6ff2c1fc2afead1105194c9357f8611956113 0186d7d6f3b7772abd900a21d286234e6cc2696f 18b10b1148aea1299c4b36982cc971fbc3a673a1 8c8c96ff28ef2e3d08fc9ad924d7bd0a27e0cb57 e3da12774d65b39ed68f916d9e3dc32080242f66 7cf7f5776009829df6b785e977e94acddbda01de 99853c818493e4172769d9c9bbb9029033a4bc3c 7a861a8197e498aee0c78b74d2aacd889e36238d 8a6cf3599f8bd7f6dfae32b4b0c20a7bb69a8b9a e0b85818 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d9:85:d6:38:e8:97:60:63:ee:3f:27:32:ba:04:32:4b:20:3d:93:44],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-16 06:43:48.357 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-16 06:43:48.363 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-16 06:43:48.367 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-16 06:43:48.369 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-16 06:43:48.369 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-16 06:43:48.371 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-16 06:43:48.372 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-16 06:43:48.373 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-16 06:43:48.374 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-16 06:43:48.374 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-16 06:43:48.380 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-16 06:43:48.382 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-16 06:43:48.382 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-16 06:43:48.383 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-16 06:43:48.548 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-16 06:43:48.549 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-16 06:43:48.549 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-16 06:43:48.549 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-16 06:43:48.551 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-16 06:43:48.551 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-16 06:43:48.552 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-16 06:43:48.552 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-16 06:43:48.553 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-16 06:43:48.554 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-16 06:43:48.554 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-16 06:43:48.555 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-16 06:43:48.555 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-16 06:43:48.556 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-16 06:43:48.556 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-16 06:43:48.557 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-16 06:43:48.561 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 413390169427257302193341568586567007919836384503 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 16 04:57:15 UTC 2022 Final Date: Mon Nov 15 04:57:14 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [27:68:37:71:f2:e8:30:d5:4d:08:3b:b5:e9:43:47:cb:7e:70:1e:3d],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8b1b1e5854c1c42a18025786f98ef5a2230188e7 5a4118de683cdd1831feaa906438d59db32efc33 a8cccabcc7c4f901469940cd5095e50c3880ee52 c8f15d5d8a2d1fbf7f91ca8b262a4fa51b8d0e31 6ec828cc0bb9d11f01b673dbde093fcca02ce7f8 ef38935095b81f67cbaea9aa213985e709250721 f5970e832ae8fa5e5a5e4413cf25b94fa9b5234b 24d8293d9bb701658fb98efdbae838f3a46daeeb 8e211852aa2f4b9f6f71e24ff4cd77f272b23a1a 81c0edb42b753f4c8f855557c88db34539b4239b c7f6ff2c1fc2afead1105194c9357f8611956113 0186d7d6f3b7772abd900a21d286234e6cc2696f 18b10b1148aea1299c4b36982cc971fbc3a673a1 8c8c96ff28ef2e3d08fc9ad924d7bd0a27e0cb57 e3da12774d65b39ed68f916d9e3dc32080242f66 7cf7f5776009829df6b785e977e94acddbda01de 99853c818493e4172769d9c9bbb9029033a4bc3c 7a861a8197e498aee0c78b74d2aacd889e36238d 8a6cf3599f8bd7f6dfae32b4b0c20a7bb69a8b9a e0b85818 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4e:11:0b:7c:fe:d1:f2:a4:53:92:97:a4:42:aa:44:de:82:0e:13:a2],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-16 06:50:20.294 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-16 06:50:20.299 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-16 06:50:20.302 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-11-16 06:50:20.303 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-16 06:50:20.304 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-11-16 06:50:20.305 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-16 06:50:20.305 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-16 06:50:20.306 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-16 06:50:20.306 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-16 06:50:20.307 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-16 06:50:20.312 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-16 06:50:20.313 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-16 06:50:20.313 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-16 06:50:20.314 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-16 06:50:20.474 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-16 06:50:20.475 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-16 06:50:20.476 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-16 06:50:20.476 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-16 06:50:20.478 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-16 06:50:20.479 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-16 06:50:20.479 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-16 06:50:20.480 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-16 06:50:20.480 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-16 06:50:20.482 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-16 06:50:20.482 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-16 06:50:20.482 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-16 06:50:20.483 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-16 06:50:20.484 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-16 06:50:20.484 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-16 06:50:20.485 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-16 06:50:20.489 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 413390169427257302193341568586567007919836384503 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 16 04:57:15 UTC 2022 Final Date: Mon Nov 15 04:57:14 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [27:68:37:71:f2:e8:30:d5:4d:08:3b:b5:e9:43:47:cb:7e:70:1e:3d],[56:66:d1:a4] modulus: bf1484fc0bd901fedac40cae26736a12c70f7e08b73d9840663f8eb8128e9d43dcb5f487b51536070621f42d80f563b05536fbdb5345ef69199c68640a08ebad6426c6a89486da990a56b1b6e1e9f8e47a97202141addc741f85ee651c3b50c3788bef24a22297c09a5040548acc9c0469dc2c85cbb0f60f0c2c61e3000ff7132e2366c6933f743aba22df10471bb46dc8e6bc4569f10b6f4e93fe2bcc61f854e0b48329a6150b2640f00406da0f1ef7bf4bbd15ccf15add4cf8eb10811a53d4e229e91633151be40ae15a5eb5df80da691b02fdec3b26e66b9db7b60aa4c9bc8b04d5786910d5c1238ed5b14a434411b3ea93599e25c86b538a9eb6b0ac284792f253fd60d69e3b1e64cf9005d48208dcf96f438aaeda57bdc2a609358513d5beb47a614060270aa87f854d67e26fe5d8a61adc74d57c4a5e435003fdd33e440c083e3eb995a4bca30345ac8175005213f5a286bc148cfd971f626fd4af18e245cbee7088e17ae2a8d037cb93ab5de9cce18b72dfefb7fd9676fc767c85f885 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8b1b1e5854c1c42a18025786f98ef5a2230188e7 5a4118de683cdd1831feaa906438d59db32efc33 a8cccabcc7c4f901469940cd5095e50c3880ee52 c8f15d5d8a2d1fbf7f91ca8b262a4fa51b8d0e31 6ec828cc0bb9d11f01b673dbde093fcca02ce7f8 ef38935095b81f67cbaea9aa213985e709250721 f5970e832ae8fa5e5a5e4413cf25b94fa9b5234b 24d8293d9bb701658fb98efdbae838f3a46daeeb 8e211852aa2f4b9f6f71e24ff4cd77f272b23a1a 81c0edb42b753f4c8f855557c88db34539b4239b c7f6ff2c1fc2afead1105194c9357f8611956113 0186d7d6f3b7772abd900a21d286234e6cc2696f 18b10b1148aea1299c4b36982cc971fbc3a673a1 8c8c96ff28ef2e3d08fc9ad924d7bd0a27e0cb57 e3da12774d65b39ed68f916d9e3dc32080242f66 7cf7f5776009829df6b785e977e94acddbda01de 99853c818493e4172769d9c9bbb9029033a4bc3c 7a861a8197e498aee0c78b74d2aacd889e36238d 8a6cf3599f8bd7f6dfae32b4b0c20a7bb69a8b9a e0b85818 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7e:0a:2f:cd:ff:b0:4b:23:ea:04:d6:f9:cc:f0:e0:38:5b:a0:38:d9],[56:66:d1:a4] modulus: b95fc2a4874bd35647039a541df486ae9da38a182c453e7ff19ca69d22ce1c4a18c762c71bf313a5e24702f508620685246de0927e9e5e6212bc5e266f49fc4ab38bfeb8e759bd41da70e12fc4999a6a9783899d6045dd3ab0c196e7a30354e78846a50ed220a5fd63134062c7feb916a155837ec7a8a779112b4e1bb544ddd7859ae7dabef9a15597e63c795fb160b3cc4169b823d8eb2fe66e17654732497e7699ea2478dee0265a7ebfd3d1b779de5f9c5c7c1d167c155ff10e0a54a9fec09a313f4019f7919e585fe27c949783b54b5c2245e6626cce246d70b73010000fe33e2332754db32c9da6ea9f080da6880404d6cccec9f4917dbd574c3bcde7cb public exponent: 10001 ] 2022-11-16 06:55:49.833 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-16 06:55:49.835 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-16 06:55:49.837 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-16 06:55:49.838 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-16 06:55:49.838 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-16 06:55:49.839 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-16 06:55:49.839 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-16 06:55:49.840 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-16 06:55:49.840 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-16 06:55:49.841 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-16 06:55:49.845 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-16 06:55:49.845 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-16 06:55:49.846 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-16 06:55:49.846 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-16 06:55:49.968 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-16 06:55:49.968 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-16 06:55:49.969 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-16 06:55:49.969 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-16 06:55:49.971 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-16 06:55:49.971 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-16 06:55:49.972 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-16 06:55:49.972 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-16 06:55:49.972 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-16 06:55:49.973 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-16 06:55:49.973 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-16 06:55:49.974 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-16 06:55:49.975 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-16 06:55:49.975 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-16 06:55:49.975 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-16 06:55:49.976 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-16 06:55:49.979 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 413390169427257302193341568586567007919836384503 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 16 04:57:15 UTC 2022 Final Date: Mon Nov 15 04:57:14 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [27:68:37:71:f2:e8:30:d5:4d:08:3b:b5:e9:43:47:cb:7e:70:1e:3d],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8b1b1e5854c1c42a18025786f98ef5a2230188e7 5a4118de683cdd1831feaa906438d59db32efc33 a8cccabcc7c4f901469940cd5095e50c3880ee52 c8f15d5d8a2d1fbf7f91ca8b262a4fa51b8d0e31 6ec828cc0bb9d11f01b673dbde093fcca02ce7f8 ef38935095b81f67cbaea9aa213985e709250721 f5970e832ae8fa5e5a5e4413cf25b94fa9b5234b 24d8293d9bb701658fb98efdbae838f3a46daeeb 8e211852aa2f4b9f6f71e24ff4cd77f272b23a1a 81c0edb42b753f4c8f855557c88db34539b4239b c7f6ff2c1fc2afead1105194c9357f8611956113 0186d7d6f3b7772abd900a21d286234e6cc2696f 18b10b1148aea1299c4b36982cc971fbc3a673a1 8c8c96ff28ef2e3d08fc9ad924d7bd0a27e0cb57 e3da12774d65b39ed68f916d9e3dc32080242f66 7cf7f5776009829df6b785e977e94acddbda01de 99853c818493e4172769d9c9bbb9029033a4bc3c 7a861a8197e498aee0c78b74d2aacd889e36238d 8a6cf3599f8bd7f6dfae32b4b0c20a7bb69a8b9a e0b85818 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e5:72:1e:b8:08:62:12:e4:a6:e0:ae:23:a6:6a:d6:3b:9a:a8:28:50],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-16 06:56:10.902 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-16 06:56:10.905 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-16 06:56:10.908 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-16 06:56:10.909 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-16 06:56:10.909 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-16 06:56:10.910 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-16 06:56:10.910 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-16 06:56:10.911 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-16 06:56:10.912 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-16 06:56:10.912 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-16 06:56:10.916 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-16 06:56:10.917 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-16 06:56:10.917 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-16 06:56:10.918 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-16 06:56:11.036 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-16 06:56:11.037 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-16 06:56:11.037 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-16 06:56:11.037 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-16 06:56:11.039 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-16 06:56:11.039 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-16 06:56:11.039 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-16 06:56:11.040 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-16 06:56:11.040 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-16 06:56:11.041 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-16 06:56:11.041 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-16 06:56:11.041 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-16 06:56:11.042 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-16 06:56:11.042 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-16 06:56:11.043 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-16 06:56:11.043 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-16 06:56:11.047 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 413390169427257302193341568586567007919836384503 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 16 04:57:15 UTC 2022 Final Date: Mon Nov 15 04:57:14 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [27:68:37:71:f2:e8:30:d5:4d:08:3b:b5:e9:43:47:cb:7e:70:1e:3d],[56:66:d1:a4] modulus: bf1484fc0bd901fedac40cae26736a12c70f7e08b73d9840663f8eb8128e9d43dcb5f487b51536070621f42d80f563b05536fbdb5345ef69199c68640a08ebad6426c6a89486da990a56b1b6e1e9f8e47a97202141addc741f85ee651c3b50c3788bef24a22297c09a5040548acc9c0469dc2c85cbb0f60f0c2c61e3000ff7132e2366c6933f743aba22df10471bb46dc8e6bc4569f10b6f4e93fe2bcc61f854e0b48329a6150b2640f00406da0f1ef7bf4bbd15ccf15add4cf8eb10811a53d4e229e91633151be40ae15a5eb5df80da691b02fdec3b26e66b9db7b60aa4c9bc8b04d5786910d5c1238ed5b14a434411b3ea93599e25c86b538a9eb6b0ac284792f253fd60d69e3b1e64cf9005d48208dcf96f438aaeda57bdc2a609358513d5beb47a614060270aa87f854d67e26fe5d8a61adc74d57c4a5e435003fdd33e440c083e3eb995a4bca30345ac8175005213f5a286bc148cfd971f626fd4af18e245cbee7088e17ae2a8d037cb93ab5de9cce18b72dfefb7fd9676fc767c85f885 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8b1b1e5854c1c42a18025786f98ef5a2230188e7 5a4118de683cdd1831feaa906438d59db32efc33 a8cccabcc7c4f901469940cd5095e50c3880ee52 c8f15d5d8a2d1fbf7f91ca8b262a4fa51b8d0e31 6ec828cc0bb9d11f01b673dbde093fcca02ce7f8 ef38935095b81f67cbaea9aa213985e709250721 f5970e832ae8fa5e5a5e4413cf25b94fa9b5234b 24d8293d9bb701658fb98efdbae838f3a46daeeb 8e211852aa2f4b9f6f71e24ff4cd77f272b23a1a 81c0edb42b753f4c8f855557c88db34539b4239b c7f6ff2c1fc2afead1105194c9357f8611956113 0186d7d6f3b7772abd900a21d286234e6cc2696f 18b10b1148aea1299c4b36982cc971fbc3a673a1 8c8c96ff28ef2e3d08fc9ad924d7bd0a27e0cb57 e3da12774d65b39ed68f916d9e3dc32080242f66 7cf7f5776009829df6b785e977e94acddbda01de 99853c818493e4172769d9c9bbb9029033a4bc3c 7a861a8197e498aee0c78b74d2aacd889e36238d 8a6cf3599f8bd7f6dfae32b4b0c20a7bb69a8b9a e0b85818 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2b:c5:d6:ae:b5:f7:32:75:9f:4c:66:98:a5:46:5c:14:4f:7f:a6:fd],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-16 07:20:12.112 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-16 07:20:12.115 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-16 07:20:12.118 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-16 07:20:12.119 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-16 07:20:12.120 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-16 07:20:12.120 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-16 07:20:12.121 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-16 07:20:12.121 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-16 07:20:12.122 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-16 07:20:12.122 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-16 07:20:12.127 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-16 07:20:12.129 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-16 07:20:12.129 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-16 07:20:12.130 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-16 07:20:12.285 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-16 07:20:12.285 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-16 07:20:12.286 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-16 07:20:12.286 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-16 07:20:12.292 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-16 07:20:12.293 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-16 07:20:12.293 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-16 07:20:12.293 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-16 07:20:12.294 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-16 07:20:12.295 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-16 07:20:12.295 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-16 07:20:12.296 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-16 07:20:12.302 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-16 07:20:12.302 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-16 07:20:12.303 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-16 07:20:12.303 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-16 07:20:12.307 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 413390169427257302193341568586567007919836384503 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 16 04:57:15 UTC 2022 Final Date: Mon Nov 15 04:57:14 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [27:68:37:71:f2:e8:30:d5:4d:08:3b:b5:e9:43:47:cb:7e:70:1e:3d],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8b1b1e5854c1c42a18025786f98ef5a2230188e7 5a4118de683cdd1831feaa906438d59db32efc33 a8cccabcc7c4f901469940cd5095e50c3880ee52 c8f15d5d8a2d1fbf7f91ca8b262a4fa51b8d0e31 6ec828cc0bb9d11f01b673dbde093fcca02ce7f8 ef38935095b81f67cbaea9aa213985e709250721 f5970e832ae8fa5e5a5e4413cf25b94fa9b5234b 24d8293d9bb701658fb98efdbae838f3a46daeeb 8e211852aa2f4b9f6f71e24ff4cd77f272b23a1a 81c0edb42b753f4c8f855557c88db34539b4239b c7f6ff2c1fc2afead1105194c9357f8611956113 0186d7d6f3b7772abd900a21d286234e6cc2696f 18b10b1148aea1299c4b36982cc971fbc3a673a1 8c8c96ff28ef2e3d08fc9ad924d7bd0a27e0cb57 e3da12774d65b39ed68f916d9e3dc32080242f66 7cf7f5776009829df6b785e977e94acddbda01de 99853c818493e4172769d9c9bbb9029033a4bc3c 7a861a8197e498aee0c78b74d2aacd889e36238d 8a6cf3599f8bd7f6dfae32b4b0c20a7bb69a8b9a e0b85818 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [34:0b:b5:76:b8:3e:ac:c6:87:16:92:f2:ce:9a:d3:09:11:61:d5:ba],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-16 07:20:24.878 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-11-16 07:20:24.879 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-11-16 07:20:24.880 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-16 07:20:24.881 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-16 07:20:24.881 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-16 07:20:24.882 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-11-16 07:20:24.882 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-11-16 07:20:24.882 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-11-16 07:20:24.882 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-11-16 07:20:24.883 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-11-16 07:20:24.886 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-11-16 07:20:24.887 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-16 07:20:24.887 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-11-16 07:20:24.887 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-16 07:20:24.984 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-11-16 07:20:24.985 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-11-16 07:20:24.986 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-11-16 07:20:24.986 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-11-16 07:20:24.988 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-11-16 07:20:24.988 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-11-16 07:20:24.989 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-16 07:20:24.989 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-16 07:20:24.989 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-16 07:20:24.989 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-16 07:20:24.990 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-16 07:20:24.990 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-16 07:20:24.990 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-16 07:20:24.991 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-11-16 07:20:24.991 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-11-16 07:20:24.991 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-16 07:20:24.994 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 413390169427257302193341568586567007919836384503 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Nov 16 04:57:15 UTC 2022 Final Date: Mon Nov 15 04:57:14 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [27:68:37:71:f2:e8:30:d5:4d:08:3b:b5:e9:43:47:cb:7e:70:1e:3d],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8b1b1e5854c1c42a18025786f98ef5a2230188e7 5a4118de683cdd1831feaa906438d59db32efc33 a8cccabcc7c4f901469940cd5095e50c3880ee52 c8f15d5d8a2d1fbf7f91ca8b262a4fa51b8d0e31 6ec828cc0bb9d11f01b673dbde093fcca02ce7f8 ef38935095b81f67cbaea9aa213985e709250721 f5970e832ae8fa5e5a5e4413cf25b94fa9b5234b 24d8293d9bb701658fb98efdbae838f3a46daeeb 8e211852aa2f4b9f6f71e24ff4cd77f272b23a1a 81c0edb42b753f4c8f855557c88db34539b4239b c7f6ff2c1fc2afead1105194c9357f8611956113 0186d7d6f3b7772abd900a21d286234e6cc2696f 18b10b1148aea1299c4b36982cc971fbc3a673a1 8c8c96ff28ef2e3d08fc9ad924d7bd0a27e0cb57 e3da12774d65b39ed68f916d9e3dc32080242f66 7cf7f5776009829df6b785e977e94acddbda01de 99853c818493e4172769d9c9bbb9029033a4bc3c 7a861a8197e498aee0c78b74d2aacd889e36238d 8a6cf3599f8bd7f6dfae32b4b0c20a7bb69a8b9a e0b85818 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [17:da:61:13:19:ff:19:99:53:20:3e:43:82:dd:8d:c5:f6:10:be:f8],[56:66:d1:a4] modulus: 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 public exponent: 10001 ]