By type
2023-01-07 05:05:21,470 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2023-01-07 05:05:23,409 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2023-01-07 05:05:24.941 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Jan 07, 2023 5:05:28 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jan 07, 2023 5:05:28 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jan 07, 2023 5:05:28 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jan 07, 2023 5:05:28 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2023-01-07 05:05:29.834 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2023-01-07 05:05:30.280 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2023-01-07 05:05:30.625 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2023-01-07 05:05:32.073 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2023-01-07 05:05:32.077 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2023-01-07 05:05:32.079 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2023-01-07 05:05:32.083 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2023-01-07 05:05:32.155 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2023-01-07 05:05:32.160 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2023-01-07 05:05:32.356 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2023-01-07 05:05:33.862 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jan 07, 2023 5:05:35 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2023-01-07 05:05:35.760 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 15.822 seconds (JVM running for 20.056) Jan 07, 2023 5:05:50 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2023-01-07 05:06:23.165 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-07 05:06:23.177 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-07 05:06:23.289 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2023-01-07 05:06:23.338 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-07 05:06:23.407 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2023-01-07 05:06:23.413 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-07 05:06:23.414 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-07 05:06:23.415 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-07 05:06:23.416 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-07 05:06:23.421 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-07 05:06:23.433 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-07 05:06:23.449 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-07 05:06:23.565 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-07 05:06:23.589 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-07 05:06:23.590 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-07 05:06:23.597 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 05:06:24.766 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-07 05:06:24.769 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-07 05:06:24.769 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-07 05:06:24.776 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 05:06:24.808 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-07 05:06:24.813 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-07 05:06:24.814 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 05:06:24.814 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 05:06:24.815 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 05:06:24.848 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 05:06:24.849 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 05:06:24.850 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 05:06:24.863 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 05:06:24.865 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 05:06:24.866 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 05:06:24.869 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-07 05:06:24.952 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 624731954960371801550080520127682432134434031823 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jan 07 05:00:56 UTC 2023 Final Date: Thu Jan 06 05:00:55 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7a:53:85:da:c1:a6:f1:98:d5:64:4c:1e:20:ba:58:8a:20:99:fc:d8],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4c5769d902bc823a56d54004405b3e1d3819e30e 05719330552530c99a05c58e35c62238a3eae900 48ef8ed136b45f3c3c79eb66789cb44e695378dc b7eaf22eba644a158c096c5cdfffe36ec7f71d5b d7ad1046b81c7dca93ff938e4bd3f910797641a1 d16100a46369dbb5b8dfed7f0cfe45318bc8789e 0ab5711e365b86c138345cc948e98d5a0d05b1ed cdb60cbd51d63e70de6f288024fd4f88a42522c0 ac31cda06265539f9b9e623cbb37ce539c0ea58a 7f453567e7c5de352436c5343a3bcb3309e0b9b1 fa39b4cf39a7225acc402cba965f8be32c9af02e 9a5c6239af59f3221e97a7c0042ac2cdde0c4aa8 0c766f6634bfd35eb3eae7e307cbb82e9fe9bd3d b403a0f8bb3cbb38b9368f3c8fb9c6b290e3c854 470322a76163d994a72b14470958f2c01de3be0a ca79e1b5c6007c259fa7229ca74e3c75782ea433 d5e3a1906a5c26cff812b14c558474e94d7f7c54 bc74994263c4cc0abf585c31b55ab6129631f436 1e4c8329c9bf99dfd8b9e10df109e012713bd9d6 b0e6b0a5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [40:cd:2a:f1:59:02:c0:e7:3b:46:df:ce:79:24:d4:c3:55:c9:a2:d1],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-07 06:48:52.141 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-07 06:48:52.149 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-07 06:48:52.160 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-07 06:48:52.166 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-07 06:48:52.171 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-07 06:48:52.182 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-07 06:48:52.184 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-07 06:48:52.185 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-07 06:48:52.186 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-07 06:48:52.186 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-07 06:48:52.195 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-07 06:48:52.199 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-07 06:48:52.201 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-07 06:48:52.202 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 06:48:52.425 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-07 06:48:52.426 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-07 06:48:52.427 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-07 06:48:52.427 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 06:48:52.431 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-07 06:48:52.431 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-07 06:48:52.435 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 06:48:52.436 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 06:48:52.437 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 06:48:52.447 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 06:48:52.450 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 06:48:52.450 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 06:48:52.452 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 06:48:52.452 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 06:48:52.453 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 06:48:52.454 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-07 06:48:52.458 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 624731954960371801550080520127682432134434031823 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jan 07 05:00:56 UTC 2023 Final Date: Thu Jan 06 05:00:55 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7a:53:85:da:c1:a6:f1:98:d5:64:4c:1e:20:ba:58:8a:20:99:fc:d8],[56:66:d1:a4] modulus: b0b3fa62358e37b03a714f318190312bcff0ddda6749ece6bc72418bf426882f24a814fefa67ed0329baf2aaa084a3dfd8c5b41edf190d1e456bd4cc09c1ae9d70dad98fe2f024c8d811cd3d78f2c22d8f8d2df61fdd6cf553df05c6ac3d87176addb255f3eb03078267970970c168114f0a6090ed87d1f17956ec502d49df59554ca82c33a2a2b38f1937d9b9eec27861e6dd4bb9c625d4cef8146a4d28c1a35ebe67afdabf9adc97a085a8a6cfdf06c003dc69b06fbc39e2e336929e34f3d07b16f81406c93593e25047bf0588e82f7b57443984740acd24aa2e7cbfb2b650ee15b8af1d7f0bec9a335ab6ac9098b76ff5e3a788233bebda98b6e7843854bc1c6aae2a7389db69cdf9a04ce64f5c224ba43e275bace20ceacca49123e68245eaf018a3b973f3ad5ddf0048158d2796a45758ee8693448c93cd1957d4724f5e2c51544f2e48a5185bc8d63fa96d3cd403309d21ea81b9a418225da374057b47d421988f1e36a457afc7bda01d43f2a0cc017e37089f27d00e3ed29d247a891b public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4c5769d902bc823a56d54004405b3e1d3819e30e 05719330552530c99a05c58e35c62238a3eae900 48ef8ed136b45f3c3c79eb66789cb44e695378dc b7eaf22eba644a158c096c5cdfffe36ec7f71d5b d7ad1046b81c7dca93ff938e4bd3f910797641a1 d16100a46369dbb5b8dfed7f0cfe45318bc8789e 0ab5711e365b86c138345cc948e98d5a0d05b1ed cdb60cbd51d63e70de6f288024fd4f88a42522c0 ac31cda06265539f9b9e623cbb37ce539c0ea58a 7f453567e7c5de352436c5343a3bcb3309e0b9b1 fa39b4cf39a7225acc402cba965f8be32c9af02e 9a5c6239af59f3221e97a7c0042ac2cdde0c4aa8 0c766f6634bfd35eb3eae7e307cbb82e9fe9bd3d b403a0f8bb3cbb38b9368f3c8fb9c6b290e3c854 470322a76163d994a72b14470958f2c01de3be0a ca79e1b5c6007c259fa7229ca74e3c75782ea433 d5e3a1906a5c26cff812b14c558474e94d7f7c54 bc74994263c4cc0abf585c31b55ab6129631f436 1e4c8329c9bf99dfd8b9e10df109e012713bd9d6 b0e6b0a5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [65:20:b2:e7:cf:e8:3a:c6:f3:6f:4d:1f:e9:03:a8:f5:0e:cf:63:3e],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-07 06:50:54.621 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-07 06:50:54.623 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-07 06:50:54.625 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2023-01-07 06:50:54.626 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-07 06:50:54.626 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2023-01-07 06:50:54.627 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-07 06:50:54.628 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-07 06:50:54.628 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-07 06:50:54.629 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-07 06:50:54.635 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-07 06:50:54.654 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-07 06:50:54.657 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-07 06:50:54.658 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-07 06:50:54.658 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 06:50:54.864 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-07 06:50:54.865 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-07 06:50:54.866 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-07 06:50:54.866 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 06:50:54.869 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-07 06:50:54.869 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-07 06:50:54.869 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 06:50:54.870 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 06:50:54.870 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 06:50:54.871 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 06:50:54.872 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 06:50:54.872 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 06:50:54.873 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 06:50:54.873 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 06:50:54.874 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 06:50:54.875 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-07 06:50:54.878 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 624731954960371801550080520127682432134434031823 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jan 07 05:00:56 UTC 2023 Final Date: Thu Jan 06 05:00:55 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7a:53:85:da:c1:a6:f1:98:d5:64:4c:1e:20:ba:58:8a:20:99:fc:d8],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4c5769d902bc823a56d54004405b3e1d3819e30e 05719330552530c99a05c58e35c62238a3eae900 48ef8ed136b45f3c3c79eb66789cb44e695378dc b7eaf22eba644a158c096c5cdfffe36ec7f71d5b d7ad1046b81c7dca93ff938e4bd3f910797641a1 d16100a46369dbb5b8dfed7f0cfe45318bc8789e 0ab5711e365b86c138345cc948e98d5a0d05b1ed cdb60cbd51d63e70de6f288024fd4f88a42522c0 ac31cda06265539f9b9e623cbb37ce539c0ea58a 7f453567e7c5de352436c5343a3bcb3309e0b9b1 fa39b4cf39a7225acc402cba965f8be32c9af02e 9a5c6239af59f3221e97a7c0042ac2cdde0c4aa8 0c766f6634bfd35eb3eae7e307cbb82e9fe9bd3d b403a0f8bb3cbb38b9368f3c8fb9c6b290e3c854 470322a76163d994a72b14470958f2c01de3be0a ca79e1b5c6007c259fa7229ca74e3c75782ea433 d5e3a1906a5c26cff812b14c558474e94d7f7c54 bc74994263c4cc0abf585c31b55ab6129631f436 1e4c8329c9bf99dfd8b9e10df109e012713bd9d6 b0e6b0a5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7c:dd:1b:6c:cf:eb:bc:58:16:8e:b9:5e:1f:34:0a:ea:e3:58:10:c8],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-07 06:52:56.888 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-07 06:52:56.890 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-07 06:52:56.891 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2023-01-07 06:52:56.892 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-07 06:52:56.893 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2023-01-07 06:52:56.893 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-07 06:52:56.894 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-07 06:52:56.894 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-07 06:52:56.895 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-07 06:52:56.896 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-07 06:52:56.901 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-07 06:52:56.903 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-07 06:52:56.903 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-07 06:52:56.904 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 06:52:57.056 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-07 06:52:57.057 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-07 06:52:57.057 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-07 06:52:57.058 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 06:52:57.060 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-07 06:52:57.061 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-07 06:52:57.063 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 06:52:57.063 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 06:52:57.064 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 06:52:57.065 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 06:52:57.066 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 06:52:57.066 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 06:52:57.068 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 06:52:57.069 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 06:52:57.069 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 06:52:57.070 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-07 06:52:57.077 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 624731954960371801550080520127682432134434031823 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jan 07 05:00:56 UTC 2023 Final Date: Thu Jan 06 05:00:55 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7a:53:85:da:c1:a6:f1:98:d5:64:4c:1e:20:ba:58:8a:20:99:fc:d8],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4c5769d902bc823a56d54004405b3e1d3819e30e 05719330552530c99a05c58e35c62238a3eae900 48ef8ed136b45f3c3c79eb66789cb44e695378dc b7eaf22eba644a158c096c5cdfffe36ec7f71d5b d7ad1046b81c7dca93ff938e4bd3f910797641a1 d16100a46369dbb5b8dfed7f0cfe45318bc8789e 0ab5711e365b86c138345cc948e98d5a0d05b1ed cdb60cbd51d63e70de6f288024fd4f88a42522c0 ac31cda06265539f9b9e623cbb37ce539c0ea58a 7f453567e7c5de352436c5343a3bcb3309e0b9b1 fa39b4cf39a7225acc402cba965f8be32c9af02e 9a5c6239af59f3221e97a7c0042ac2cdde0c4aa8 0c766f6634bfd35eb3eae7e307cbb82e9fe9bd3d b403a0f8bb3cbb38b9368f3c8fb9c6b290e3c854 470322a76163d994a72b14470958f2c01de3be0a ca79e1b5c6007c259fa7229ca74e3c75782ea433 d5e3a1906a5c26cff812b14c558474e94d7f7c54 bc74994263c4cc0abf585c31b55ab6129631f436 1e4c8329c9bf99dfd8b9e10df109e012713bd9d6 b0e6b0a5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a2:c6:59:28:bc:03:0f:95:45:65:a9:bd:02:a6:97:22:81:05:73:ba],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-07 06:55:32.791 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-07 06:55:32.794 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-07 06:55:32.801 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-07 06:55:32.808 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-07 06:55:32.812 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-07 06:55:32.816 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-07 06:55:32.822 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-07 06:55:32.830 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-07 06:55:32.832 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-07 06:55:32.834 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-07 06:55:32.848 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-07 06:55:32.850 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-07 06:55:32.850 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-07 06:55:32.851 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 06:55:33.040 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-07 06:55:33.041 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-07 06:55:33.042 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-07 06:55:33.043 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 06:55:33.046 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-07 06:55:33.048 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-07 06:55:33.049 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 06:55:33.049 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 06:55:33.049 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 06:55:33.050 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 06:55:33.051 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 06:55:33.051 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 06:55:33.053 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 06:55:33.054 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 06:55:33.055 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 06:55:33.056 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-07 06:55:33.062 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 624731954960371801550080520127682432134434031823 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jan 07 05:00:56 UTC 2023 Final Date: Thu Jan 06 05:00:55 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7a:53:85:da:c1:a6:f1:98:d5:64:4c:1e:20:ba:58:8a:20:99:fc:d8],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4c5769d902bc823a56d54004405b3e1d3819e30e 05719330552530c99a05c58e35c62238a3eae900 48ef8ed136b45f3c3c79eb66789cb44e695378dc b7eaf22eba644a158c096c5cdfffe36ec7f71d5b d7ad1046b81c7dca93ff938e4bd3f910797641a1 d16100a46369dbb5b8dfed7f0cfe45318bc8789e 0ab5711e365b86c138345cc948e98d5a0d05b1ed cdb60cbd51d63e70de6f288024fd4f88a42522c0 ac31cda06265539f9b9e623cbb37ce539c0ea58a 7f453567e7c5de352436c5343a3bcb3309e0b9b1 fa39b4cf39a7225acc402cba965f8be32c9af02e 9a5c6239af59f3221e97a7c0042ac2cdde0c4aa8 0c766f6634bfd35eb3eae7e307cbb82e9fe9bd3d b403a0f8bb3cbb38b9368f3c8fb9c6b290e3c854 470322a76163d994a72b14470958f2c01de3be0a ca79e1b5c6007c259fa7229ca74e3c75782ea433 d5e3a1906a5c26cff812b14c558474e94d7f7c54 bc74994263c4cc0abf585c31b55ab6129631f436 1e4c8329c9bf99dfd8b9e10df109e012713bd9d6 b0e6b0a5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1b:f6:76:ce:e5:b8:e9:ec:fc:22:a3:69:02:57:0d:35:6f:4c:be:bf],[56:66:d1:a4] modulus: d86bdadd72e73a600476eb99cc6db2a54cd0b77f4a8ff3ac44b8696a82e26c0a4d12cfd90deb4beed8eb1ebf9affd6c3a46cb6b3b84c2c81b1f0829375595c70f5ddab94a3613718737be66600af2e658c624f1fd6bf36c9fa5400135030cdd113ba726c6fd9d6ddff1835dc194db26c3d492e7f1208e9e73a40233d64b7bf10a7fee471b9e2fdaf49edc8312127ff73d452432f9eb2c094bf592fd3aa6a192bc01b1b0c16143b235a52aee0f31c717db5654e618a33f4eebad53c766eabbe63db91db8b9635f88509b1142b7aea6d3f01be0ebe4c3a322d275a29f723c5eaf812e885f03dbecd8759d02e7e259857b327817b5b04508fcea66a7e7286442fc9 public exponent: 10001 ] 2023-01-07 07:03:00.851 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-07 07:03:00.855 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-07 07:03:00.858 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-07 07:03:00.860 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-07 07:03:00.861 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-07 07:03:00.862 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-07 07:03:00.862 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-07 07:03:00.863 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-07 07:03:00.863 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-07 07:03:00.865 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-07 07:03:00.872 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-07 07:03:00.874 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-07 07:03:00.875 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-07 07:03:00.876 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 07:03:01.045 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-07 07:03:01.046 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-07 07:03:01.046 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-07 07:03:01.047 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 07:03:01.049 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-07 07:03:01.050 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-07 07:03:01.050 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 07:03:01.051 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 07:03:01.051 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 07:03:01.053 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 07:03:01.053 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 07:03:01.054 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 07:03:01.055 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 07:03:01.055 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 07:03:01.056 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 07:03:01.057 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-07 07:03:01.061 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 624731954960371801550080520127682432134434031823 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jan 07 05:00:56 UTC 2023 Final Date: Thu Jan 06 05:00:55 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7a:53:85:da:c1:a6:f1:98:d5:64:4c:1e:20:ba:58:8a:20:99:fc:d8],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4c5769d902bc823a56d54004405b3e1d3819e30e 05719330552530c99a05c58e35c62238a3eae900 48ef8ed136b45f3c3c79eb66789cb44e695378dc b7eaf22eba644a158c096c5cdfffe36ec7f71d5b d7ad1046b81c7dca93ff938e4bd3f910797641a1 d16100a46369dbb5b8dfed7f0cfe45318bc8789e 0ab5711e365b86c138345cc948e98d5a0d05b1ed cdb60cbd51d63e70de6f288024fd4f88a42522c0 ac31cda06265539f9b9e623cbb37ce539c0ea58a 7f453567e7c5de352436c5343a3bcb3309e0b9b1 fa39b4cf39a7225acc402cba965f8be32c9af02e 9a5c6239af59f3221e97a7c0042ac2cdde0c4aa8 0c766f6634bfd35eb3eae7e307cbb82e9fe9bd3d b403a0f8bb3cbb38b9368f3c8fb9c6b290e3c854 470322a76163d994a72b14470958f2c01de3be0a ca79e1b5c6007c259fa7229ca74e3c75782ea433 d5e3a1906a5c26cff812b14c558474e94d7f7c54 bc74994263c4cc0abf585c31b55ab6129631f436 1e4c8329c9bf99dfd8b9e10df109e012713bd9d6 b0e6b0a5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8f:d9:49:df:16:c6:c4:b6:1b:fe:33:e1:e6:fa:30:2b:07:d7:05:b0],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-07 07:08:40.957 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-07 07:08:40.961 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-07 07:08:40.967 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-07 07:08:40.970 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-07 07:08:40.973 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-07 07:08:40.976 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-07 07:08:40.978 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-07 07:08:40.978 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-07 07:08:40.979 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-07 07:08:40.981 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-07 07:08:40.989 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-07 07:08:40.992 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-07 07:08:40.992 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-07 07:08:40.994 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 07:08:41.133 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-07 07:08:41.134 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-07 07:08:41.134 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-07 07:08:41.135 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 07:08:41.137 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-07 07:08:41.138 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-07 07:08:41.139 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 07:08:41.139 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 07:08:41.140 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 07:08:41.140 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 07:08:41.141 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 07:08:41.141 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 07:08:41.142 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 07:08:41.142 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 07:08:41.143 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 07:08:41.144 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-07 07:08:41.149 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 624731954960371801550080520127682432134434031823 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jan 07 05:00:56 UTC 2023 Final Date: Thu Jan 06 05:00:55 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7a:53:85:da:c1:a6:f1:98:d5:64:4c:1e:20:ba:58:8a:20:99:fc:d8],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4c5769d902bc823a56d54004405b3e1d3819e30e 05719330552530c99a05c58e35c62238a3eae900 48ef8ed136b45f3c3c79eb66789cb44e695378dc b7eaf22eba644a158c096c5cdfffe36ec7f71d5b d7ad1046b81c7dca93ff938e4bd3f910797641a1 d16100a46369dbb5b8dfed7f0cfe45318bc8789e 0ab5711e365b86c138345cc948e98d5a0d05b1ed cdb60cbd51d63e70de6f288024fd4f88a42522c0 ac31cda06265539f9b9e623cbb37ce539c0ea58a 7f453567e7c5de352436c5343a3bcb3309e0b9b1 fa39b4cf39a7225acc402cba965f8be32c9af02e 9a5c6239af59f3221e97a7c0042ac2cdde0c4aa8 0c766f6634bfd35eb3eae7e307cbb82e9fe9bd3d b403a0f8bb3cbb38b9368f3c8fb9c6b290e3c854 470322a76163d994a72b14470958f2c01de3be0a ca79e1b5c6007c259fa7229ca74e3c75782ea433 d5e3a1906a5c26cff812b14c558474e94d7f7c54 bc74994263c4cc0abf585c31b55ab6129631f436 1e4c8329c9bf99dfd8b9e10df109e012713bd9d6 b0e6b0a5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [60:13:a2:f5:96:e1:ed:d4:13:ba:d5:6f:67:0a:a8:7d:64:e9:3f:bd],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-07 07:15:28.665 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-07 07:15:28.667 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-07 07:15:28.668 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-07 07:15:28.669 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-07 07:15:28.669 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-07 07:15:28.671 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-07 07:15:28.671 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-07 07:15:28.672 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-07 07:15:28.672 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-07 07:15:28.673 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-07 07:15:28.678 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-07 07:15:28.680 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-07 07:15:28.681 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-07 07:15:28.681 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 07:15:28.826 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-07 07:15:28.827 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-07 07:15:28.828 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-07 07:15:28.828 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 07:15:28.829 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-07 07:15:28.830 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-07 07:15:28.830 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 07:15:28.831 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 07:15:28.831 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 07:15:28.832 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 07:15:28.833 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 07:15:28.833 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 07:15:28.834 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 07:15:28.834 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 07:15:28.834 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 07:15:28.835 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-07 07:15:28.838 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 624731954960371801550080520127682432134434031823 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jan 07 05:00:56 UTC 2023 Final Date: Thu Jan 06 05:00:55 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7a:53:85:da:c1:a6:f1:98:d5:64:4c:1e:20:ba:58:8a:20:99:fc:d8],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4c5769d902bc823a56d54004405b3e1d3819e30e 05719330552530c99a05c58e35c62238a3eae900 48ef8ed136b45f3c3c79eb66789cb44e695378dc b7eaf22eba644a158c096c5cdfffe36ec7f71d5b d7ad1046b81c7dca93ff938e4bd3f910797641a1 d16100a46369dbb5b8dfed7f0cfe45318bc8789e 0ab5711e365b86c138345cc948e98d5a0d05b1ed cdb60cbd51d63e70de6f288024fd4f88a42522c0 ac31cda06265539f9b9e623cbb37ce539c0ea58a 7f453567e7c5de352436c5343a3bcb3309e0b9b1 fa39b4cf39a7225acc402cba965f8be32c9af02e 9a5c6239af59f3221e97a7c0042ac2cdde0c4aa8 0c766f6634bfd35eb3eae7e307cbb82e9fe9bd3d b403a0f8bb3cbb38b9368f3c8fb9c6b290e3c854 470322a76163d994a72b14470958f2c01de3be0a ca79e1b5c6007c259fa7229ca74e3c75782ea433 d5e3a1906a5c26cff812b14c558474e94d7f7c54 bc74994263c4cc0abf585c31b55ab6129631f436 1e4c8329c9bf99dfd8b9e10df109e012713bd9d6 b0e6b0a5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [01:32:5a:0f:95:2f:40:f3:c7:1f:cc:93:d4:5d:95:bf:79:9b:c5:02],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-07 07:20:51.682 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-07 07:20:51.687 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-07 07:20:51.691 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-07 07:20:51.693 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-07 07:20:51.693 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-07 07:20:51.694 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-07 07:20:51.695 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-07 07:20:51.696 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-07 07:20:51.696 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-07 07:20:51.697 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-07 07:20:51.703 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-07 07:20:51.705 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-07 07:20:51.706 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-07 07:20:51.706 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 07:20:51.850 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-07 07:20:51.851 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-07 07:20:51.852 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-07 07:20:51.852 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 07:20:51.854 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-07 07:20:51.854 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-07 07:20:51.855 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 07:20:51.855 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 07:20:51.855 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 07:20:51.856 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 07:20:51.857 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 07:20:51.857 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 07:20:51.858 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 07:20:51.858 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 07:20:51.858 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 07:20:51.859 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-07 07:20:51.863 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 624731954960371801550080520127682432134434031823 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jan 07 05:00:56 UTC 2023 Final Date: Thu Jan 06 05:00:55 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7a:53:85:da:c1:a6:f1:98:d5:64:4c:1e:20:ba:58:8a:20:99:fc:d8],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4c5769d902bc823a56d54004405b3e1d3819e30e 05719330552530c99a05c58e35c62238a3eae900 48ef8ed136b45f3c3c79eb66789cb44e695378dc b7eaf22eba644a158c096c5cdfffe36ec7f71d5b d7ad1046b81c7dca93ff938e4bd3f910797641a1 d16100a46369dbb5b8dfed7f0cfe45318bc8789e 0ab5711e365b86c138345cc948e98d5a0d05b1ed cdb60cbd51d63e70de6f288024fd4f88a42522c0 ac31cda06265539f9b9e623cbb37ce539c0ea58a 7f453567e7c5de352436c5343a3bcb3309e0b9b1 fa39b4cf39a7225acc402cba965f8be32c9af02e 9a5c6239af59f3221e97a7c0042ac2cdde0c4aa8 0c766f6634bfd35eb3eae7e307cbb82e9fe9bd3d b403a0f8bb3cbb38b9368f3c8fb9c6b290e3c854 470322a76163d994a72b14470958f2c01de3be0a ca79e1b5c6007c259fa7229ca74e3c75782ea433 d5e3a1906a5c26cff812b14c558474e94d7f7c54 bc74994263c4cc0abf585c31b55ab6129631f436 1e4c8329c9bf99dfd8b9e10df109e012713bd9d6 b0e6b0a5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [de:06:d2:4f:da:76:83:c2:f2:09:42:94:aa:b6:80:06:53:17:ff:52],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-07 07:27:52.845 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-07 07:27:52.848 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-07 07:27:52.851 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2023-01-07 07:27:52.853 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-07 07:27:52.853 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2023-01-07 07:27:52.854 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-07 07:27:52.854 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-07 07:27:52.855 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-07 07:27:52.856 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-07 07:27:52.856 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-07 07:27:52.864 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-07 07:27:52.865 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-07 07:27:52.866 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-07 07:27:52.866 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 07:27:53.032 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-07 07:27:53.033 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-07 07:27:53.033 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-07 07:27:53.034 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 07:27:53.037 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-07 07:27:53.037 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-07 07:27:53.038 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 07:27:53.038 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 07:27:53.038 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 07:27:53.041 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 07:27:53.042 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 07:27:53.043 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 07:27:53.046 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 07:27:53.047 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 07:27:53.048 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 07:27:53.049 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-07 07:27:53.054 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 624731954960371801550080520127682432134434031823 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jan 07 05:00:56 UTC 2023 Final Date: Thu Jan 06 05:00:55 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7a:53:85:da:c1:a6:f1:98:d5:64:4c:1e:20:ba:58:8a:20:99:fc:d8],[56:66:d1:a4] modulus: b0b3fa62358e37b03a714f318190312bcff0ddda6749ece6bc72418bf426882f24a814fefa67ed0329baf2aaa084a3dfd8c5b41edf190d1e456bd4cc09c1ae9d70dad98fe2f024c8d811cd3d78f2c22d8f8d2df61fdd6cf553df05c6ac3d87176addb255f3eb03078267970970c168114f0a6090ed87d1f17956ec502d49df59554ca82c33a2a2b38f1937d9b9eec27861e6dd4bb9c625d4cef8146a4d28c1a35ebe67afdabf9adc97a085a8a6cfdf06c003dc69b06fbc39e2e336929e34f3d07b16f81406c93593e25047bf0588e82f7b57443984740acd24aa2e7cbfb2b650ee15b8af1d7f0bec9a335ab6ac9098b76ff5e3a788233bebda98b6e7843854bc1c6aae2a7389db69cdf9a04ce64f5c224ba43e275bace20ceacca49123e68245eaf018a3b973f3ad5ddf0048158d2796a45758ee8693448c93cd1957d4724f5e2c51544f2e48a5185bc8d63fa96d3cd403309d21ea81b9a418225da374057b47d421988f1e36a457afc7bda01d43f2a0cc017e37089f27d00e3ed29d247a891b public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4c5769d902bc823a56d54004405b3e1d3819e30e 05719330552530c99a05c58e35c62238a3eae900 48ef8ed136b45f3c3c79eb66789cb44e695378dc b7eaf22eba644a158c096c5cdfffe36ec7f71d5b d7ad1046b81c7dca93ff938e4bd3f910797641a1 d16100a46369dbb5b8dfed7f0cfe45318bc8789e 0ab5711e365b86c138345cc948e98d5a0d05b1ed cdb60cbd51d63e70de6f288024fd4f88a42522c0 ac31cda06265539f9b9e623cbb37ce539c0ea58a 7f453567e7c5de352436c5343a3bcb3309e0b9b1 fa39b4cf39a7225acc402cba965f8be32c9af02e 9a5c6239af59f3221e97a7c0042ac2cdde0c4aa8 0c766f6634bfd35eb3eae7e307cbb82e9fe9bd3d b403a0f8bb3cbb38b9368f3c8fb9c6b290e3c854 470322a76163d994a72b14470958f2c01de3be0a ca79e1b5c6007c259fa7229ca74e3c75782ea433 d5e3a1906a5c26cff812b14c558474e94d7f7c54 bc74994263c4cc0abf585c31b55ab6129631f436 1e4c8329c9bf99dfd8b9e10df109e012713bd9d6 b0e6b0a5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [55:f4:04:7f:f3:d5:2a:81:f1:59:ee:59:09:69:28:21:76:6c:c4:94],[56:66:d1:a4] modulus: e9d81bbe65f1f8b97614314bb9cb6da3c21a549b6a25e6a66feb7d216d853bc13cf2913b4b83f186d5d7bb70f6920720d69f233dcaad6753e9024e96f37acdd736275dcdaa31db797eaf258b07a8133741ea84727a9fdc9f37ed3b2cd70c5eea4cbaf13a14e3f273b09113961f262af6c43658a227099f5356d594dbf55a5dc2836aa15f839614a390d7d472059f8af469d3d36beb9cbb382920eec5bf63b10956cdccbe2eab52c0ce37a26cbb1ab6b57f0d04fa85e9dd6f7278ca07807bfeed97ca2d41298ec7a6a156bd67ef69b7b77189f2abdfeaaa29b143d4230278e606ff2efa6a27c5fae2052f5491d0aa3a756a86bc6a35bd9e43bab631de28504331 public exponent: 10001 ] 2023-01-07 07:34:52.077 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-07 07:34:52.080 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-07 07:34:52.087 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-07 07:34:52.088 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-07 07:34:52.089 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-07 07:34:52.090 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-07 07:34:52.091 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-07 07:34:52.091 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-07 07:34:52.091 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-07 07:34:52.092 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-07 07:34:52.097 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-07 07:34:52.098 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-07 07:34:52.098 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-07 07:34:52.099 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 07:34:52.266 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-07 07:34:52.268 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-07 07:34:52.286 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-07 07:34:52.286 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 07:34:52.289 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-07 07:34:52.290 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-07 07:34:52.290 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 07:34:52.291 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 07:34:52.291 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 07:34:52.299 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 07:34:52.300 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 07:34:52.301 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 07:34:52.302 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 07:34:52.302 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 07:34:52.303 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 07:34:52.303 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-07 07:34:52.315 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 624731954960371801550080520127682432134434031823 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jan 07 05:00:56 UTC 2023 Final Date: Thu Jan 06 05:00:55 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7a:53:85:da:c1:a6:f1:98:d5:64:4c:1e:20:ba:58:8a:20:99:fc:d8],[56:66:d1:a4] modulus: b0b3fa62358e37b03a714f318190312bcff0ddda6749ece6bc72418bf426882f24a814fefa67ed0329baf2aaa084a3dfd8c5b41edf190d1e456bd4cc09c1ae9d70dad98fe2f024c8d811cd3d78f2c22d8f8d2df61fdd6cf553df05c6ac3d87176addb255f3eb03078267970970c168114f0a6090ed87d1f17956ec502d49df59554ca82c33a2a2b38f1937d9b9eec27861e6dd4bb9c625d4cef8146a4d28c1a35ebe67afdabf9adc97a085a8a6cfdf06c003dc69b06fbc39e2e336929e34f3d07b16f81406c93593e25047bf0588e82f7b57443984740acd24aa2e7cbfb2b650ee15b8af1d7f0bec9a335ab6ac9098b76ff5e3a788233bebda98b6e7843854bc1c6aae2a7389db69cdf9a04ce64f5c224ba43e275bace20ceacca49123e68245eaf018a3b973f3ad5ddf0048158d2796a45758ee8693448c93cd1957d4724f5e2c51544f2e48a5185bc8d63fa96d3cd403309d21ea81b9a418225da374057b47d421988f1e36a457afc7bda01d43f2a0cc017e37089f27d00e3ed29d247a891b public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4c5769d902bc823a56d54004405b3e1d3819e30e 05719330552530c99a05c58e35c62238a3eae900 48ef8ed136b45f3c3c79eb66789cb44e695378dc b7eaf22eba644a158c096c5cdfffe36ec7f71d5b d7ad1046b81c7dca93ff938e4bd3f910797641a1 d16100a46369dbb5b8dfed7f0cfe45318bc8789e 0ab5711e365b86c138345cc948e98d5a0d05b1ed cdb60cbd51d63e70de6f288024fd4f88a42522c0 ac31cda06265539f9b9e623cbb37ce539c0ea58a 7f453567e7c5de352436c5343a3bcb3309e0b9b1 fa39b4cf39a7225acc402cba965f8be32c9af02e 9a5c6239af59f3221e97a7c0042ac2cdde0c4aa8 0c766f6634bfd35eb3eae7e307cbb82e9fe9bd3d b403a0f8bb3cbb38b9368f3c8fb9c6b290e3c854 470322a76163d994a72b14470958f2c01de3be0a ca79e1b5c6007c259fa7229ca74e3c75782ea433 d5e3a1906a5c26cff812b14c558474e94d7f7c54 bc74994263c4cc0abf585c31b55ab6129631f436 1e4c8329c9bf99dfd8b9e10df109e012713bd9d6 b0e6b0a5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3a:13:48:0f:8b:88:a4:75:67:e7:ed:fb:1d:45:75:66:4b:3d:46:68],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-07 07:35:08.222 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-07 07:35:08.224 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-07 07:35:08.226 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-07 07:35:08.227 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-07 07:35:08.227 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-07 07:35:08.228 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-07 07:35:08.228 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-07 07:35:08.229 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-07 07:35:08.229 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-07 07:35:08.229 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-07 07:35:08.233 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-07 07:35:08.233 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-07 07:35:08.233 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-07 07:35:08.234 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 07:35:08.325 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-07 07:35:08.326 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-07 07:35:08.327 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-07 07:35:08.327 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 07:35:08.329 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-07 07:35:08.330 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-07 07:35:08.331 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 07:35:08.331 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 07:35:08.331 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 07:35:08.333 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 07:35:08.333 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 07:35:08.334 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 07:35:08.335 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 07:35:08.335 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 07:35:08.335 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 07:35:08.336 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-07 07:35:08.339 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 624731954960371801550080520127682432134434031823 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jan 07 05:00:56 UTC 2023 Final Date: Thu Jan 06 05:00:55 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7a:53:85:da:c1:a6:f1:98:d5:64:4c:1e:20:ba:58:8a:20:99:fc:d8],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4c5769d902bc823a56d54004405b3e1d3819e30e 05719330552530c99a05c58e35c62238a3eae900 48ef8ed136b45f3c3c79eb66789cb44e695378dc b7eaf22eba644a158c096c5cdfffe36ec7f71d5b d7ad1046b81c7dca93ff938e4bd3f910797641a1 d16100a46369dbb5b8dfed7f0cfe45318bc8789e 0ab5711e365b86c138345cc948e98d5a0d05b1ed cdb60cbd51d63e70de6f288024fd4f88a42522c0 ac31cda06265539f9b9e623cbb37ce539c0ea58a 7f453567e7c5de352436c5343a3bcb3309e0b9b1 fa39b4cf39a7225acc402cba965f8be32c9af02e 9a5c6239af59f3221e97a7c0042ac2cdde0c4aa8 0c766f6634bfd35eb3eae7e307cbb82e9fe9bd3d b403a0f8bb3cbb38b9368f3c8fb9c6b290e3c854 470322a76163d994a72b14470958f2c01de3be0a ca79e1b5c6007c259fa7229ca74e3c75782ea433 d5e3a1906a5c26cff812b14c558474e94d7f7c54 bc74994263c4cc0abf585c31b55ab6129631f436 1e4c8329c9bf99dfd8b9e10df109e012713bd9d6 b0e6b0a5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1c:84:50:76:f7:14:52:e5:0a:f6:6a:be:6b:0e:1b:44:72:a0:e2:6a],[56:66:d1:a4] modulus: b05f9d1ece66b941ef49c2d0d3b58f8c129492be17c3fcc5a3dec5f8edab33b5e51b3c1d42e3112b316d86c50af19358f27ec5a916b6240e0b26fba838577263eeeb5b9e245b24c5750348b382181219f6a1c0ff05ce9b503d552287a8c9691cb19eb1198588dab9788e2643e42f7d5c959db00070d6458ec658240c2d6817b017aaa3753707298b125f62ae5c170f456dd8404b41ec4d8a4a0d46b7575c70c114d34a60a10097bb7267d2a0e5933e8bf27e5338d46a63d46248c3cd81b828a417dbaf8be86552f5274709101f2bf54e9733cdf4bb6a3359a8eb2ee2cbdd5ce5e88f2c7c56ba7f81c845faaaf0912dfd20ad172938c3981346dd853590e583e5 public exponent: 10001 ] 2023-01-07 07:58:25.317 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-07 07:58:25.321 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-07 07:58:25.324 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-07 07:58:25.326 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-07 07:58:25.326 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-07 07:58:25.328 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-07 07:58:25.329 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-07 07:58:25.329 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-07 07:58:25.330 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-07 07:58:25.331 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-07 07:58:25.336 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-07 07:58:25.338 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-07 07:58:25.338 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-07 07:58:25.339 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 07:58:25.578 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-07 07:58:25.579 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-07 07:58:25.580 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-07 07:58:25.582 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 07:58:25.592 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-07 07:58:25.593 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-07 07:58:25.594 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 07:58:25.594 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 07:58:25.595 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 07:58:25.600 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 07:58:25.601 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 07:58:25.601 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 07:58:25.602 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 07:58:25.603 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 07:58:25.603 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 07:58:25.615 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-07 07:58:25.630 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 624731954960371801550080520127682432134434031823 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jan 07 05:00:56 UTC 2023 Final Date: Thu Jan 06 05:00:55 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7a:53:85:da:c1:a6:f1:98:d5:64:4c:1e:20:ba:58:8a:20:99:fc:d8],[56:66:d1:a4] modulus: b0b3fa62358e37b03a714f318190312bcff0ddda6749ece6bc72418bf426882f24a814fefa67ed0329baf2aaa084a3dfd8c5b41edf190d1e456bd4cc09c1ae9d70dad98fe2f024c8d811cd3d78f2c22d8f8d2df61fdd6cf553df05c6ac3d87176addb255f3eb03078267970970c168114f0a6090ed87d1f17956ec502d49df59554ca82c33a2a2b38f1937d9b9eec27861e6dd4bb9c625d4cef8146a4d28c1a35ebe67afdabf9adc97a085a8a6cfdf06c003dc69b06fbc39e2e336929e34f3d07b16f81406c93593e25047bf0588e82f7b57443984740acd24aa2e7cbfb2b650ee15b8af1d7f0bec9a335ab6ac9098b76ff5e3a788233bebda98b6e7843854bc1c6aae2a7389db69cdf9a04ce64f5c224ba43e275bace20ceacca49123e68245eaf018a3b973f3ad5ddf0048158d2796a45758ee8693448c93cd1957d4724f5e2c51544f2e48a5185bc8d63fa96d3cd403309d21ea81b9a418225da374057b47d421988f1e36a457afc7bda01d43f2a0cc017e37089f27d00e3ed29d247a891b public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4c5769d902bc823a56d54004405b3e1d3819e30e 05719330552530c99a05c58e35c62238a3eae900 48ef8ed136b45f3c3c79eb66789cb44e695378dc b7eaf22eba644a158c096c5cdfffe36ec7f71d5b d7ad1046b81c7dca93ff938e4bd3f910797641a1 d16100a46369dbb5b8dfed7f0cfe45318bc8789e 0ab5711e365b86c138345cc948e98d5a0d05b1ed cdb60cbd51d63e70de6f288024fd4f88a42522c0 ac31cda06265539f9b9e623cbb37ce539c0ea58a 7f453567e7c5de352436c5343a3bcb3309e0b9b1 fa39b4cf39a7225acc402cba965f8be32c9af02e 9a5c6239af59f3221e97a7c0042ac2cdde0c4aa8 0c766f6634bfd35eb3eae7e307cbb82e9fe9bd3d b403a0f8bb3cbb38b9368f3c8fb9c6b290e3c854 470322a76163d994a72b14470958f2c01de3be0a ca79e1b5c6007c259fa7229ca74e3c75782ea433 d5e3a1906a5c26cff812b14c558474e94d7f7c54 bc74994263c4cc0abf585c31b55ab6129631f436 1e4c8329c9bf99dfd8b9e10df109e012713bd9d6 b0e6b0a5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [74:7c:35:99:55:9a:a7:6b:b8:e1:b0:a7:75:9d:59:de:dc:91:68:70],[56:66:d1:a4] modulus: d9c0357e562fcebab0cf5c759fab3fa0827d480fc7f6768e03ca81d146a06fb71abddd24842f0532652ad1f21bcce6b04bcd68f6084f6a74d235a8fbf1e8d35b7dd05cce2591707e4d968cdf50d979c285beaceb7ced4b99a9623dcaf503fbc313700504c2fa8348dcb8d61dd084656bd6bbeabe5e4f55c0b85e6bb764d6f90a28736f5937f5786eee30c6a7c3cbed3b05d9d7578dac00c1ce08b187753cd79179558f220f00a98ad2e9d966d4868bea2aafdf9f053669b5915fb4ae952b4d974cf236db231c2eb9fef1983eecb7a6165765af4e60c1fb3e1882df8e394add2450bf50838d238adfda225c4327a2e600e8f1c3198614fc9b6e54b50fcf2b2339 public exponent: 10001 ] 2023-01-07 07:58:32.038 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-07 07:58:32.040 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-07 07:58:32.042 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-07 07:58:32.044 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-07 07:58:32.045 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-07 07:58:32.046 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-07 07:58:32.046 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-07 07:58:32.047 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-07 07:58:32.047 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-07 07:58:32.047 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-07 07:58:32.052 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-07 07:58:32.052 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-07 07:58:32.053 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-07 07:58:32.053 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 07:58:32.179 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-07 07:58:32.180 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-07 07:58:32.181 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-07 07:58:32.181 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-07 07:58:32.184 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-07 07:58:32.185 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-07 07:58:32.185 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 07:58:32.185 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 07:58:32.186 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 07:58:32.187 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 07:58:32.187 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 07:58:32.187 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 07:58:32.188 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-07 07:58:32.189 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-07 07:58:32.189 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-07 07:58:32.190 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-07 07:58:32.194 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 624731954960371801550080520127682432134434031823 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jan 07 05:00:56 UTC 2023 Final Date: Thu Jan 06 05:00:55 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7a:53:85:da:c1:a6:f1:98:d5:64:4c:1e:20:ba:58:8a:20:99:fc:d8],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4c5769d902bc823a56d54004405b3e1d3819e30e 05719330552530c99a05c58e35c62238a3eae900 48ef8ed136b45f3c3c79eb66789cb44e695378dc b7eaf22eba644a158c096c5cdfffe36ec7f71d5b d7ad1046b81c7dca93ff938e4bd3f910797641a1 d16100a46369dbb5b8dfed7f0cfe45318bc8789e 0ab5711e365b86c138345cc948e98d5a0d05b1ed cdb60cbd51d63e70de6f288024fd4f88a42522c0 ac31cda06265539f9b9e623cbb37ce539c0ea58a 7f453567e7c5de352436c5343a3bcb3309e0b9b1 fa39b4cf39a7225acc402cba965f8be32c9af02e 9a5c6239af59f3221e97a7c0042ac2cdde0c4aa8 0c766f6634bfd35eb3eae7e307cbb82e9fe9bd3d b403a0f8bb3cbb38b9368f3c8fb9c6b290e3c854 470322a76163d994a72b14470958f2c01de3be0a ca79e1b5c6007c259fa7229ca74e3c75782ea433 d5e3a1906a5c26cff812b14c558474e94d7f7c54 bc74994263c4cc0abf585c31b55ab6129631f436 1e4c8329c9bf99dfd8b9e10df109e012713bd9d6 b0e6b0a5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ed:0f:22:c0:b2:2a:0a:32:f9:b6:f2:62:63:3a:b5:11:34:8a:94:c8],[56:66:d1:a4] modulus: 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 public exponent: 10001 ]