By type
2023-01-16 05:06:45,110 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2023-01-16 05:06:48,323 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2023-01-16 05:06:49.781 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Jan 16, 2023 5:06:53 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jan 16, 2023 5:06:53 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jan 16, 2023 5:06:53 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jan 16, 2023 5:06:53 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2023-01-16 05:06:54.675 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2023-01-16 05:06:55.116 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2023-01-16 05:06:55.383 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2023-01-16 05:06:56.776 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2023-01-16 05:06:56.788 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2023-01-16 05:06:56.791 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2023-01-16 05:06:56.801 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2023-01-16 05:06:56.873 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2023-01-16 05:06:56.879 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2023-01-16 05:06:57.072 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2023-01-16 05:06:58.208 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jan 16, 2023 5:06:59 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2023-01-16 05:06:59.904 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 16.333 seconds (JVM running for 20.181) Jan 16, 2023 5:07:10 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2023-01-16 05:07:48.476 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-16 05:07:48.496 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-16 05:07:48.590 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2023-01-16 05:07:48.600 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-16 05:07:48.636 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2023-01-16 05:07:48.640 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-16 05:07:48.642 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-16 05:07:48.645 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-16 05:07:48.647 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-16 05:07:48.654 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-16 05:07:48.672 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-16 05:07:48.680 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-16 05:07:48.773 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-16 05:07:48.781 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-16 05:07:48.782 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-16 05:07:48.787 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-16 05:07:49.629 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-16 05:07:49.634 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-16 05:07:49.634 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-16 05:07:49.639 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-16 05:07:49.654 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-16 05:07:49.657 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-16 05:07:49.658 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-16 05:07:49.660 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-16 05:07:49.662 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-16 05:07:49.704 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-16 05:07:49.705 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-16 05:07:49.705 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-16 05:07:49.715 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-16 05:07:49.716 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-16 05:07:49.717 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-16 05:07:49.719 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-16 05:07:49.801 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 618030157213030726718489113057499996778427877620 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jan 16 05:04:36 UTC 2023 Final Date: Sat Jan 15 05:04:35 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [bb:f9:e2:f5:25:c4:3e:5a:bb:1a:54:8e:f9:d9:31:6e:0b:39:c8:4a],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 62bd748800e4e931effbfea7dd46dc6d3eb60c46 2163b8555b35ccfc32dec865486134de6f1eebd6 937d9c9255ef545d9ff10f3aa20e72b10014447e a4679ee402dd2f2e34636ad52ffb4bee2a5b18e8 79c2c42205a02353bb0e98ca4d8616cc916dcce4 810e79039b00483f9e9c55d7f5e07df17fd0543a b36b941d4ba77fdfb18cabea831bfdeba1f25ce2 4f57ad2dd8e27e6306c4a3ee898fc9ff01973bb9 50d056785189b5a7c277af008ab7788689cd155e 2bbadba47531f71baf3e849c0cd3a806e4d8576e 91c66bb1a2eac0d4fb7a599e4f0de03819815b67 446c4be4dc1145f1bc26908da10326e601d48518 ded0ee6370c5fe68d87fc888a5e54c38aa18455f bc23e1a41e6a648c10fa0ddd19faad1a7e780f78 0ef27d4e46a9ba6fc4d8f4cb1a013e2d35c335dd 0f718d6ab12bf2d3deb6fc3675ea8e43bf2fee6b 19defa36748f37f3ed10e7e1975805d52d68a27c 1d6d52ffecfde2cada10311617900cfaa8ab93e1 daade11e591a82f60a75362bfba728fc277f26cf eb58169f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [02:97:62:f7:1a:49:78:66:7c:e1:16:c7:2c:16:de:2d:44:59:d5:8a],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-16 06:49:04.165 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-16 06:49:04.168 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-16 06:49:04.171 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-16 06:49:04.173 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-16 06:49:04.173 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-16 06:49:04.175 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-16 06:49:04.175 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-16 06:49:04.176 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-16 06:49:04.176 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-16 06:49:04.177 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-16 06:49:04.186 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-16 06:49:04.188 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-16 06:49:04.188 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-16 06:49:04.189 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-16 06:49:04.399 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-16 06:49:04.400 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-16 06:49:04.401 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-16 06:49:04.401 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-16 06:49:04.404 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-16 06:49:04.405 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-16 06:49:04.405 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-16 06:49:04.406 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-16 06:49:04.406 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-16 06:49:04.408 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-16 06:49:04.408 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-16 06:49:04.409 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-16 06:49:04.410 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-16 06:49:04.411 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-16 06:49:04.411 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-16 06:49:04.413 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-16 06:49:04.418 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 618030157213030726718489113057499996778427877620 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jan 16 05:04:36 UTC 2023 Final Date: Sat Jan 15 05:04:35 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [bb:f9:e2:f5:25:c4:3e:5a:bb:1a:54:8e:f9:d9:31:6e:0b:39:c8:4a],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 62bd748800e4e931effbfea7dd46dc6d3eb60c46 2163b8555b35ccfc32dec865486134de6f1eebd6 937d9c9255ef545d9ff10f3aa20e72b10014447e a4679ee402dd2f2e34636ad52ffb4bee2a5b18e8 79c2c42205a02353bb0e98ca4d8616cc916dcce4 810e79039b00483f9e9c55d7f5e07df17fd0543a b36b941d4ba77fdfb18cabea831bfdeba1f25ce2 4f57ad2dd8e27e6306c4a3ee898fc9ff01973bb9 50d056785189b5a7c277af008ab7788689cd155e 2bbadba47531f71baf3e849c0cd3a806e4d8576e 91c66bb1a2eac0d4fb7a599e4f0de03819815b67 446c4be4dc1145f1bc26908da10326e601d48518 ded0ee6370c5fe68d87fc888a5e54c38aa18455f bc23e1a41e6a648c10fa0ddd19faad1a7e780f78 0ef27d4e46a9ba6fc4d8f4cb1a013e2d35c335dd 0f718d6ab12bf2d3deb6fc3675ea8e43bf2fee6b 19defa36748f37f3ed10e7e1975805d52d68a27c 1d6d52ffecfde2cada10311617900cfaa8ab93e1 daade11e591a82f60a75362bfba728fc277f26cf eb58169f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3c:d8:d5:47:97:82:5e:e3:b2:c1:64:3f:5a:dc:11:45:a4:d8:08:5e],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-16 06:50:53.304 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-16 06:50:53.307 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-16 06:50:53.309 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2023-01-16 06:50:53.310 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-16 06:50:53.311 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2023-01-16 06:50:53.312 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-16 06:50:53.312 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-16 06:50:53.313 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-16 06:50:53.314 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-16 06:50:53.322 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-16 06:50:53.332 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-16 06:50:53.333 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-16 06:50:53.333 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-16 06:50:53.334 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-16 06:50:53.518 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-16 06:50:53.522 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-16 06:50:53.523 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-16 06:50:53.524 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-16 06:50:53.529 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-16 06:50:53.530 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-16 06:50:53.531 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-16 06:50:53.531 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-16 06:50:53.532 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-16 06:50:53.534 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-16 06:50:53.535 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-16 06:50:53.536 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-16 06:50:53.537 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-16 06:50:53.538 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-16 06:50:53.538 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-16 06:50:53.540 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-16 06:50:53.546 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 618030157213030726718489113057499996778427877620 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jan 16 05:04:36 UTC 2023 Final Date: Sat Jan 15 05:04:35 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [bb:f9:e2:f5:25:c4:3e:5a:bb:1a:54:8e:f9:d9:31:6e:0b:39:c8:4a],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 62bd748800e4e931effbfea7dd46dc6d3eb60c46 2163b8555b35ccfc32dec865486134de6f1eebd6 937d9c9255ef545d9ff10f3aa20e72b10014447e a4679ee402dd2f2e34636ad52ffb4bee2a5b18e8 79c2c42205a02353bb0e98ca4d8616cc916dcce4 810e79039b00483f9e9c55d7f5e07df17fd0543a b36b941d4ba77fdfb18cabea831bfdeba1f25ce2 4f57ad2dd8e27e6306c4a3ee898fc9ff01973bb9 50d056785189b5a7c277af008ab7788689cd155e 2bbadba47531f71baf3e849c0cd3a806e4d8576e 91c66bb1a2eac0d4fb7a599e4f0de03819815b67 446c4be4dc1145f1bc26908da10326e601d48518 ded0ee6370c5fe68d87fc888a5e54c38aa18455f bc23e1a41e6a648c10fa0ddd19faad1a7e780f78 0ef27d4e46a9ba6fc4d8f4cb1a013e2d35c335dd 0f718d6ab12bf2d3deb6fc3675ea8e43bf2fee6b 19defa36748f37f3ed10e7e1975805d52d68a27c 1d6d52ffecfde2cada10311617900cfaa8ab93e1 daade11e591a82f60a75362bfba728fc277f26cf eb58169f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [cc:c1:fc:5e:60:29:c9:69:cf:17:78:ee:c5:da:ea:65:cd:a5:df:cd],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-16 06:53:24.122 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-16 06:53:24.125 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-16 06:53:24.128 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2023-01-16 06:53:24.129 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-16 06:53:24.129 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2023-01-16 06:53:24.131 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-16 06:53:24.145 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-16 06:53:24.146 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-16 06:53:24.149 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-16 06:53:24.151 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-16 06:53:24.160 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-16 06:53:24.162 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-16 06:53:24.168 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-16 06:53:24.169 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-16 06:53:24.317 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-16 06:53:24.318 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-16 06:53:24.319 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-16 06:53:24.319 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-16 06:53:24.327 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-16 06:53:24.338 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-16 06:53:24.339 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-16 06:53:24.339 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-16 06:53:24.340 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-16 06:53:24.349 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-16 06:53:24.350 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-16 06:53:24.360 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-16 06:53:24.362 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-16 06:53:24.362 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-16 06:53:24.363 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-16 06:53:24.373 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-16 06:53:24.378 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 618030157213030726718489113057499996778427877620 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jan 16 05:04:36 UTC 2023 Final Date: Sat Jan 15 05:04:35 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [bb:f9:e2:f5:25:c4:3e:5a:bb:1a:54:8e:f9:d9:31:6e:0b:39:c8:4a],[56:66:d1:a4] modulus: bd1c94cc25dfb9dcf62e0f2f8263626d2c5c0cf8b75026867ed347554908602763bc5c25a2bf446ad53c9fda70f5fc21c249a9c491653744234119910ee2ac4d410a2ca522d4f5d91283873206c9f044532d6c3cfdd597dc6b118dcd9f40aab77b008091deb62106830ee29eace8e67db5b7553077cdbda595580504c39fade21946e14d255f7465b385f1f936dfe7858ad7f4766e3f21dc6f6bd4be326e303144c10e758a4c309e4ef384d39e33e5ae541cc198d1e30532e00cca5d1d9e070e09e60bf5c2b2efca90cdb360e010d838b5cdcc44777f343ed895b7eb9cf6ac846cd497f4a8658b7726d4147e48c80bf717d20843ef87e9336876f7d9c3418da5e90a9a40e3deeb4d72d49e40a6116bba0200d5b7ffebee20bc88f16f4a0e3659f5fdc80f2443d7d1b037a02655dcda64626da1292959244b73b70b1f2549b604afb47ff0907f548282ff120f24353d6f8c5757e37bff3006157022c1269014f0c03ceb7877dc121de9b1e62e119b74a96b6b7d06e7f43de30ac3982b3bfd0515 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 62bd748800e4e931effbfea7dd46dc6d3eb60c46 2163b8555b35ccfc32dec865486134de6f1eebd6 937d9c9255ef545d9ff10f3aa20e72b10014447e a4679ee402dd2f2e34636ad52ffb4bee2a5b18e8 79c2c42205a02353bb0e98ca4d8616cc916dcce4 810e79039b00483f9e9c55d7f5e07df17fd0543a b36b941d4ba77fdfb18cabea831bfdeba1f25ce2 4f57ad2dd8e27e6306c4a3ee898fc9ff01973bb9 50d056785189b5a7c277af008ab7788689cd155e 2bbadba47531f71baf3e849c0cd3a806e4d8576e 91c66bb1a2eac0d4fb7a599e4f0de03819815b67 446c4be4dc1145f1bc26908da10326e601d48518 ded0ee6370c5fe68d87fc888a5e54c38aa18455f bc23e1a41e6a648c10fa0ddd19faad1a7e780f78 0ef27d4e46a9ba6fc4d8f4cb1a013e2d35c335dd 0f718d6ab12bf2d3deb6fc3675ea8e43bf2fee6b 19defa36748f37f3ed10e7e1975805d52d68a27c 1d6d52ffecfde2cada10311617900cfaa8ab93e1 daade11e591a82f60a75362bfba728fc277f26cf eb58169f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [da:ad:b2:56:27:b0:aa:02:65:a3:e1:74:d5:78:80:72:67:a6:b2:7a],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-16 06:56:30.423 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-16 06:56:30.428 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-16 06:56:30.438 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-16 06:56:30.440 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-16 06:56:30.441 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-16 06:56:30.444 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-16 06:56:30.447 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-16 06:56:30.450 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-16 06:56:30.451 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-16 06:56:30.452 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-16 06:56:30.460 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-16 06:56:30.462 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-16 06:56:30.463 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-16 06:56:30.464 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-16 06:56:30.617 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-16 06:56:30.618 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-16 06:56:30.619 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-16 06:56:30.620 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-16 06:56:30.621 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-16 06:56:30.622 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-16 06:56:30.623 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-16 06:56:30.623 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-16 06:56:30.624 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-16 06:56:30.624 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-16 06:56:30.625 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-16 06:56:30.625 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-16 06:56:30.626 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-16 06:56:30.627 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-16 06:56:30.627 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-16 06:56:30.628 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-16 06:56:30.631 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 618030157213030726718489113057499996778427877620 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jan 16 05:04:36 UTC 2023 Final Date: Sat Jan 15 05:04:35 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [bb:f9:e2:f5:25:c4:3e:5a:bb:1a:54:8e:f9:d9:31:6e:0b:39:c8:4a],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 62bd748800e4e931effbfea7dd46dc6d3eb60c46 2163b8555b35ccfc32dec865486134de6f1eebd6 937d9c9255ef545d9ff10f3aa20e72b10014447e a4679ee402dd2f2e34636ad52ffb4bee2a5b18e8 79c2c42205a02353bb0e98ca4d8616cc916dcce4 810e79039b00483f9e9c55d7f5e07df17fd0543a b36b941d4ba77fdfb18cabea831bfdeba1f25ce2 4f57ad2dd8e27e6306c4a3ee898fc9ff01973bb9 50d056785189b5a7c277af008ab7788689cd155e 2bbadba47531f71baf3e849c0cd3a806e4d8576e 91c66bb1a2eac0d4fb7a599e4f0de03819815b67 446c4be4dc1145f1bc26908da10326e601d48518 ded0ee6370c5fe68d87fc888a5e54c38aa18455f bc23e1a41e6a648c10fa0ddd19faad1a7e780f78 0ef27d4e46a9ba6fc4d8f4cb1a013e2d35c335dd 0f718d6ab12bf2d3deb6fc3675ea8e43bf2fee6b 19defa36748f37f3ed10e7e1975805d52d68a27c 1d6d52ffecfde2cada10311617900cfaa8ab93e1 daade11e591a82f60a75362bfba728fc277f26cf eb58169f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [66:92:3a:70:dc:5b:41:77:f4:1f:d8:cc:0e:a0:50:4f:08:e3:36:82],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-16 07:04:23.331 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-16 07:04:23.357 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-16 07:04:23.363 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-16 07:04:23.366 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-16 07:04:23.367 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-16 07:04:23.368 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-16 07:04:23.369 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-16 07:04:23.370 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-16 07:04:23.374 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-16 07:04:23.375 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-16 07:04:23.384 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-16 07:04:23.385 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-16 07:04:23.386 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-16 07:04:23.386 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-16 07:04:23.569 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-16 07:04:23.570 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-16 07:04:23.570 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-16 07:04:23.571 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-16 07:04:23.572 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-16 07:04:23.573 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-16 07:04:23.573 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-16 07:04:23.574 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-16 07:04:23.574 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-16 07:04:23.576 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-16 07:04:23.576 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-16 07:04:23.577 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-16 07:04:23.578 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-16 07:04:23.579 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-16 07:04:23.579 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-16 07:04:23.581 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-16 07:04:23.587 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 618030157213030726718489113057499996778427877620 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jan 16 05:04:36 UTC 2023 Final Date: Sat Jan 15 05:04:35 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [bb:f9:e2:f5:25:c4:3e:5a:bb:1a:54:8e:f9:d9:31:6e:0b:39:c8:4a],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 62bd748800e4e931effbfea7dd46dc6d3eb60c46 2163b8555b35ccfc32dec865486134de6f1eebd6 937d9c9255ef545d9ff10f3aa20e72b10014447e a4679ee402dd2f2e34636ad52ffb4bee2a5b18e8 79c2c42205a02353bb0e98ca4d8616cc916dcce4 810e79039b00483f9e9c55d7f5e07df17fd0543a b36b941d4ba77fdfb18cabea831bfdeba1f25ce2 4f57ad2dd8e27e6306c4a3ee898fc9ff01973bb9 50d056785189b5a7c277af008ab7788689cd155e 2bbadba47531f71baf3e849c0cd3a806e4d8576e 91c66bb1a2eac0d4fb7a599e4f0de03819815b67 446c4be4dc1145f1bc26908da10326e601d48518 ded0ee6370c5fe68d87fc888a5e54c38aa18455f bc23e1a41e6a648c10fa0ddd19faad1a7e780f78 0ef27d4e46a9ba6fc4d8f4cb1a013e2d35c335dd 0f718d6ab12bf2d3deb6fc3675ea8e43bf2fee6b 19defa36748f37f3ed10e7e1975805d52d68a27c 1d6d52ffecfde2cada10311617900cfaa8ab93e1 daade11e591a82f60a75362bfba728fc277f26cf eb58169f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8b:cc:4b:5c:03:ae:7b:7b:09:da:58:f2:1e:a3:47:f6:4e:5b:d9:95],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-16 07:10:36.344 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-16 07:10:36.350 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-16 07:10:36.354 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-16 07:10:36.356 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-16 07:10:36.358 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-16 07:10:36.360 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-16 07:10:36.362 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-16 07:10:36.363 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-16 07:10:36.364 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-16 07:10:36.364 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-16 07:10:36.373 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-16 07:10:36.376 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-16 07:10:36.377 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-16 07:10:36.378 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-16 07:10:36.561 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-16 07:10:36.562 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-16 07:10:36.563 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-16 07:10:36.563 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-16 07:10:36.566 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-16 07:10:36.566 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-16 07:10:36.567 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-16 07:10:36.568 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-16 07:10:36.568 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-16 07:10:36.570 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-16 07:10:36.570 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-16 07:10:36.571 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-16 07:10:36.572 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-16 07:10:36.572 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-16 07:10:36.573 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-16 07:10:36.574 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-16 07:10:36.578 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 618030157213030726718489113057499996778427877620 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jan 16 05:04:36 UTC 2023 Final Date: Sat Jan 15 05:04:35 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [bb:f9:e2:f5:25:c4:3e:5a:bb:1a:54:8e:f9:d9:31:6e:0b:39:c8:4a],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 62bd748800e4e931effbfea7dd46dc6d3eb60c46 2163b8555b35ccfc32dec865486134de6f1eebd6 937d9c9255ef545d9ff10f3aa20e72b10014447e a4679ee402dd2f2e34636ad52ffb4bee2a5b18e8 79c2c42205a02353bb0e98ca4d8616cc916dcce4 810e79039b00483f9e9c55d7f5e07df17fd0543a b36b941d4ba77fdfb18cabea831bfdeba1f25ce2 4f57ad2dd8e27e6306c4a3ee898fc9ff01973bb9 50d056785189b5a7c277af008ab7788689cd155e 2bbadba47531f71baf3e849c0cd3a806e4d8576e 91c66bb1a2eac0d4fb7a599e4f0de03819815b67 446c4be4dc1145f1bc26908da10326e601d48518 ded0ee6370c5fe68d87fc888a5e54c38aa18455f bc23e1a41e6a648c10fa0ddd19faad1a7e780f78 0ef27d4e46a9ba6fc4d8f4cb1a013e2d35c335dd 0f718d6ab12bf2d3deb6fc3675ea8e43bf2fee6b 19defa36748f37f3ed10e7e1975805d52d68a27c 1d6d52ffecfde2cada10311617900cfaa8ab93e1 daade11e591a82f60a75362bfba728fc277f26cf eb58169f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [61:7c:7f:14:e4:9f:6f:b7:9e:a8:94:7b:1b:57:5e:fa:55:cc:50:76],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-16 07:18:10.744 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-16 07:18:10.748 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-16 07:18:10.752 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-16 07:18:10.754 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-16 07:18:10.755 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-16 07:18:10.756 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-16 07:18:10.757 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-16 07:18:10.757 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-16 07:18:10.758 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-16 07:18:10.758 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-16 07:18:10.765 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-16 07:18:10.766 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-16 07:18:10.767 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-16 07:18:10.767 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-16 07:18:10.921 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-16 07:18:10.921 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-16 07:18:10.922 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-16 07:18:10.922 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-16 07:18:10.924 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-16 07:18:10.925 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-16 07:18:10.926 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-16 07:18:10.926 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-16 07:18:10.927 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-16 07:18:10.929 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-16 07:18:10.929 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-16 07:18:10.930 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-16 07:18:10.931 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-16 07:18:10.931 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-16 07:18:10.932 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-16 07:18:10.933 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-16 07:18:10.937 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 618030157213030726718489113057499996778427877620 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jan 16 05:04:36 UTC 2023 Final Date: Sat Jan 15 05:04:35 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [bb:f9:e2:f5:25:c4:3e:5a:bb:1a:54:8e:f9:d9:31:6e:0b:39:c8:4a],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 62bd748800e4e931effbfea7dd46dc6d3eb60c46 2163b8555b35ccfc32dec865486134de6f1eebd6 937d9c9255ef545d9ff10f3aa20e72b10014447e a4679ee402dd2f2e34636ad52ffb4bee2a5b18e8 79c2c42205a02353bb0e98ca4d8616cc916dcce4 810e79039b00483f9e9c55d7f5e07df17fd0543a b36b941d4ba77fdfb18cabea831bfdeba1f25ce2 4f57ad2dd8e27e6306c4a3ee898fc9ff01973bb9 50d056785189b5a7c277af008ab7788689cd155e 2bbadba47531f71baf3e849c0cd3a806e4d8576e 91c66bb1a2eac0d4fb7a599e4f0de03819815b67 446c4be4dc1145f1bc26908da10326e601d48518 ded0ee6370c5fe68d87fc888a5e54c38aa18455f bc23e1a41e6a648c10fa0ddd19faad1a7e780f78 0ef27d4e46a9ba6fc4d8f4cb1a013e2d35c335dd 0f718d6ab12bf2d3deb6fc3675ea8e43bf2fee6b 19defa36748f37f3ed10e7e1975805d52d68a27c 1d6d52ffecfde2cada10311617900cfaa8ab93e1 daade11e591a82f60a75362bfba728fc277f26cf eb58169f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [bc:d3:11:c9:38:9a:6e:9e:ee:3c:8d:0b:ce:5c:53:b7:df:60:5b:3c],[56:66:d1:a4] modulus: d80d991c4df2ea74249a69ecebe3c809bda54522138aba5b0ec7e9c3f792d460cf8360105770e663316a5829dfe7cfd56599749602d5d59021b449a526b4e5490a430359c9d4b6e257db7054f666a99e5b3b98e56baf181aaa9e5320ee17015567f101436f5d923ddd75b17c513ea48b6e9e81c6346b497f2a993c731498795a27267801f52fd6863804a8624a25e60fa99e20914b062cc2d2d2a45718f912f5d3eb8921991a099a44a1ce8417cf194428105282c5ebd5b47fec46c192a36c660f97da29eeeb0b1c3a21389ec088facf946259bb4e6fc8f6d8ba583c360c55242b80745a1fa5a427098ab0669d54996858a224b7603f54d6620e9125306937a9 public exponent: 10001 ] 2023-01-16 07:25:10.095 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-16 07:25:10.098 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-16 07:25:10.102 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-16 07:25:10.103 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-16 07:25:10.104 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-16 07:25:10.105 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-16 07:25:10.105 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-16 07:25:10.106 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-16 07:25:10.107 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-16 07:25:10.107 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-16 07:25:10.117 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-16 07:25:10.119 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-16 07:25:10.120 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-16 07:25:10.120 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-16 07:25:10.294 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-16 07:25:10.295 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-16 07:25:10.296 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-16 07:25:10.296 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-16 07:25:10.299 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-16 07:25:10.300 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-16 07:25:10.302 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-16 07:25:10.303 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-16 07:25:10.303 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-16 07:25:10.304 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-16 07:25:10.305 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-16 07:25:10.306 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-16 07:25:10.308 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-16 07:25:10.309 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-16 07:25:10.310 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-16 07:25:10.316 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-16 07:25:10.323 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 618030157213030726718489113057499996778427877620 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jan 16 05:04:36 UTC 2023 Final Date: Sat Jan 15 05:04:35 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [bb:f9:e2:f5:25:c4:3e:5a:bb:1a:54:8e:f9:d9:31:6e:0b:39:c8:4a],[56:66:d1:a4] modulus: bd1c94cc25dfb9dcf62e0f2f8263626d2c5c0cf8b75026867ed347554908602763bc5c25a2bf446ad53c9fda70f5fc21c249a9c491653744234119910ee2ac4d410a2ca522d4f5d91283873206c9f044532d6c3cfdd597dc6b118dcd9f40aab77b008091deb62106830ee29eace8e67db5b7553077cdbda595580504c39fade21946e14d255f7465b385f1f936dfe7858ad7f4766e3f21dc6f6bd4be326e303144c10e758a4c309e4ef384d39e33e5ae541cc198d1e30532e00cca5d1d9e070e09e60bf5c2b2efca90cdb360e010d838b5cdcc44777f343ed895b7eb9cf6ac846cd497f4a8658b7726d4147e48c80bf717d20843ef87e9336876f7d9c3418da5e90a9a40e3deeb4d72d49e40a6116bba0200d5b7ffebee20bc88f16f4a0e3659f5fdc80f2443d7d1b037a02655dcda64626da1292959244b73b70b1f2549b604afb47ff0907f548282ff120f24353d6f8c5757e37bff3006157022c1269014f0c03ceb7877dc121de9b1e62e119b74a96b6b7d06e7f43de30ac3982b3bfd0515 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 62bd748800e4e931effbfea7dd46dc6d3eb60c46 2163b8555b35ccfc32dec865486134de6f1eebd6 937d9c9255ef545d9ff10f3aa20e72b10014447e a4679ee402dd2f2e34636ad52ffb4bee2a5b18e8 79c2c42205a02353bb0e98ca4d8616cc916dcce4 810e79039b00483f9e9c55d7f5e07df17fd0543a b36b941d4ba77fdfb18cabea831bfdeba1f25ce2 4f57ad2dd8e27e6306c4a3ee898fc9ff01973bb9 50d056785189b5a7c277af008ab7788689cd155e 2bbadba47531f71baf3e849c0cd3a806e4d8576e 91c66bb1a2eac0d4fb7a599e4f0de03819815b67 446c4be4dc1145f1bc26908da10326e601d48518 ded0ee6370c5fe68d87fc888a5e54c38aa18455f bc23e1a41e6a648c10fa0ddd19faad1a7e780f78 0ef27d4e46a9ba6fc4d8f4cb1a013e2d35c335dd 0f718d6ab12bf2d3deb6fc3675ea8e43bf2fee6b 19defa36748f37f3ed10e7e1975805d52d68a27c 1d6d52ffecfde2cada10311617900cfaa8ab93e1 daade11e591a82f60a75362bfba728fc277f26cf eb58169f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [18:4b:99:3b:1b:33:ce:40:df:bf:94:60:68:5e:37:59:c8:06:2e:12],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-16 07:32:10.221 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-16 07:32:10.226 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-16 07:32:10.229 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2023-01-16 07:32:10.231 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-16 07:32:10.231 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2023-01-16 07:32:10.232 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-16 07:32:10.233 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-16 07:32:10.235 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-16 07:32:10.236 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-16 07:32:10.237 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-16 07:32:10.247 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-16 07:32:10.251 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-16 07:32:10.252 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-16 07:32:10.252 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-16 07:32:10.431 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-16 07:32:10.432 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-16 07:32:10.433 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-16 07:32:10.434 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-16 07:32:10.439 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-16 07:32:10.440 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-16 07:32:10.440 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-16 07:32:10.442 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-16 07:32:10.443 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-16 07:32:10.448 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-16 07:32:10.448 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-16 07:32:10.449 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-16 07:32:10.452 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-16 07:32:10.453 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-16 07:32:10.453 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-16 07:32:10.456 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-16 07:32:10.462 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 618030157213030726718489113057499996778427877620 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jan 16 05:04:36 UTC 2023 Final Date: Sat Jan 15 05:04:35 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [bb:f9:e2:f5:25:c4:3e:5a:bb:1a:54:8e:f9:d9:31:6e:0b:39:c8:4a],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 62bd748800e4e931effbfea7dd46dc6d3eb60c46 2163b8555b35ccfc32dec865486134de6f1eebd6 937d9c9255ef545d9ff10f3aa20e72b10014447e a4679ee402dd2f2e34636ad52ffb4bee2a5b18e8 79c2c42205a02353bb0e98ca4d8616cc916dcce4 810e79039b00483f9e9c55d7f5e07df17fd0543a b36b941d4ba77fdfb18cabea831bfdeba1f25ce2 4f57ad2dd8e27e6306c4a3ee898fc9ff01973bb9 50d056785189b5a7c277af008ab7788689cd155e 2bbadba47531f71baf3e849c0cd3a806e4d8576e 91c66bb1a2eac0d4fb7a599e4f0de03819815b67 446c4be4dc1145f1bc26908da10326e601d48518 ded0ee6370c5fe68d87fc888a5e54c38aa18455f bc23e1a41e6a648c10fa0ddd19faad1a7e780f78 0ef27d4e46a9ba6fc4d8f4cb1a013e2d35c335dd 0f718d6ab12bf2d3deb6fc3675ea8e43bf2fee6b 19defa36748f37f3ed10e7e1975805d52d68a27c 1d6d52ffecfde2cada10311617900cfaa8ab93e1 daade11e591a82f60a75362bfba728fc277f26cf eb58169f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a7:3c:2e:70:9b:f8:57:7b:fa:5b:a4:50:fd:bc:a3:b9:31:78:83:50],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-16 07:39:25.323 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-16 07:39:25.326 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-16 07:39:25.329 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-16 07:39:25.330 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-16 07:39:25.330 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-16 07:39:25.331 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-16 07:39:25.332 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-16 07:39:25.333 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-16 07:39:25.333 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-16 07:39:25.334 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-16 07:39:25.340 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-16 07:39:25.341 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-16 07:39:25.341 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-16 07:39:25.342 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-16 07:39:25.493 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-16 07:39:25.494 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-16 07:39:25.494 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-16 07:39:25.495 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-16 07:39:25.497 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-16 07:39:25.497 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-16 07:39:25.498 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-16 07:39:25.498 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-16 07:39:25.499 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-16 07:39:25.500 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-16 07:39:25.500 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-16 07:39:25.501 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-16 07:39:25.502 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-16 07:39:25.502 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-16 07:39:25.503 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-16 07:39:25.505 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-16 07:39:25.512 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 618030157213030726718489113057499996778427877620 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jan 16 05:04:36 UTC 2023 Final Date: Sat Jan 15 05:04:35 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [bb:f9:e2:f5:25:c4:3e:5a:bb:1a:54:8e:f9:d9:31:6e:0b:39:c8:4a],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 62bd748800e4e931effbfea7dd46dc6d3eb60c46 2163b8555b35ccfc32dec865486134de6f1eebd6 937d9c9255ef545d9ff10f3aa20e72b10014447e a4679ee402dd2f2e34636ad52ffb4bee2a5b18e8 79c2c42205a02353bb0e98ca4d8616cc916dcce4 810e79039b00483f9e9c55d7f5e07df17fd0543a b36b941d4ba77fdfb18cabea831bfdeba1f25ce2 4f57ad2dd8e27e6306c4a3ee898fc9ff01973bb9 50d056785189b5a7c277af008ab7788689cd155e 2bbadba47531f71baf3e849c0cd3a806e4d8576e 91c66bb1a2eac0d4fb7a599e4f0de03819815b67 446c4be4dc1145f1bc26908da10326e601d48518 ded0ee6370c5fe68d87fc888a5e54c38aa18455f bc23e1a41e6a648c10fa0ddd19faad1a7e780f78 0ef27d4e46a9ba6fc4d8f4cb1a013e2d35c335dd 0f718d6ab12bf2d3deb6fc3675ea8e43bf2fee6b 19defa36748f37f3ed10e7e1975805d52d68a27c 1d6d52ffecfde2cada10311617900cfaa8ab93e1 daade11e591a82f60a75362bfba728fc277f26cf eb58169f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [53:17:07:28:8b:4d:34:77:92:0d:5b:0a:71:7c:a4:07:fa:b1:a8:2a],[56:66:d1:a4] modulus: a9e0b43520e52aac0863fda078e6509d7209f7250d384e4ac9e74f750f28268e9b441f2a2ab19d6b87c5bc817df22d4a98b9011a82af6a924d35ba8f6dcf92f67bf2a4a88b84b8afdbaf294ba8f27809cc7d534b90d019700ab88f735313c95960ebf25de4d38ab0f005a4f41e68b8c457985e996913c60221f244dd9e853378897a7c5233c70f732ee7fa38616e5d7936f9ddbeb874c6aa5ed21ba8d60b00f029407ed8925513eadc6d6ddbffd15fb9b8a227300fcbb85e2d8cc2403a73ae6d75d1e23309d09826a37d468270bf494370a184ff904f8628e5f705f39a5a32716fcbfc31542500b976795dc6392010543f185964c606a79f022cdf2913f109ab public exponent: 10001 ] 2023-01-16 07:39:44.595 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-16 07:39:44.597 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-16 07:39:44.601 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-16 07:39:44.602 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-16 07:39:44.602 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-16 07:39:44.603 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-16 07:39:44.604 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-16 07:39:44.604 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-16 07:39:44.604 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-16 07:39:44.605 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-16 07:39:44.611 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-16 07:39:44.615 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-16 07:39:44.615 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-16 07:39:44.615 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-16 07:39:44.718 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-16 07:39:44.720 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-16 07:39:44.722 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-16 07:39:44.722 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-16 07:39:44.724 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-16 07:39:44.725 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-16 07:39:44.725 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-16 07:39:44.726 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-16 07:39:44.726 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-16 07:39:44.727 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-16 07:39:44.733 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-16 07:39:44.734 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-16 07:39:44.735 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-16 07:39:44.735 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-16 07:39:44.736 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-16 07:39:44.737 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-16 07:39:44.741 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 618030157213030726718489113057499996778427877620 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jan 16 05:04:36 UTC 2023 Final Date: Sat Jan 15 05:04:35 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [bb:f9:e2:f5:25:c4:3e:5a:bb:1a:54:8e:f9:d9:31:6e:0b:39:c8:4a],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 62bd748800e4e931effbfea7dd46dc6d3eb60c46 2163b8555b35ccfc32dec865486134de6f1eebd6 937d9c9255ef545d9ff10f3aa20e72b10014447e a4679ee402dd2f2e34636ad52ffb4bee2a5b18e8 79c2c42205a02353bb0e98ca4d8616cc916dcce4 810e79039b00483f9e9c55d7f5e07df17fd0543a b36b941d4ba77fdfb18cabea831bfdeba1f25ce2 4f57ad2dd8e27e6306c4a3ee898fc9ff01973bb9 50d056785189b5a7c277af008ab7788689cd155e 2bbadba47531f71baf3e849c0cd3a806e4d8576e 91c66bb1a2eac0d4fb7a599e4f0de03819815b67 446c4be4dc1145f1bc26908da10326e601d48518 ded0ee6370c5fe68d87fc888a5e54c38aa18455f bc23e1a41e6a648c10fa0ddd19faad1a7e780f78 0ef27d4e46a9ba6fc4d8f4cb1a013e2d35c335dd 0f718d6ab12bf2d3deb6fc3675ea8e43bf2fee6b 19defa36748f37f3ed10e7e1975805d52d68a27c 1d6d52ffecfde2cada10311617900cfaa8ab93e1 daade11e591a82f60a75362bfba728fc277f26cf eb58169f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0a:87:0d:85:82:8e:8a:a3:0d:98:74:1a:e2:03:a2:95:f2:e8:ea:75],[56:66:d1:a4] modulus: be54775c58deae75f62fbf01238cd7f242f4f27b964bdb395b996781c8e89dac00a779b29f422ea62d89e744c200569ac805346437e944dfce2e01a71d1b1f4dc269f3dae601a02a9b3dc83ddbfeda3f57ccc8252a434a8b70461c1d0cdaa5e71fd7b85856a09125ac1a1af944d59588bb9f1243225c1174be3ef6df959e9cf11a0d5f9961125be397022c639aeb90bc7c6594d9e03130694cc700dbadff50d6ab51e694936db74ef8a1ce11c6a63ea5ed213d1e4ca9b3e785b754ec60f8b85ce5e459c251623971704bc0a232c4e1c03a91e4a355a202bf2dd0b6c5b30a57b4bccf43384d00131d7c02df5aeb4a6037cd68197bc00847c281e10eae226867b5 public exponent: 10001 ] 2023-01-16 08:04:33.101 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-16 08:04:33.106 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-16 08:04:33.110 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-16 08:04:33.111 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-16 08:04:33.112 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-16 08:04:33.114 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-16 08:04:33.114 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-16 08:04:33.115 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-16 08:04:33.115 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-16 08:04:33.116 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-16 08:04:33.123 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-16 08:04:33.125 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-16 08:04:33.126 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-16 08:04:33.126 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-16 08:04:33.374 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-16 08:04:33.375 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-16 08:04:33.375 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-16 08:04:33.376 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-16 08:04:33.377 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-16 08:04:33.380 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-16 08:04:33.381 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-16 08:04:33.382 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-16 08:04:33.382 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-16 08:04:33.384 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-16 08:04:33.384 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-16 08:04:33.384 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-16 08:04:33.427 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-16 08:04:33.427 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-16 08:04:33.428 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-16 08:04:33.429 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-16 08:04:33.434 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 618030157213030726718489113057499996778427877620 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jan 16 05:04:36 UTC 2023 Final Date: Sat Jan 15 05:04:35 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [bb:f9:e2:f5:25:c4:3e:5a:bb:1a:54:8e:f9:d9:31:6e:0b:39:c8:4a],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 62bd748800e4e931effbfea7dd46dc6d3eb60c46 2163b8555b35ccfc32dec865486134de6f1eebd6 937d9c9255ef545d9ff10f3aa20e72b10014447e a4679ee402dd2f2e34636ad52ffb4bee2a5b18e8 79c2c42205a02353bb0e98ca4d8616cc916dcce4 810e79039b00483f9e9c55d7f5e07df17fd0543a b36b941d4ba77fdfb18cabea831bfdeba1f25ce2 4f57ad2dd8e27e6306c4a3ee898fc9ff01973bb9 50d056785189b5a7c277af008ab7788689cd155e 2bbadba47531f71baf3e849c0cd3a806e4d8576e 91c66bb1a2eac0d4fb7a599e4f0de03819815b67 446c4be4dc1145f1bc26908da10326e601d48518 ded0ee6370c5fe68d87fc888a5e54c38aa18455f bc23e1a41e6a648c10fa0ddd19faad1a7e780f78 0ef27d4e46a9ba6fc4d8f4cb1a013e2d35c335dd 0f718d6ab12bf2d3deb6fc3675ea8e43bf2fee6b 19defa36748f37f3ed10e7e1975805d52d68a27c 1d6d52ffecfde2cada10311617900cfaa8ab93e1 daade11e591a82f60a75362bfba728fc277f26cf eb58169f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9e:6a:0f:10:9a:6f:32:3a:2f:69:b7:01:0b:f3:a3:11:4c:4a:ef:9e],[56:66:d1:a4] modulus: c099f940daf46f2733e47c7e63781a7c324e161b0cbfcf0441fba71df5c5cb1915b0837c9d34ab68f22269f5a7f5b8675cf957736e5710ac8fa4e66023d640f3edc41ed59227d8444885213647cf55a91a995f278a21ba956fc0ba87ce33097652badcbe3dd2790a3e099adbc9f0d3110583eb5b0644a27601091f98435e61caabcd9bd35e5465282fb7e0e60f292355f999a976ed4c7695119909a09746f3aca486a0a9139d49257fbae9dd7fe879ed196b123b46b0a0021b0f0a5b1f9c1e204a65ff89dd17b3e28e716edabf4a4960df4c4780776099be513ac2cc5ad30fba7b4dd9e3e23a5479b080e8159fafd24e1fa70d3b2468d0fbe491a4de62a5f56d public exponent: 10001 ] 2023-01-16 08:04:50.292 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-16 08:04:50.293 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-16 08:04:50.294 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-16 08:04:50.298 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-16 08:04:50.298 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-16 08:04:50.299 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-16 08:04:50.299 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-16 08:04:50.300 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-16 08:04:50.300 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-16 08:04:50.301 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-16 08:04:50.305 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-16 08:04:50.306 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-16 08:04:50.306 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-16 08:04:50.307 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-16 08:04:50.433 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-16 08:04:50.433 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-16 08:04:50.434 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-16 08:04:50.434 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-16 08:04:50.435 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-16 08:04:50.436 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-16 08:04:50.437 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-16 08:04:50.437 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-16 08:04:50.437 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-16 08:04:50.438 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-16 08:04:50.438 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-16 08:04:50.439 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-16 08:04:50.439 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-16 08:04:50.440 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-16 08:04:50.440 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-16 08:04:50.441 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-16 08:04:50.445 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 618030157213030726718489113057499996778427877620 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jan 16 05:04:36 UTC 2023 Final Date: Sat Jan 15 05:04:35 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [bb:f9:e2:f5:25:c4:3e:5a:bb:1a:54:8e:f9:d9:31:6e:0b:39:c8:4a],[56:66:d1:a4] modulus: bd1c94cc25dfb9dcf62e0f2f8263626d2c5c0cf8b75026867ed347554908602763bc5c25a2bf446ad53c9fda70f5fc21c249a9c491653744234119910ee2ac4d410a2ca522d4f5d91283873206c9f044532d6c3cfdd597dc6b118dcd9f40aab77b008091deb62106830ee29eace8e67db5b7553077cdbda595580504c39fade21946e14d255f7465b385f1f936dfe7858ad7f4766e3f21dc6f6bd4be326e303144c10e758a4c309e4ef384d39e33e5ae541cc198d1e30532e00cca5d1d9e070e09e60bf5c2b2efca90cdb360e010d838b5cdcc44777f343ed895b7eb9cf6ac846cd497f4a8658b7726d4147e48c80bf717d20843ef87e9336876f7d9c3418da5e90a9a40e3deeb4d72d49e40a6116bba0200d5b7ffebee20bc88f16f4a0e3659f5fdc80f2443d7d1b037a02655dcda64626da1292959244b73b70b1f2549b604afb47ff0907f548282ff120f24353d6f8c5757e37bff3006157022c1269014f0c03ceb7877dc121de9b1e62e119b74a96b6b7d06e7f43de30ac3982b3bfd0515 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 62bd748800e4e931effbfea7dd46dc6d3eb60c46 2163b8555b35ccfc32dec865486134de6f1eebd6 937d9c9255ef545d9ff10f3aa20e72b10014447e a4679ee402dd2f2e34636ad52ffb4bee2a5b18e8 79c2c42205a02353bb0e98ca4d8616cc916dcce4 810e79039b00483f9e9c55d7f5e07df17fd0543a b36b941d4ba77fdfb18cabea831bfdeba1f25ce2 4f57ad2dd8e27e6306c4a3ee898fc9ff01973bb9 50d056785189b5a7c277af008ab7788689cd155e 2bbadba47531f71baf3e849c0cd3a806e4d8576e 91c66bb1a2eac0d4fb7a599e4f0de03819815b67 446c4be4dc1145f1bc26908da10326e601d48518 ded0ee6370c5fe68d87fc888a5e54c38aa18455f bc23e1a41e6a648c10fa0ddd19faad1a7e780f78 0ef27d4e46a9ba6fc4d8f4cb1a013e2d35c335dd 0f718d6ab12bf2d3deb6fc3675ea8e43bf2fee6b 19defa36748f37f3ed10e7e1975805d52d68a27c 1d6d52ffecfde2cada10311617900cfaa8ab93e1 daade11e591a82f60a75362bfba728fc277f26cf eb58169f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5e:bb:6f:27:8d:22:47:4f:e7:62:c4:d1:af:1e:6e:71:19:5b:09:7d],[56:66:d1:a4] modulus: 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 public exponent: 10001 ]