By type
2023-01-13 05:18:23,011 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2023-01-13 05:18:24,464 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2023-01-13 05:18:25.197 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Jan 13, 2023 5:18:27 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jan 13, 2023 5:18:27 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jan 13, 2023 5:18:27 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jan 13, 2023 5:18:27 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2023-01-13 05:18:27.838 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2023-01-13 05:18:28.166 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2023-01-13 05:18:28.348 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2023-01-13 05:18:29.033 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2023-01-13 05:18:29.035 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2023-01-13 05:18:29.036 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2023-01-13 05:18:29.040 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2023-01-13 05:18:29.078 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2023-01-13 05:18:29.081 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2023-01-13 05:18:29.199 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2023-01-13 05:18:29.792 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jan 13, 2023 5:18:30 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2023-01-13 05:18:30.656 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 8.47 seconds (JVM running for 10.165) Jan 13, 2023 5:18:54 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2023-01-13 05:19:10.164 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-13 05:19:10.174 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-13 05:19:10.217 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2023-01-13 05:19:10.221 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-13 05:19:10.242 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2023-01-13 05:19:10.245 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-13 05:19:10.246 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-13 05:19:10.247 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-13 05:19:10.247 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-13 05:19:10.251 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-13 05:19:10.259 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-13 05:19:10.263 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-13 05:19:10.315 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-13 05:19:10.321 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-13 05:19:10.321 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-13 05:19:10.325 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 05:19:11.064 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-13 05:19:11.066 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-13 05:19:11.067 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-13 05:19:11.068 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 05:19:11.082 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-13 05:19:11.090 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-13 05:19:11.092 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 05:19:11.093 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-13 05:19:11.093 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-13 05:19:11.117 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 05:19:11.118 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-13 05:19:11.118 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-13 05:19:11.128 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 05:19:11.129 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-13 05:19:11.130 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-13 05:19:11.133 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-13 05:19:11.168 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 250463936742516270538741312356656936913436458449 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 13 05:15:00 UTC 2023 Final Date: Wed Jan 12 05:14:59 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7c:2c:1c:1c:7e:43:6a:88:26:74:cc:01:b1:fe:38:d4:bf:9c:94:2a],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 76f11e4a01e3f69d670c7b448e0d3736e923f485 f2ef691207b4b590fcc6efd3ec47874a4a1b721f 714c6ebe74afb413b94bd061950e68fe4f054888 812ec715c85e86b31e55c02538787879c2e2e18c ac8828d771a64882fd40a754e4efd01daa2fd0fa 402d617d5a649f565a1a8279e73386a0000e07f6 81bbef5080f4a3ef8081b435122d1b38be87e862 5723430880bb367582ffa74ccb1e4c9775883dd9 81012887e3e4a92072f922e6c7c87e1914572dda b5bfebf2d27fdb5214cdb7d65299f2f2d735640f 1eda3f58250d4e2555d8cd14284e411de0354129 6931b5c020857766e0a0706e1b883770e33f8457 7a93fa852d0388fbfdd7566c665f2d318a9bc8ee 0535f2ba682ab1a0414d3aeaabdb7dd22d627d66 1214169931c85c98014009521295b6248b498718 0d9e5e14b7785664e5d445d4edd0edae464f8266 4f79b605306ee17565b295117dde092a5753a3ec e0ea3ab3da2fdea5d2caa8d7846d95ac6e8e7a4b 87e36dc0b538adecba9dd98776d5d73b4ea5aa56 e71fb96b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [54:f7:09:fa:b1:42:01:9c:bd:ce:21:e4:01:f8:e0:05:d9:1b:41:23],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-13 07:02:01.296 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-13 07:02:01.300 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-13 07:02:01.304 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-13 07:02:01.306 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-13 07:02:01.307 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-13 07:02:01.308 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-13 07:02:01.309 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-13 07:02:01.310 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-13 07:02:01.311 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-13 07:02:01.312 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-13 07:02:01.318 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-13 07:02:01.322 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-13 07:02:01.323 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-13 07:02:01.324 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 07:02:01.778 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-13 07:02:01.778 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-13 07:02:01.779 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-13 07:02:01.779 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 07:02:01.781 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-13 07:02:01.782 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-13 07:02:01.782 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 07:02:01.783 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-13 07:02:01.783 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-13 07:02:01.784 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 07:02:01.784 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-13 07:02:01.785 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-13 07:02:01.786 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 07:02:01.786 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-13 07:02:01.786 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-13 07:02:01.787 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-13 07:02:01.791 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 250463936742516270538741312356656936913436458449 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 13 05:15:00 UTC 2023 Final Date: Wed Jan 12 05:14:59 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7c:2c:1c:1c:7e:43:6a:88:26:74:cc:01:b1:fe:38:d4:bf:9c:94:2a],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 76f11e4a01e3f69d670c7b448e0d3736e923f485 f2ef691207b4b590fcc6efd3ec47874a4a1b721f 714c6ebe74afb413b94bd061950e68fe4f054888 812ec715c85e86b31e55c02538787879c2e2e18c ac8828d771a64882fd40a754e4efd01daa2fd0fa 402d617d5a649f565a1a8279e73386a0000e07f6 81bbef5080f4a3ef8081b435122d1b38be87e862 5723430880bb367582ffa74ccb1e4c9775883dd9 81012887e3e4a92072f922e6c7c87e1914572dda b5bfebf2d27fdb5214cdb7d65299f2f2d735640f 1eda3f58250d4e2555d8cd14284e411de0354129 6931b5c020857766e0a0706e1b883770e33f8457 7a93fa852d0388fbfdd7566c665f2d318a9bc8ee 0535f2ba682ab1a0414d3aeaabdb7dd22d627d66 1214169931c85c98014009521295b6248b498718 0d9e5e14b7785664e5d445d4edd0edae464f8266 4f79b605306ee17565b295117dde092a5753a3ec e0ea3ab3da2fdea5d2caa8d7846d95ac6e8e7a4b 87e36dc0b538adecba9dd98776d5d73b4ea5aa56 e71fb96b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a7:a3:93:00:4e:41:1a:8c:49:b8:ba:17:55:31:5e:e6:5e:5b:f4:64],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-13 07:04:04.904 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-13 07:04:04.906 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-13 07:04:04.909 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2023-01-13 07:04:04.910 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-13 07:04:04.911 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2023-01-13 07:04:04.912 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-13 07:04:04.912 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-13 07:04:04.913 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-13 07:04:04.914 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-13 07:04:04.915 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-13 07:04:04.920 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-13 07:04:04.921 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-13 07:04:04.921 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-13 07:04:04.922 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 07:04:05.082 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-13 07:04:05.083 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-13 07:04:05.084 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-13 07:04:05.085 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 07:04:05.088 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-13 07:04:05.090 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-13 07:04:05.091 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 07:04:05.092 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-13 07:04:05.092 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-13 07:04:05.095 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 07:04:05.096 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-13 07:04:05.097 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-13 07:04:05.099 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 07:04:05.100 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-13 07:04:05.101 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-13 07:04:05.106 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-13 07:04:05.110 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 250463936742516270538741312356656936913436458449 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 13 05:15:00 UTC 2023 Final Date: Wed Jan 12 05:14:59 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7c:2c:1c:1c:7e:43:6a:88:26:74:cc:01:b1:fe:38:d4:bf:9c:94:2a],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 76f11e4a01e3f69d670c7b448e0d3736e923f485 f2ef691207b4b590fcc6efd3ec47874a4a1b721f 714c6ebe74afb413b94bd061950e68fe4f054888 812ec715c85e86b31e55c02538787879c2e2e18c ac8828d771a64882fd40a754e4efd01daa2fd0fa 402d617d5a649f565a1a8279e73386a0000e07f6 81bbef5080f4a3ef8081b435122d1b38be87e862 5723430880bb367582ffa74ccb1e4c9775883dd9 81012887e3e4a92072f922e6c7c87e1914572dda b5bfebf2d27fdb5214cdb7d65299f2f2d735640f 1eda3f58250d4e2555d8cd14284e411de0354129 6931b5c020857766e0a0706e1b883770e33f8457 7a93fa852d0388fbfdd7566c665f2d318a9bc8ee 0535f2ba682ab1a0414d3aeaabdb7dd22d627d66 1214169931c85c98014009521295b6248b498718 0d9e5e14b7785664e5d445d4edd0edae464f8266 4f79b605306ee17565b295117dde092a5753a3ec e0ea3ab3da2fdea5d2caa8d7846d95ac6e8e7a4b 87e36dc0b538adecba9dd98776d5d73b4ea5aa56 e71fb96b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a5:7a:c5:f6:91:a4:a0:bd:25:e3:ba:4b:9b:8c:39:dc:c9:31:67:9e],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-13 07:06:00.388 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-13 07:06:00.390 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-13 07:06:00.391 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2023-01-13 07:06:00.392 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-13 07:06:00.392 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2023-01-13 07:06:00.393 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-13 07:06:00.393 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-13 07:06:00.394 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-13 07:06:00.394 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-13 07:06:00.394 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-13 07:06:00.398 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-13 07:06:00.399 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-13 07:06:00.399 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-13 07:06:00.400 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 07:06:00.653 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-13 07:06:00.654 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-13 07:06:00.654 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-13 07:06:00.655 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 07:06:00.670 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-13 07:06:00.671 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-13 07:06:00.672 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 07:06:00.672 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-13 07:06:00.673 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-13 07:06:00.674 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 07:06:00.677 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-13 07:06:00.678 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-13 07:06:00.679 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 07:06:00.679 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-13 07:06:00.680 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-13 07:06:00.681 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-13 07:06:00.697 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 250463936742516270538741312356656936913436458449 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 13 05:15:00 UTC 2023 Final Date: Wed Jan 12 05:14:59 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7c:2c:1c:1c:7e:43:6a:88:26:74:cc:01:b1:fe:38:d4:bf:9c:94:2a],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 76f11e4a01e3f69d670c7b448e0d3736e923f485 f2ef691207b4b590fcc6efd3ec47874a4a1b721f 714c6ebe74afb413b94bd061950e68fe4f054888 812ec715c85e86b31e55c02538787879c2e2e18c ac8828d771a64882fd40a754e4efd01daa2fd0fa 402d617d5a649f565a1a8279e73386a0000e07f6 81bbef5080f4a3ef8081b435122d1b38be87e862 5723430880bb367582ffa74ccb1e4c9775883dd9 81012887e3e4a92072f922e6c7c87e1914572dda b5bfebf2d27fdb5214cdb7d65299f2f2d735640f 1eda3f58250d4e2555d8cd14284e411de0354129 6931b5c020857766e0a0706e1b883770e33f8457 7a93fa852d0388fbfdd7566c665f2d318a9bc8ee 0535f2ba682ab1a0414d3aeaabdb7dd22d627d66 1214169931c85c98014009521295b6248b498718 0d9e5e14b7785664e5d445d4edd0edae464f8266 4f79b605306ee17565b295117dde092a5753a3ec e0ea3ab3da2fdea5d2caa8d7846d95ac6e8e7a4b 87e36dc0b538adecba9dd98776d5d73b4ea5aa56 e71fb96b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [49:57:93:c6:19:13:78:28:43:08:7e:d5:57:cc:e6:d3:99:f5:6b:b7],[56:66:d1:a4] modulus: d3b10dcdbbf2f3d9eeb8c5256997dee42b13e346cbdb6857b32829f83f5f10c3a7603e5275c9089fc80b80627c15364e98c30505a9d2a650b64f6d4e3f0d623ff878fae5ece1954a36acd30a0c6699a9d8ebe7e8b760caaacdef913fbd05b819dfb26ceae9115abaeb6d99d66da9bf5a0fee68493d8194f69223893dc9cb9ab6721b01f879e965e3a2bd934e3a60fb9f87ad2338447f58a7d98cea50a9a0302a0db02f3db6b09b0bcb7bdc992dd7fb1eb4324622ee2f212b56619a028e7acc5bff75f2841c41d2e07c3b1d8c16b444f01d21588a2a3f5b562573009b1950c0f8b69d2bd907c7a03d703b57dfdba6c2f1ec7d1294b38d0c81c00d80c6cd764729 public exponent: 10001 ] 2023-01-13 07:09:37.505 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-13 07:09:37.508 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-13 07:09:37.510 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-13 07:09:37.511 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-13 07:09:37.511 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-13 07:09:37.512 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-13 07:09:37.513 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-13 07:09:37.513 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-13 07:09:37.514 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-13 07:09:37.514 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-13 07:09:37.518 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-13 07:09:37.519 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-13 07:09:37.520 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-13 07:09:37.520 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 07:09:37.755 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-13 07:09:37.756 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-13 07:09:37.757 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-13 07:09:37.757 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 07:09:37.759 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-13 07:09:37.760 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-13 07:09:37.760 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 07:09:37.761 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-13 07:09:37.761 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-13 07:09:37.763 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 07:09:37.764 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-13 07:09:37.764 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-13 07:09:37.765 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 07:09:37.765 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-13 07:09:37.766 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-13 07:09:37.767 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-13 07:09:37.771 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 250463936742516270538741312356656936913436458449 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 13 05:15:00 UTC 2023 Final Date: Wed Jan 12 05:14:59 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7c:2c:1c:1c:7e:43:6a:88:26:74:cc:01:b1:fe:38:d4:bf:9c:94:2a],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 76f11e4a01e3f69d670c7b448e0d3736e923f485 f2ef691207b4b590fcc6efd3ec47874a4a1b721f 714c6ebe74afb413b94bd061950e68fe4f054888 812ec715c85e86b31e55c02538787879c2e2e18c ac8828d771a64882fd40a754e4efd01daa2fd0fa 402d617d5a649f565a1a8279e73386a0000e07f6 81bbef5080f4a3ef8081b435122d1b38be87e862 5723430880bb367582ffa74ccb1e4c9775883dd9 81012887e3e4a92072f922e6c7c87e1914572dda b5bfebf2d27fdb5214cdb7d65299f2f2d735640f 1eda3f58250d4e2555d8cd14284e411de0354129 6931b5c020857766e0a0706e1b883770e33f8457 7a93fa852d0388fbfdd7566c665f2d318a9bc8ee 0535f2ba682ab1a0414d3aeaabdb7dd22d627d66 1214169931c85c98014009521295b6248b498718 0d9e5e14b7785664e5d445d4edd0edae464f8266 4f79b605306ee17565b295117dde092a5753a3ec e0ea3ab3da2fdea5d2caa8d7846d95ac6e8e7a4b 87e36dc0b538adecba9dd98776d5d73b4ea5aa56 e71fb96b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [50:97:2b:ba:36:05:c7:75:a8:5e:55:9a:05:b9:17:0c:53:d6:36:17],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-13 07:18:11.457 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-13 07:18:11.460 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-13 07:18:11.463 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2023-01-13 07:18:11.465 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-13 07:18:11.466 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2023-01-13 07:18:11.468 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-13 07:18:11.469 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-13 07:18:11.470 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-13 07:18:11.471 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-13 07:18:11.472 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-13 07:18:11.481 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-13 07:18:11.482 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-13 07:18:11.482 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-13 07:18:11.483 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 07:18:11.714 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-13 07:18:11.714 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-13 07:18:11.715 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-13 07:18:11.715 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 07:18:11.716 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-13 07:18:11.716 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-13 07:18:11.717 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 07:18:11.717 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-13 07:18:11.717 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-13 07:18:11.718 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 07:18:11.718 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-13 07:18:11.719 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-13 07:18:11.719 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 07:18:11.720 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-13 07:18:11.720 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-13 07:18:11.721 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-13 07:18:11.724 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 250463936742516270538741312356656936913436458449 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 13 05:15:00 UTC 2023 Final Date: Wed Jan 12 05:14:59 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7c:2c:1c:1c:7e:43:6a:88:26:74:cc:01:b1:fe:38:d4:bf:9c:94:2a],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 76f11e4a01e3f69d670c7b448e0d3736e923f485 f2ef691207b4b590fcc6efd3ec47874a4a1b721f 714c6ebe74afb413b94bd061950e68fe4f054888 812ec715c85e86b31e55c02538787879c2e2e18c ac8828d771a64882fd40a754e4efd01daa2fd0fa 402d617d5a649f565a1a8279e73386a0000e07f6 81bbef5080f4a3ef8081b435122d1b38be87e862 5723430880bb367582ffa74ccb1e4c9775883dd9 81012887e3e4a92072f922e6c7c87e1914572dda b5bfebf2d27fdb5214cdb7d65299f2f2d735640f 1eda3f58250d4e2555d8cd14284e411de0354129 6931b5c020857766e0a0706e1b883770e33f8457 7a93fa852d0388fbfdd7566c665f2d318a9bc8ee 0535f2ba682ab1a0414d3aeaabdb7dd22d627d66 1214169931c85c98014009521295b6248b498718 0d9e5e14b7785664e5d445d4edd0edae464f8266 4f79b605306ee17565b295117dde092a5753a3ec e0ea3ab3da2fdea5d2caa8d7846d95ac6e8e7a4b 87e36dc0b538adecba9dd98776d5d73b4ea5aa56 e71fb96b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4b:85:d4:c9:38:75:06:44:96:38:0f:cc:0c:56:18:df:c1:51:2e:2f],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-13 07:24:12.310 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-13 07:24:12.312 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-13 07:24:12.318 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-13 07:24:12.324 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-13 07:24:12.324 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-13 07:24:12.325 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-13 07:24:12.325 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-13 07:24:12.326 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-13 07:24:12.326 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-13 07:24:12.327 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-13 07:24:12.332 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-13 07:24:12.333 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-13 07:24:12.333 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-13 07:24:12.333 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 07:24:12.568 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-13 07:24:12.569 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-13 07:24:12.569 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-13 07:24:12.570 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 07:24:12.571 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-13 07:24:12.571 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-13 07:24:12.572 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 07:24:12.572 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-13 07:24:12.573 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-13 07:24:12.574 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 07:24:12.574 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-13 07:24:12.575 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-13 07:24:12.576 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 07:24:12.576 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-13 07:24:12.588 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-13 07:24:12.602 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-13 07:24:12.646 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 250463936742516270538741312356656936913436458449 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 13 05:15:00 UTC 2023 Final Date: Wed Jan 12 05:14:59 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7c:2c:1c:1c:7e:43:6a:88:26:74:cc:01:b1:fe:38:d4:bf:9c:94:2a],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 76f11e4a01e3f69d670c7b448e0d3736e923f485 f2ef691207b4b590fcc6efd3ec47874a4a1b721f 714c6ebe74afb413b94bd061950e68fe4f054888 812ec715c85e86b31e55c02538787879c2e2e18c ac8828d771a64882fd40a754e4efd01daa2fd0fa 402d617d5a649f565a1a8279e73386a0000e07f6 81bbef5080f4a3ef8081b435122d1b38be87e862 5723430880bb367582ffa74ccb1e4c9775883dd9 81012887e3e4a92072f922e6c7c87e1914572dda b5bfebf2d27fdb5214cdb7d65299f2f2d735640f 1eda3f58250d4e2555d8cd14284e411de0354129 6931b5c020857766e0a0706e1b883770e33f8457 7a93fa852d0388fbfdd7566c665f2d318a9bc8ee 0535f2ba682ab1a0414d3aeaabdb7dd22d627d66 1214169931c85c98014009521295b6248b498718 0d9e5e14b7785664e5d445d4edd0edae464f8266 4f79b605306ee17565b295117dde092a5753a3ec e0ea3ab3da2fdea5d2caa8d7846d95ac6e8e7a4b 87e36dc0b538adecba9dd98776d5d73b4ea5aa56 e71fb96b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [51:70:04:2f:8a:6b:9c:ab:70:c0:89:01:09:f1:2d:af:52:12:e9:8a],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-13 07:24:30.030 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-13 07:24:30.031 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-13 07:24:30.032 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-13 07:24:30.033 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-13 07:24:30.033 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-13 07:24:30.034 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-13 07:24:30.035 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-13 07:24:30.035 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-13 07:24:30.035 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-13 07:24:30.036 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-13 07:24:30.042 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-13 07:24:30.043 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-13 07:24:30.043 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-13 07:24:30.044 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 07:24:30.326 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-13 07:24:30.326 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-13 07:24:30.327 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-13 07:24:30.327 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 07:24:30.328 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-13 07:24:30.329 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-13 07:24:30.329 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 07:24:30.330 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-13 07:24:30.330 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-13 07:24:30.331 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 07:24:30.331 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-13 07:24:30.331 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-13 07:24:30.332 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 07:24:30.332 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-13 07:24:30.333 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-13 07:24:30.333 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-13 07:24:30.336 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 250463936742516270538741312356656936913436458449 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 13 05:15:00 UTC 2023 Final Date: Wed Jan 12 05:14:59 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7c:2c:1c:1c:7e:43:6a:88:26:74:cc:01:b1:fe:38:d4:bf:9c:94:2a],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 76f11e4a01e3f69d670c7b448e0d3736e923f485 f2ef691207b4b590fcc6efd3ec47874a4a1b721f 714c6ebe74afb413b94bd061950e68fe4f054888 812ec715c85e86b31e55c02538787879c2e2e18c ac8828d771a64882fd40a754e4efd01daa2fd0fa 402d617d5a649f565a1a8279e73386a0000e07f6 81bbef5080f4a3ef8081b435122d1b38be87e862 5723430880bb367582ffa74ccb1e4c9775883dd9 81012887e3e4a92072f922e6c7c87e1914572dda b5bfebf2d27fdb5214cdb7d65299f2f2d735640f 1eda3f58250d4e2555d8cd14284e411de0354129 6931b5c020857766e0a0706e1b883770e33f8457 7a93fa852d0388fbfdd7566c665f2d318a9bc8ee 0535f2ba682ab1a0414d3aeaabdb7dd22d627d66 1214169931c85c98014009521295b6248b498718 0d9e5e14b7785664e5d445d4edd0edae464f8266 4f79b605306ee17565b295117dde092a5753a3ec e0ea3ab3da2fdea5d2caa8d7846d95ac6e8e7a4b 87e36dc0b538adecba9dd98776d5d73b4ea5aa56 e71fb96b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2c:a0:34:c8:a5:0d:94:4c:61:c1:9b:7d:9f:97:84:db:b9:86:eb:cf],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-13 07:52:13.933 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-13 07:52:13.936 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-13 07:52:13.939 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-13 07:52:13.940 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-13 07:52:13.941 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-13 07:52:13.941 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-13 07:52:13.942 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-13 07:52:13.942 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-13 07:52:13.943 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-13 07:52:13.943 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-13 07:52:13.948 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-13 07:52:13.949 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-13 07:52:13.949 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-13 07:52:13.950 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 07:52:14.211 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-13 07:52:14.212 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-13 07:52:14.212 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-13 07:52:14.213 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 07:52:14.215 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-13 07:52:14.215 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-13 07:52:14.216 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 07:52:14.216 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-13 07:52:14.216 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-13 07:52:14.217 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 07:52:14.217 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-13 07:52:14.218 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-13 07:52:14.218 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 07:52:14.219 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-13 07:52:14.219 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-13 07:52:14.220 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-13 07:52:14.225 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 250463936742516270538741312356656936913436458449 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 13 05:15:00 UTC 2023 Final Date: Wed Jan 12 05:14:59 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7c:2c:1c:1c:7e:43:6a:88:26:74:cc:01:b1:fe:38:d4:bf:9c:94:2a],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 76f11e4a01e3f69d670c7b448e0d3736e923f485 f2ef691207b4b590fcc6efd3ec47874a4a1b721f 714c6ebe74afb413b94bd061950e68fe4f054888 812ec715c85e86b31e55c02538787879c2e2e18c ac8828d771a64882fd40a754e4efd01daa2fd0fa 402d617d5a649f565a1a8279e73386a0000e07f6 81bbef5080f4a3ef8081b435122d1b38be87e862 5723430880bb367582ffa74ccb1e4c9775883dd9 81012887e3e4a92072f922e6c7c87e1914572dda b5bfebf2d27fdb5214cdb7d65299f2f2d735640f 1eda3f58250d4e2555d8cd14284e411de0354129 6931b5c020857766e0a0706e1b883770e33f8457 7a93fa852d0388fbfdd7566c665f2d318a9bc8ee 0535f2ba682ab1a0414d3aeaabdb7dd22d627d66 1214169931c85c98014009521295b6248b498718 0d9e5e14b7785664e5d445d4edd0edae464f8266 4f79b605306ee17565b295117dde092a5753a3ec e0ea3ab3da2fdea5d2caa8d7846d95ac6e8e7a4b 87e36dc0b538adecba9dd98776d5d73b4ea5aa56 e71fb96b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [32:45:e2:38:80:aa:00:1f:16:2e:b7:e2:62:c3:a7:22:23:ec:c9:10],[56:66:d1:a4] modulus: dda34739bf54e5ac43b7d91dbe1e8669772917c62d340de3176b5fde634f22698342cb0aaa6500fb394471fb2201161d008c7faeb7ee753cbcb7e482bb87016faf9f00f0d084f9e1287b8e95ed0004bb9637d993d33f9bd5d028df6a057d47c2b65f64d8ad36642c0b84b868d4ff3f7d2a9dce32f0be5d6e5ee9cc3faca6d699f2764d4d903059011693502995a1a657edd5f2f33138e58c820c49085771156d743f4a8612c30ab9cc48c4715866d9d2d01a176642cc0bf7a6ad0f5ca262d2b44254661bf2b4166c02ccc65f7682137707af5c644641e1067372606e33276f41e14d1787f4a7503255dcfd8a903ac90e1a6e01c6c848100bebb15473fb6edb0b public exponent: 10001 ] 2023-01-13 07:52:21.985 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-13 07:52:21.986 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-13 07:52:21.988 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-13 07:52:21.988 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-13 07:52:21.989 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-13 07:52:21.990 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-13 07:52:21.990 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-13 07:52:21.990 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-13 07:52:21.991 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-13 07:52:21.991 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-13 07:52:21.994 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-13 07:52:21.995 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-13 07:52:21.995 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-13 07:52:21.995 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 07:52:22.135 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-13 07:52:22.136 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-13 07:52:22.136 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-13 07:52:22.136 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-13 07:52:22.137 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-13 07:52:22.138 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-13 07:52:22.138 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 07:52:22.138 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-13 07:52:22.139 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-13 07:52:22.139 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 07:52:22.139 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-13 07:52:22.140 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-13 07:52:22.140 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-13 07:52:22.141 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-13 07:52:22.141 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-13 07:52:22.142 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-13 07:52:22.144 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 250463936742516270538741312356656936913436458449 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 13 05:15:00 UTC 2023 Final Date: Wed Jan 12 05:14:59 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [7c:2c:1c:1c:7e:43:6a:88:26:74:cc:01:b1:fe:38:d4:bf:9c:94:2a],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 76f11e4a01e3f69d670c7b448e0d3736e923f485 f2ef691207b4b590fcc6efd3ec47874a4a1b721f 714c6ebe74afb413b94bd061950e68fe4f054888 812ec715c85e86b31e55c02538787879c2e2e18c ac8828d771a64882fd40a754e4efd01daa2fd0fa 402d617d5a649f565a1a8279e73386a0000e07f6 81bbef5080f4a3ef8081b435122d1b38be87e862 5723430880bb367582ffa74ccb1e4c9775883dd9 81012887e3e4a92072f922e6c7c87e1914572dda b5bfebf2d27fdb5214cdb7d65299f2f2d735640f 1eda3f58250d4e2555d8cd14284e411de0354129 6931b5c020857766e0a0706e1b883770e33f8457 7a93fa852d0388fbfdd7566c665f2d318a9bc8ee 0535f2ba682ab1a0414d3aeaabdb7dd22d627d66 1214169931c85c98014009521295b6248b498718 0d9e5e14b7785664e5d445d4edd0edae464f8266 4f79b605306ee17565b295117dde092a5753a3ec e0ea3ab3da2fdea5d2caa8d7846d95ac6e8e7a4b 87e36dc0b538adecba9dd98776d5d73b4ea5aa56 e71fb96b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5f:69:66:d4:8c:c5:ef:7f:3b:9d:53:37:c3:ce:53:43:6d:b4:7d:94],[56:66:d1:a4] modulus: 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 public exponent: 10001 ]