By type
2023-01-18 05:00:01,026 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2023-01-18 05:00:03,066 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2023-01-18 05:00:04.450 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Jan 18, 2023 5:00:08 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jan 18, 2023 5:00:08 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jan 18, 2023 5:00:08 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jan 18, 2023 5:00:08 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2023-01-18 05:00:09.381 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2023-01-18 05:00:09.851 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2023-01-18 05:00:10.174 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2023-01-18 05:00:12.003 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2023-01-18 05:00:12.008 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2023-01-18 05:00:12.014 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2023-01-18 05:00:12.024 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2023-01-18 05:00:12.087 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2023-01-18 05:00:12.096 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2023-01-18 05:00:12.312 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2023-01-18 05:00:13.615 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jan 18, 2023 5:00:15 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2023-01-18 05:00:15.658 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 16.371 seconds (JVM running for 19.141) Jan 18, 2023 5:00:34 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2023-01-18 05:00:49.023 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-18 05:00:49.038 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-18 05:00:49.108 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2023-01-18 05:00:49.114 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-18 05:00:49.148 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2023-01-18 05:00:49.151 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-18 05:00:49.153 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-18 05:00:49.155 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-18 05:00:49.156 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-18 05:00:49.162 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-18 05:00:49.175 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-18 05:00:49.181 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-18 05:00:49.295 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-18 05:00:49.301 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-18 05:00:49.305 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-18 05:00:49.315 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-18 05:00:50.304 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-18 05:00:50.308 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-18 05:00:50.309 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-18 05:00:50.312 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-18 05:00:50.344 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-18 05:00:50.345 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-18 05:00:50.346 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 05:00:50.347 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-18 05:00:50.347 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-18 05:00:50.373 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 05:00:50.384 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-18 05:00:50.384 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-18 05:00:50.394 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 05:00:50.395 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-18 05:00:50.395 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-18 05:00:50.397 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-18 05:00:50.453 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 31851559814539754315733953952512460585595732365 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jan 18 04:56:47 UTC 2023 Final Date: Mon Jan 17 04:56:46 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ae:12:4f:31:0a:ac:81:a0:25:13:cf:3d:42:de:6b:4a:61:09:7c:33],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 58e9e471c152cdae8254c31523ef68f4cae656ba dbd3bb40d719326e7817b71febfb2772956f8bfd 449bfae055e68958c0a1da88bb58192c2e4e093c 0be5ab52ca4d4e2f59d6d0a384b0aae749fc0505 eec3a46a9c64cf1ead10acb3ad3f360259a0ca7a 29530f2c551f73d2090737046d6df7314c44161e 74fca06344d47e2b802770de36878e524f0a2947 5c82a145921b7e9090923c80175e29db630e0bd5 832e8c70714d20c74f8ac604e4cdbc6bef1f5ae2 2658391b5d27deffe0b61869a480dcf5b16171c5 3c8f6a3f9e6cc26bd12e44805c6d03fc49f90811 1e5230a9fad5ffc52e864b2737f9e56f83aed4b6 707c90c5ff907ff96b68192c772803684e448a56 1c33ef88bf169f22a72270a15f790bafd8c25539 e6632704280a0db114e58219cd215e039cb28fd9 f11f4af964bd3a9773a221456a78af4a3f5c290f d547ef5b71be3deadbdbf43100a96ab6cc0cd3e7 b04d4536e90e504dd1c335ad2b558ae59424007d f9236399e57647662a7a26e8e26ad4a5f0ba82cd c741add8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b0:8b:c6:fa:57:38:85:35:c1:4f:8f:53:99:82:4e:37:c6:23:76:8a],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-18 06:35:47.796 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-18 06:35:47.802 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-18 06:35:47.807 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-18 06:35:47.809 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-18 06:35:47.811 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-18 06:35:47.817 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-18 06:35:47.819 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-18 06:35:47.820 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-18 06:35:47.821 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-18 06:35:47.822 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-18 06:35:47.829 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-18 06:35:47.830 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-18 06:35:47.831 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-18 06:35:47.832 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-18 06:35:48.048 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-18 06:35:48.049 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-18 06:35:48.050 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-18 06:35:48.051 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-18 06:35:48.056 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-18 06:35:48.057 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-18 06:35:48.060 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 06:35:48.061 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-18 06:35:48.063 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-18 06:35:48.066 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 06:35:48.066 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-18 06:35:48.067 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-18 06:35:48.069 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 06:35:48.069 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-18 06:35:48.070 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-18 06:35:48.072 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-18 06:35:48.081 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 31851559814539754315733953952512460585595732365 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jan 18 04:56:47 UTC 2023 Final Date: Mon Jan 17 04:56:46 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ae:12:4f:31:0a:ac:81:a0:25:13:cf:3d:42:de:6b:4a:61:09:7c:33],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 58e9e471c152cdae8254c31523ef68f4cae656ba dbd3bb40d719326e7817b71febfb2772956f8bfd 449bfae055e68958c0a1da88bb58192c2e4e093c 0be5ab52ca4d4e2f59d6d0a384b0aae749fc0505 eec3a46a9c64cf1ead10acb3ad3f360259a0ca7a 29530f2c551f73d2090737046d6df7314c44161e 74fca06344d47e2b802770de36878e524f0a2947 5c82a145921b7e9090923c80175e29db630e0bd5 832e8c70714d20c74f8ac604e4cdbc6bef1f5ae2 2658391b5d27deffe0b61869a480dcf5b16171c5 3c8f6a3f9e6cc26bd12e44805c6d03fc49f90811 1e5230a9fad5ffc52e864b2737f9e56f83aed4b6 707c90c5ff907ff96b68192c772803684e448a56 1c33ef88bf169f22a72270a15f790bafd8c25539 e6632704280a0db114e58219cd215e039cb28fd9 f11f4af964bd3a9773a221456a78af4a3f5c290f d547ef5b71be3deadbdbf43100a96ab6cc0cd3e7 b04d4536e90e504dd1c335ad2b558ae59424007d f9236399e57647662a7a26e8e26ad4a5f0ba82cd c741add8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [cf:3f:98:21:58:b6:7b:3e:d1:e2:4b:3a:54:ab:36:d2:d6:92:1c:b5],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-18 06:37:35.539 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-18 06:37:35.540 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-18 06:37:35.542 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2023-01-18 06:37:35.544 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-18 06:37:35.544 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2023-01-18 06:37:35.545 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-18 06:37:35.545 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-18 06:37:35.546 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-18 06:37:35.546 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-18 06:37:35.547 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-18 06:37:35.556 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-18 06:37:35.557 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-18 06:37:35.558 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-18 06:37:35.559 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-18 06:37:35.817 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-18 06:37:35.819 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-18 06:37:35.819 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-18 06:37:35.819 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-18 06:37:35.845 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-18 06:37:35.847 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-18 06:37:35.847 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 06:37:35.848 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-18 06:37:35.852 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-18 06:37:35.854 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 06:37:35.855 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-18 06:37:35.856 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-18 06:37:35.858 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 06:37:35.859 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-18 06:37:35.859 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-18 06:37:35.862 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-18 06:37:35.870 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 31851559814539754315733953952512460585595732365 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jan 18 04:56:47 UTC 2023 Final Date: Mon Jan 17 04:56:46 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ae:12:4f:31:0a:ac:81:a0:25:13:cf:3d:42:de:6b:4a:61:09:7c:33],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 58e9e471c152cdae8254c31523ef68f4cae656ba dbd3bb40d719326e7817b71febfb2772956f8bfd 449bfae055e68958c0a1da88bb58192c2e4e093c 0be5ab52ca4d4e2f59d6d0a384b0aae749fc0505 eec3a46a9c64cf1ead10acb3ad3f360259a0ca7a 29530f2c551f73d2090737046d6df7314c44161e 74fca06344d47e2b802770de36878e524f0a2947 5c82a145921b7e9090923c80175e29db630e0bd5 832e8c70714d20c74f8ac604e4cdbc6bef1f5ae2 2658391b5d27deffe0b61869a480dcf5b16171c5 3c8f6a3f9e6cc26bd12e44805c6d03fc49f90811 1e5230a9fad5ffc52e864b2737f9e56f83aed4b6 707c90c5ff907ff96b68192c772803684e448a56 1c33ef88bf169f22a72270a15f790bafd8c25539 e6632704280a0db114e58219cd215e039cb28fd9 f11f4af964bd3a9773a221456a78af4a3f5c290f d547ef5b71be3deadbdbf43100a96ab6cc0cd3e7 b04d4536e90e504dd1c335ad2b558ae59424007d f9236399e57647662a7a26e8e26ad4a5f0ba82cd c741add8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d5:76:c5:64:b9:c3:58:6e:35:bc:56:94:c3:aa:9a:6c:96:0a:df:27],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-18 06:39:33.548 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-18 06:39:33.550 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-18 06:39:33.553 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2023-01-18 06:39:33.554 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-18 06:39:33.555 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2023-01-18 06:39:33.556 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-18 06:39:33.557 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-18 06:39:33.557 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-18 06:39:33.558 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-18 06:39:33.561 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-18 06:39:33.569 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-18 06:39:33.570 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-18 06:39:33.571 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-18 06:39:33.571 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-18 06:39:33.699 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-18 06:39:33.700 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-18 06:39:33.701 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-18 06:39:33.701 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-18 06:39:33.703 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-18 06:39:33.703 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-18 06:39:33.704 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 06:39:33.704 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-18 06:39:33.706 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-18 06:39:33.707 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 06:39:33.707 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-18 06:39:33.709 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-18 06:39:33.710 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 06:39:33.711 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-18 06:39:33.711 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-18 06:39:33.715 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-18 06:39:33.720 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 31851559814539754315733953952512460585595732365 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jan 18 04:56:47 UTC 2023 Final Date: Mon Jan 17 04:56:46 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ae:12:4f:31:0a:ac:81:a0:25:13:cf:3d:42:de:6b:4a:61:09:7c:33],[56:66:d1:a4] modulus: b129fa36d1eeaf76152fe3c1705dafb73c4c6d0c32eb8fc001c12abae5a5250afe8fbd3ead5a19eed2d950678f051d6933e6198b5af608a7514f176e3ad9c42c996e9642825f86e29a7d47c34c303235451ed2f283ab3d168fa2cda705583ff0f232c8107db896afd630bb71e030c065fb20ae69d4f1cdbb0ae7e11dc034c71299633d0e13d90b847ba0fb8b013de48f0ce5a17c5dcb1904413930fefc645139fb0f7808b271c6a16cb8bcb0fe40f9586cc83faf9a1e554ce46917e167f0d777b22dd220ac32651f794423117bbdccb6ee6b93b840236259be9d05c720445b7743d518ec0cc451125f9e765276426627e9607fc1a0ebb357163852adabf2a8446d88ad8a982d36aa0717057b6955a6dfe56049b0e4c7fa98b9cd4f8abcf8a76fcd75d5bb10e859a7aca7d78ec62d5d8d7cdffb21828bea8f0c6ffd7803181b2d7c93dfe50521f140f60bbddc59ef3158add833327afebaa41e7ba805d8ac0305d5de6af7e97242d0cf62ebd9484c101e47ac838945d74522be458d8136d5123d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 58e9e471c152cdae8254c31523ef68f4cae656ba dbd3bb40d719326e7817b71febfb2772956f8bfd 449bfae055e68958c0a1da88bb58192c2e4e093c 0be5ab52ca4d4e2f59d6d0a384b0aae749fc0505 eec3a46a9c64cf1ead10acb3ad3f360259a0ca7a 29530f2c551f73d2090737046d6df7314c44161e 74fca06344d47e2b802770de36878e524f0a2947 5c82a145921b7e9090923c80175e29db630e0bd5 832e8c70714d20c74f8ac604e4cdbc6bef1f5ae2 2658391b5d27deffe0b61869a480dcf5b16171c5 3c8f6a3f9e6cc26bd12e44805c6d03fc49f90811 1e5230a9fad5ffc52e864b2737f9e56f83aed4b6 707c90c5ff907ff96b68192c772803684e448a56 1c33ef88bf169f22a72270a15f790bafd8c25539 e6632704280a0db114e58219cd215e039cb28fd9 f11f4af964bd3a9773a221456a78af4a3f5c290f d547ef5b71be3deadbdbf43100a96ab6cc0cd3e7 b04d4536e90e504dd1c335ad2b558ae59424007d f9236399e57647662a7a26e8e26ad4a5f0ba82cd c741add8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [bf:44:59:33:25:29:81:30:65:4f:7a:5c:50:cf:18:92:d7:a7:32:72],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-18 06:43:05.782 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-18 06:43:05.785 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-18 06:43:05.788 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-18 06:43:05.789 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-18 06:43:05.790 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-18 06:43:05.791 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-18 06:43:05.792 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-18 06:43:05.793 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-18 06:43:05.794 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-18 06:43:05.794 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-18 06:43:05.800 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-18 06:43:05.802 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-18 06:43:05.802 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-18 06:43:05.803 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-18 06:43:05.990 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-18 06:43:05.991 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-18 06:43:05.992 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-18 06:43:05.992 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-18 06:43:05.995 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-18 06:43:05.996 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-18 06:43:05.996 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 06:43:05.997 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-18 06:43:05.997 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-18 06:43:05.998 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 06:43:05.998 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-18 06:43:05.999 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-18 06:43:05.999 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 06:43:06.000 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-18 06:43:06.000 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-18 06:43:06.001 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-18 06:43:06.004 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 31851559814539754315733953952512460585595732365 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jan 18 04:56:47 UTC 2023 Final Date: Mon Jan 17 04:56:46 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ae:12:4f:31:0a:ac:81:a0:25:13:cf:3d:42:de:6b:4a:61:09:7c:33],[56:66:d1:a4] modulus: b129fa36d1eeaf76152fe3c1705dafb73c4c6d0c32eb8fc001c12abae5a5250afe8fbd3ead5a19eed2d950678f051d6933e6198b5af608a7514f176e3ad9c42c996e9642825f86e29a7d47c34c303235451ed2f283ab3d168fa2cda705583ff0f232c8107db896afd630bb71e030c065fb20ae69d4f1cdbb0ae7e11dc034c71299633d0e13d90b847ba0fb8b013de48f0ce5a17c5dcb1904413930fefc645139fb0f7808b271c6a16cb8bcb0fe40f9586cc83faf9a1e554ce46917e167f0d777b22dd220ac32651f794423117bbdccb6ee6b93b840236259be9d05c720445b7743d518ec0cc451125f9e765276426627e9607fc1a0ebb357163852adabf2a8446d88ad8a982d36aa0717057b6955a6dfe56049b0e4c7fa98b9cd4f8abcf8a76fcd75d5bb10e859a7aca7d78ec62d5d8d7cdffb21828bea8f0c6ffd7803181b2d7c93dfe50521f140f60bbddc59ef3158add833327afebaa41e7ba805d8ac0305d5de6af7e97242d0cf62ebd9484c101e47ac838945d74522be458d8136d5123d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 58e9e471c152cdae8254c31523ef68f4cae656ba dbd3bb40d719326e7817b71febfb2772956f8bfd 449bfae055e68958c0a1da88bb58192c2e4e093c 0be5ab52ca4d4e2f59d6d0a384b0aae749fc0505 eec3a46a9c64cf1ead10acb3ad3f360259a0ca7a 29530f2c551f73d2090737046d6df7314c44161e 74fca06344d47e2b802770de36878e524f0a2947 5c82a145921b7e9090923c80175e29db630e0bd5 832e8c70714d20c74f8ac604e4cdbc6bef1f5ae2 2658391b5d27deffe0b61869a480dcf5b16171c5 3c8f6a3f9e6cc26bd12e44805c6d03fc49f90811 1e5230a9fad5ffc52e864b2737f9e56f83aed4b6 707c90c5ff907ff96b68192c772803684e448a56 1c33ef88bf169f22a72270a15f790bafd8c25539 e6632704280a0db114e58219cd215e039cb28fd9 f11f4af964bd3a9773a221456a78af4a3f5c290f d547ef5b71be3deadbdbf43100a96ab6cc0cd3e7 b04d4536e90e504dd1c335ad2b558ae59424007d f9236399e57647662a7a26e8e26ad4a5f0ba82cd c741add8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f9:39:5a:36:3b:60:34:91:b6:88:f8:2f:a4:a7:7b:99:0a:56:a7:27],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-18 06:49:57.594 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-18 06:49:57.598 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-18 06:49:57.600 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-18 06:49:57.602 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-18 06:49:57.602 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-18 06:49:57.603 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-18 06:49:57.605 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-18 06:49:57.606 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-18 06:49:57.607 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-18 06:49:57.609 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-18 06:49:57.616 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-18 06:49:57.618 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-18 06:49:57.618 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-18 06:49:57.618 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-18 06:49:57.825 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-18 06:49:57.827 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-18 06:49:57.827 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-18 06:49:57.827 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-18 06:49:57.829 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-18 06:49:57.830 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-18 06:49:57.831 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 06:49:57.832 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-18 06:49:57.832 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-18 06:49:57.833 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 06:49:57.834 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-18 06:49:57.834 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-18 06:49:57.835 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 06:49:57.836 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-18 06:49:57.836 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-18 06:49:57.837 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-18 06:49:57.843 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 31851559814539754315733953952512460585595732365 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jan 18 04:56:47 UTC 2023 Final Date: Mon Jan 17 04:56:46 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ae:12:4f:31:0a:ac:81:a0:25:13:cf:3d:42:de:6b:4a:61:09:7c:33],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 58e9e471c152cdae8254c31523ef68f4cae656ba dbd3bb40d719326e7817b71febfb2772956f8bfd 449bfae055e68958c0a1da88bb58192c2e4e093c 0be5ab52ca4d4e2f59d6d0a384b0aae749fc0505 eec3a46a9c64cf1ead10acb3ad3f360259a0ca7a 29530f2c551f73d2090737046d6df7314c44161e 74fca06344d47e2b802770de36878e524f0a2947 5c82a145921b7e9090923c80175e29db630e0bd5 832e8c70714d20c74f8ac604e4cdbc6bef1f5ae2 2658391b5d27deffe0b61869a480dcf5b16171c5 3c8f6a3f9e6cc26bd12e44805c6d03fc49f90811 1e5230a9fad5ffc52e864b2737f9e56f83aed4b6 707c90c5ff907ff96b68192c772803684e448a56 1c33ef88bf169f22a72270a15f790bafd8c25539 e6632704280a0db114e58219cd215e039cb28fd9 f11f4af964bd3a9773a221456a78af4a3f5c290f d547ef5b71be3deadbdbf43100a96ab6cc0cd3e7 b04d4536e90e504dd1c335ad2b558ae59424007d f9236399e57647662a7a26e8e26ad4a5f0ba82cd c741add8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a0:af:fe:aa:f5:3c:34:ff:74:00:23:59:d8:b1:2a:c8:5e:9a:4e:77],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-18 06:56:23.487 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-18 06:56:23.505 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-18 06:56:23.510 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-18 06:56:23.513 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-18 06:56:23.514 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-18 06:56:23.515 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-18 06:56:23.515 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-18 06:56:23.516 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-18 06:56:23.517 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-18 06:56:23.517 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-18 06:56:23.524 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-18 06:56:23.526 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-18 06:56:23.526 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-18 06:56:23.527 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-18 06:56:23.708 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-18 06:56:23.709 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-18 06:56:23.709 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-18 06:56:23.711 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-18 06:56:23.712 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-18 06:56:23.713 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-18 06:56:23.714 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 06:56:23.714 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-18 06:56:23.714 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-18 06:56:23.715 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 06:56:23.716 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-18 06:56:23.716 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-18 06:56:23.717 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 06:56:23.717 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-18 06:56:23.718 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-18 06:56:23.719 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-18 06:56:23.724 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 31851559814539754315733953952512460585595732365 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jan 18 04:56:47 UTC 2023 Final Date: Mon Jan 17 04:56:46 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ae:12:4f:31:0a:ac:81:a0:25:13:cf:3d:42:de:6b:4a:61:09:7c:33],[56:66:d1:a4] modulus: b129fa36d1eeaf76152fe3c1705dafb73c4c6d0c32eb8fc001c12abae5a5250afe8fbd3ead5a19eed2d950678f051d6933e6198b5af608a7514f176e3ad9c42c996e9642825f86e29a7d47c34c303235451ed2f283ab3d168fa2cda705583ff0f232c8107db896afd630bb71e030c065fb20ae69d4f1cdbb0ae7e11dc034c71299633d0e13d90b847ba0fb8b013de48f0ce5a17c5dcb1904413930fefc645139fb0f7808b271c6a16cb8bcb0fe40f9586cc83faf9a1e554ce46917e167f0d777b22dd220ac32651f794423117bbdccb6ee6b93b840236259be9d05c720445b7743d518ec0cc451125f9e765276426627e9607fc1a0ebb357163852adabf2a8446d88ad8a982d36aa0717057b6955a6dfe56049b0e4c7fa98b9cd4f8abcf8a76fcd75d5bb10e859a7aca7d78ec62d5d8d7cdffb21828bea8f0c6ffd7803181b2d7c93dfe50521f140f60bbddc59ef3158add833327afebaa41e7ba805d8ac0305d5de6af7e97242d0cf62ebd9484c101e47ac838945d74522be458d8136d5123d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 58e9e471c152cdae8254c31523ef68f4cae656ba dbd3bb40d719326e7817b71febfb2772956f8bfd 449bfae055e68958c0a1da88bb58192c2e4e093c 0be5ab52ca4d4e2f59d6d0a384b0aae749fc0505 eec3a46a9c64cf1ead10acb3ad3f360259a0ca7a 29530f2c551f73d2090737046d6df7314c44161e 74fca06344d47e2b802770de36878e524f0a2947 5c82a145921b7e9090923c80175e29db630e0bd5 832e8c70714d20c74f8ac604e4cdbc6bef1f5ae2 2658391b5d27deffe0b61869a480dcf5b16171c5 3c8f6a3f9e6cc26bd12e44805c6d03fc49f90811 1e5230a9fad5ffc52e864b2737f9e56f83aed4b6 707c90c5ff907ff96b68192c772803684e448a56 1c33ef88bf169f22a72270a15f790bafd8c25539 e6632704280a0db114e58219cd215e039cb28fd9 f11f4af964bd3a9773a221456a78af4a3f5c290f d547ef5b71be3deadbdbf43100a96ab6cc0cd3e7 b04d4536e90e504dd1c335ad2b558ae59424007d f9236399e57647662a7a26e8e26ad4a5f0ba82cd c741add8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [14:55:6f:c6:c8:5c:c4:37:70:0e:92:7f:65:41:1e:23:ef:d6:d7:52],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-18 07:05:32.633 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-18 07:05:32.637 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-18 07:05:32.639 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-18 07:05:32.641 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-18 07:05:32.641 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-18 07:05:32.642 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-18 07:05:32.642 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-18 07:05:32.643 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-18 07:05:32.643 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-18 07:05:32.644 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-18 07:05:32.649 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-18 07:05:32.650 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-18 07:05:32.651 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-18 07:05:32.651 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-18 07:05:32.842 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-18 07:05:32.843 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-18 07:05:32.843 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-18 07:05:32.844 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-18 07:05:32.845 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-18 07:05:32.846 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-18 07:05:32.846 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 07:05:32.847 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-18 07:05:32.847 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-18 07:05:32.848 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 07:05:32.849 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-18 07:05:32.849 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-18 07:05:32.850 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 07:05:32.851 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-18 07:05:32.851 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-18 07:05:32.852 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-18 07:05:32.864 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 31851559814539754315733953952512460585595732365 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jan 18 04:56:47 UTC 2023 Final Date: Mon Jan 17 04:56:46 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ae:12:4f:31:0a:ac:81:a0:25:13:cf:3d:42:de:6b:4a:61:09:7c:33],[56:66:d1:a4] modulus: b129fa36d1eeaf76152fe3c1705dafb73c4c6d0c32eb8fc001c12abae5a5250afe8fbd3ead5a19eed2d950678f051d6933e6198b5af608a7514f176e3ad9c42c996e9642825f86e29a7d47c34c303235451ed2f283ab3d168fa2cda705583ff0f232c8107db896afd630bb71e030c065fb20ae69d4f1cdbb0ae7e11dc034c71299633d0e13d90b847ba0fb8b013de48f0ce5a17c5dcb1904413930fefc645139fb0f7808b271c6a16cb8bcb0fe40f9586cc83faf9a1e554ce46917e167f0d777b22dd220ac32651f794423117bbdccb6ee6b93b840236259be9d05c720445b7743d518ec0cc451125f9e765276426627e9607fc1a0ebb357163852adabf2a8446d88ad8a982d36aa0717057b6955a6dfe56049b0e4c7fa98b9cd4f8abcf8a76fcd75d5bb10e859a7aca7d78ec62d5d8d7cdffb21828bea8f0c6ffd7803181b2d7c93dfe50521f140f60bbddc59ef3158add833327afebaa41e7ba805d8ac0305d5de6af7e97242d0cf62ebd9484c101e47ac838945d74522be458d8136d5123d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 58e9e471c152cdae8254c31523ef68f4cae656ba dbd3bb40d719326e7817b71febfb2772956f8bfd 449bfae055e68958c0a1da88bb58192c2e4e093c 0be5ab52ca4d4e2f59d6d0a384b0aae749fc0505 eec3a46a9c64cf1ead10acb3ad3f360259a0ca7a 29530f2c551f73d2090737046d6df7314c44161e 74fca06344d47e2b802770de36878e524f0a2947 5c82a145921b7e9090923c80175e29db630e0bd5 832e8c70714d20c74f8ac604e4cdbc6bef1f5ae2 2658391b5d27deffe0b61869a480dcf5b16171c5 3c8f6a3f9e6cc26bd12e44805c6d03fc49f90811 1e5230a9fad5ffc52e864b2737f9e56f83aed4b6 707c90c5ff907ff96b68192c772803684e448a56 1c33ef88bf169f22a72270a15f790bafd8c25539 e6632704280a0db114e58219cd215e039cb28fd9 f11f4af964bd3a9773a221456a78af4a3f5c290f d547ef5b71be3deadbdbf43100a96ab6cc0cd3e7 b04d4536e90e504dd1c335ad2b558ae59424007d f9236399e57647662a7a26e8e26ad4a5f0ba82cd c741add8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9e:8f:f7:f7:d4:eb:8f:93:08:57:aa:6c:2a:2d:fa:18:cf:d3:bd:d2],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-18 07:11:23.034 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-18 07:11:23.035 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-18 07:11:23.045 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-18 07:11:23.046 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-18 07:11:23.047 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-18 07:11:23.047 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-18 07:11:23.048 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-18 07:11:23.048 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-18 07:11:23.048 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-18 07:11:23.049 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-18 07:11:23.053 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-18 07:11:23.054 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-18 07:11:23.054 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-18 07:11:23.054 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-18 07:11:23.199 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-18 07:11:23.200 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-18 07:11:23.200 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-18 07:11:23.200 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-18 07:11:23.202 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-18 07:11:23.202 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-18 07:11:23.202 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 07:11:23.203 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-18 07:11:23.203 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-18 07:11:23.204 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 07:11:23.204 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-18 07:11:23.204 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-18 07:11:23.205 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 07:11:23.205 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-18 07:11:23.205 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-18 07:11:23.206 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-18 07:11:23.210 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 31851559814539754315733953952512460585595732365 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jan 18 04:56:47 UTC 2023 Final Date: Mon Jan 17 04:56:46 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ae:12:4f:31:0a:ac:81:a0:25:13:cf:3d:42:de:6b:4a:61:09:7c:33],[56:66:d1:a4] modulus: b129fa36d1eeaf76152fe3c1705dafb73c4c6d0c32eb8fc001c12abae5a5250afe8fbd3ead5a19eed2d950678f051d6933e6198b5af608a7514f176e3ad9c42c996e9642825f86e29a7d47c34c303235451ed2f283ab3d168fa2cda705583ff0f232c8107db896afd630bb71e030c065fb20ae69d4f1cdbb0ae7e11dc034c71299633d0e13d90b847ba0fb8b013de48f0ce5a17c5dcb1904413930fefc645139fb0f7808b271c6a16cb8bcb0fe40f9586cc83faf9a1e554ce46917e167f0d777b22dd220ac32651f794423117bbdccb6ee6b93b840236259be9d05c720445b7743d518ec0cc451125f9e765276426627e9607fc1a0ebb357163852adabf2a8446d88ad8a982d36aa0717057b6955a6dfe56049b0e4c7fa98b9cd4f8abcf8a76fcd75d5bb10e859a7aca7d78ec62d5d8d7cdffb21828bea8f0c6ffd7803181b2d7c93dfe50521f140f60bbddc59ef3158add833327afebaa41e7ba805d8ac0305d5de6af7e97242d0cf62ebd9484c101e47ac838945d74522be458d8136d5123d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 58e9e471c152cdae8254c31523ef68f4cae656ba dbd3bb40d719326e7817b71febfb2772956f8bfd 449bfae055e68958c0a1da88bb58192c2e4e093c 0be5ab52ca4d4e2f59d6d0a384b0aae749fc0505 eec3a46a9c64cf1ead10acb3ad3f360259a0ca7a 29530f2c551f73d2090737046d6df7314c44161e 74fca06344d47e2b802770de36878e524f0a2947 5c82a145921b7e9090923c80175e29db630e0bd5 832e8c70714d20c74f8ac604e4cdbc6bef1f5ae2 2658391b5d27deffe0b61869a480dcf5b16171c5 3c8f6a3f9e6cc26bd12e44805c6d03fc49f90811 1e5230a9fad5ffc52e864b2737f9e56f83aed4b6 707c90c5ff907ff96b68192c772803684e448a56 1c33ef88bf169f22a72270a15f790bafd8c25539 e6632704280a0db114e58219cd215e039cb28fd9 f11f4af964bd3a9773a221456a78af4a3f5c290f d547ef5b71be3deadbdbf43100a96ab6cc0cd3e7 b04d4536e90e504dd1c335ad2b558ae59424007d f9236399e57647662a7a26e8e26ad4a5f0ba82cd c741add8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ba:ad:c5:34:1f:70:be:9c:57:3a:4a:ac:94:b1:85:9e:ad:89:fc:05],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-18 07:18:43.751 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-18 07:18:43.755 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-18 07:18:43.758 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2023-01-18 07:18:43.759 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-18 07:18:43.759 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2023-01-18 07:18:43.760 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-18 07:18:43.761 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-18 07:18:43.761 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-18 07:18:43.762 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-18 07:18:43.763 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-18 07:18:43.768 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-18 07:18:43.769 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-18 07:18:43.770 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-18 07:18:43.770 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-18 07:18:43.937 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-18 07:18:43.938 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-18 07:18:43.939 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-18 07:18:43.939 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-18 07:18:43.940 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-18 07:18:43.941 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-18 07:18:43.941 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 07:18:43.942 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-18 07:18:43.943 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-18 07:18:43.944 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 07:18:43.944 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-18 07:18:43.945 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-18 07:18:43.947 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 07:18:43.947 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-18 07:18:43.947 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-18 07:18:43.949 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-18 07:18:43.955 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 31851559814539754315733953952512460585595732365 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jan 18 04:56:47 UTC 2023 Final Date: Mon Jan 17 04:56:46 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ae:12:4f:31:0a:ac:81:a0:25:13:cf:3d:42:de:6b:4a:61:09:7c:33],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 58e9e471c152cdae8254c31523ef68f4cae656ba dbd3bb40d719326e7817b71febfb2772956f8bfd 449bfae055e68958c0a1da88bb58192c2e4e093c 0be5ab52ca4d4e2f59d6d0a384b0aae749fc0505 eec3a46a9c64cf1ead10acb3ad3f360259a0ca7a 29530f2c551f73d2090737046d6df7314c44161e 74fca06344d47e2b802770de36878e524f0a2947 5c82a145921b7e9090923c80175e29db630e0bd5 832e8c70714d20c74f8ac604e4cdbc6bef1f5ae2 2658391b5d27deffe0b61869a480dcf5b16171c5 3c8f6a3f9e6cc26bd12e44805c6d03fc49f90811 1e5230a9fad5ffc52e864b2737f9e56f83aed4b6 707c90c5ff907ff96b68192c772803684e448a56 1c33ef88bf169f22a72270a15f790bafd8c25539 e6632704280a0db114e58219cd215e039cb28fd9 f11f4af964bd3a9773a221456a78af4a3f5c290f d547ef5b71be3deadbdbf43100a96ab6cc0cd3e7 b04d4536e90e504dd1c335ad2b558ae59424007d f9236399e57647662a7a26e8e26ad4a5f0ba82cd c741add8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [19:ba:25:ae:18:c0:78:1e:f0:ed:a5:7a:af:9e:83:21:6e:cf:35:e4],[56:66:d1:a4] modulus: bf38e99c3b88b9150ae29ed3674d3c818509263bf125c571f1909caa30f0a4e21455dc9e501c442f56649d06364e06501e4d667c88703fd29802768a5e2b93a6b136336e748d18de462fa6bf192c17d254c18b6cd8c7c1b94465fdc7e605878cc889016f36406e4bd7787fa1f4de8e4a325eae2fa811db990366cc5a4340ab9c2c229b082d3ba10705dbbd11a64933fbfd44c07bb6b058c6a46b0de18cfe6793b4d4b050415c6105e26c3209275c6d3a1c527c8aeb964f19e1cdc289013c901292ba5ea6199133ebeb914b4979c814e8791a063d95aae4980e86fa48ce05b20a2f12f8f96e58649609bf5a803d78fc8fe072e5c5a1c84c707f6d9c490826ce89 public exponent: 10001 ] 2023-01-18 07:45:17.109 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-18 07:45:17.116 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-18 07:45:17.119 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-18 07:45:17.120 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-18 07:45:17.121 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-18 07:45:17.122 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-18 07:45:17.123 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-18 07:45:17.123 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-18 07:45:17.124 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-18 07:45:17.124 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-18 07:45:17.130 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-18 07:45:17.132 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-18 07:45:17.132 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-18 07:45:17.133 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-18 07:45:17.278 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-18 07:45:17.279 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-18 07:45:17.279 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-18 07:45:17.280 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-18 07:45:17.281 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-18 07:45:17.282 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-18 07:45:17.282 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 07:45:17.283 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-18 07:45:17.283 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-18 07:45:17.284 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 07:45:17.285 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-18 07:45:17.285 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-18 07:45:17.286 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 07:45:17.287 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-18 07:45:17.287 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-18 07:45:17.288 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-18 07:45:17.292 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 31851559814539754315733953952512460585595732365 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jan 18 04:56:47 UTC 2023 Final Date: Mon Jan 17 04:56:46 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ae:12:4f:31:0a:ac:81:a0:25:13:cf:3d:42:de:6b:4a:61:09:7c:33],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 58e9e471c152cdae8254c31523ef68f4cae656ba dbd3bb40d719326e7817b71febfb2772956f8bfd 449bfae055e68958c0a1da88bb58192c2e4e093c 0be5ab52ca4d4e2f59d6d0a384b0aae749fc0505 eec3a46a9c64cf1ead10acb3ad3f360259a0ca7a 29530f2c551f73d2090737046d6df7314c44161e 74fca06344d47e2b802770de36878e524f0a2947 5c82a145921b7e9090923c80175e29db630e0bd5 832e8c70714d20c74f8ac604e4cdbc6bef1f5ae2 2658391b5d27deffe0b61869a480dcf5b16171c5 3c8f6a3f9e6cc26bd12e44805c6d03fc49f90811 1e5230a9fad5ffc52e864b2737f9e56f83aed4b6 707c90c5ff907ff96b68192c772803684e448a56 1c33ef88bf169f22a72270a15f790bafd8c25539 e6632704280a0db114e58219cd215e039cb28fd9 f11f4af964bd3a9773a221456a78af4a3f5c290f d547ef5b71be3deadbdbf43100a96ab6cc0cd3e7 b04d4536e90e504dd1c335ad2b558ae59424007d f9236399e57647662a7a26e8e26ad4a5f0ba82cd c741add8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1f:bd:46:08:06:01:43:38:01:44:90:98:62:4b:90:d6:01:78:f2:78],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-18 07:45:35.941 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-18 07:45:35.942 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-18 07:45:35.943 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-18 07:45:35.944 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-18 07:45:35.944 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-18 07:45:35.945 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-18 07:45:35.945 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-18 07:45:35.946 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-18 07:45:35.946 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-18 07:45:35.947 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-18 07:45:35.951 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-18 07:45:35.951 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-18 07:45:35.952 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-18 07:45:35.952 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-18 07:45:36.121 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-18 07:45:36.121 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-18 07:45:36.122 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-18 07:45:36.122 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-18 07:45:36.124 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-18 07:45:36.124 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-18 07:45:36.125 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 07:45:36.125 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-18 07:45:36.126 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-18 07:45:36.127 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 07:45:36.127 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-18 07:45:36.127 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-18 07:45:36.128 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 07:45:36.129 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-18 07:45:36.129 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-18 07:45:36.130 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-18 07:45:36.134 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 31851559814539754315733953952512460585595732365 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jan 18 04:56:47 UTC 2023 Final Date: Mon Jan 17 04:56:46 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ae:12:4f:31:0a:ac:81:a0:25:13:cf:3d:42:de:6b:4a:61:09:7c:33],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 58e9e471c152cdae8254c31523ef68f4cae656ba dbd3bb40d719326e7817b71febfb2772956f8bfd 449bfae055e68958c0a1da88bb58192c2e4e093c 0be5ab52ca4d4e2f59d6d0a384b0aae749fc0505 eec3a46a9c64cf1ead10acb3ad3f360259a0ca7a 29530f2c551f73d2090737046d6df7314c44161e 74fca06344d47e2b802770de36878e524f0a2947 5c82a145921b7e9090923c80175e29db630e0bd5 832e8c70714d20c74f8ac604e4cdbc6bef1f5ae2 2658391b5d27deffe0b61869a480dcf5b16171c5 3c8f6a3f9e6cc26bd12e44805c6d03fc49f90811 1e5230a9fad5ffc52e864b2737f9e56f83aed4b6 707c90c5ff907ff96b68192c772803684e448a56 1c33ef88bf169f22a72270a15f790bafd8c25539 e6632704280a0db114e58219cd215e039cb28fd9 f11f4af964bd3a9773a221456a78af4a3f5c290f d547ef5b71be3deadbdbf43100a96ab6cc0cd3e7 b04d4536e90e504dd1c335ad2b558ae59424007d f9236399e57647662a7a26e8e26ad4a5f0ba82cd c741add8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [43:3a:03:f1:bb:55:01:02:84:60:17:a3:f6:12:4a:f5:e0:f0:cb:2d],[56:66:d1:a4] modulus: bcb6c05ba35abe9fdd0668c5e51bbf336c0e2f92c10061f5c1fbc63f1e2b684afebd4331408f9dfee965600865897de6cfe9079747a925c767ca10ae6a6b4d28847415c444cad736bb2ba1a3eeb08601fa01554605016ad4173ccfb5a72b88cd6e3f714935b4f27a033cbdbbb1d3f3eec55ffd745c3738c2b7de65d0ada94567a6ed09bcf94173068d5dfef76e5c53189bcc1d85e51cd05bddb00ee4af420bd1e408ec6e716cb0af127bb3ab86207235ddde9fa19ce81879c800c8a2a9944d37aa44c83582a8796a2e907f6f7b5ad573efef9b25f2cec1042bdb02ec8646a116b777497be9eb8240aeb40b2b9e54a3f58b10ae086e4ed3f07a55710e9bd902b3 public exponent: 10001 ] 2023-01-18 08:09:54.069 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-18 08:09:54.073 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-18 08:09:54.075 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-18 08:09:54.076 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-18 08:09:54.076 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-18 08:09:54.077 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-18 08:09:54.077 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-18 08:09:54.078 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-18 08:09:54.078 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-18 08:09:54.079 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-18 08:09:54.083 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-18 08:09:54.084 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-18 08:09:54.085 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-18 08:09:54.085 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-18 08:09:54.231 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-18 08:09:54.232 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-18 08:09:54.233 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-18 08:09:54.233 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-18 08:09:54.240 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-18 08:09:54.241 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-18 08:09:54.241 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 08:09:54.241 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-18 08:09:54.246 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-18 08:09:54.247 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 08:09:54.247 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-18 08:09:54.247 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-18 08:09:54.248 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 08:09:54.248 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-18 08:09:54.248 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-18 08:09:54.249 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-18 08:09:54.253 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 31851559814539754315733953952512460585595732365 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jan 18 04:56:47 UTC 2023 Final Date: Mon Jan 17 04:56:46 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ae:12:4f:31:0a:ac:81:a0:25:13:cf:3d:42:de:6b:4a:61:09:7c:33],[56:66:d1:a4] modulus: b129fa36d1eeaf76152fe3c1705dafb73c4c6d0c32eb8fc001c12abae5a5250afe8fbd3ead5a19eed2d950678f051d6933e6198b5af608a7514f176e3ad9c42c996e9642825f86e29a7d47c34c303235451ed2f283ab3d168fa2cda705583ff0f232c8107db896afd630bb71e030c065fb20ae69d4f1cdbb0ae7e11dc034c71299633d0e13d90b847ba0fb8b013de48f0ce5a17c5dcb1904413930fefc645139fb0f7808b271c6a16cb8bcb0fe40f9586cc83faf9a1e554ce46917e167f0d777b22dd220ac32651f794423117bbdccb6ee6b93b840236259be9d05c720445b7743d518ec0cc451125f9e765276426627e9607fc1a0ebb357163852adabf2a8446d88ad8a982d36aa0717057b6955a6dfe56049b0e4c7fa98b9cd4f8abcf8a76fcd75d5bb10e859a7aca7d78ec62d5d8d7cdffb21828bea8f0c6ffd7803181b2d7c93dfe50521f140f60bbddc59ef3158add833327afebaa41e7ba805d8ac0305d5de6af7e97242d0cf62ebd9484c101e47ac838945d74522be458d8136d5123d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 58e9e471c152cdae8254c31523ef68f4cae656ba dbd3bb40d719326e7817b71febfb2772956f8bfd 449bfae055e68958c0a1da88bb58192c2e4e093c 0be5ab52ca4d4e2f59d6d0a384b0aae749fc0505 eec3a46a9c64cf1ead10acb3ad3f360259a0ca7a 29530f2c551f73d2090737046d6df7314c44161e 74fca06344d47e2b802770de36878e524f0a2947 5c82a145921b7e9090923c80175e29db630e0bd5 832e8c70714d20c74f8ac604e4cdbc6bef1f5ae2 2658391b5d27deffe0b61869a480dcf5b16171c5 3c8f6a3f9e6cc26bd12e44805c6d03fc49f90811 1e5230a9fad5ffc52e864b2737f9e56f83aed4b6 707c90c5ff907ff96b68192c772803684e448a56 1c33ef88bf169f22a72270a15f790bafd8c25539 e6632704280a0db114e58219cd215e039cb28fd9 f11f4af964bd3a9773a221456a78af4a3f5c290f d547ef5b71be3deadbdbf43100a96ab6cc0cd3e7 b04d4536e90e504dd1c335ad2b558ae59424007d f9236399e57647662a7a26e8e26ad4a5f0ba82cd c741add8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [29:fb:61:2c:bb:e8:e4:87:a5:4d:0f:f6:99:6b:e5:bd:b3:6d:68:af],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-18 08:10:00.839 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-18 08:10:00.841 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-18 08:10:00.842 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-18 08:10:00.843 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-18 08:10:00.844 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-18 08:10:00.845 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-18 08:10:00.846 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-18 08:10:00.846 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-18 08:10:00.847 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-18 08:10:00.847 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-18 08:10:00.856 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-18 08:10:00.857 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-18 08:10:00.858 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-18 08:10:00.858 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-18 08:10:00.961 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-18 08:10:00.966 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-18 08:10:00.967 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-18 08:10:00.967 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-18 08:10:00.969 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-18 08:10:00.969 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-18 08:10:00.970 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 08:10:00.971 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-18 08:10:00.971 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-18 08:10:00.974 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 08:10:00.975 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-18 08:10:00.975 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-18 08:10:00.977 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 08:10:00.977 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-18 08:10:00.979 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-18 08:10:00.980 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-18 08:10:00.988 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 31851559814539754315733953952512460585595732365 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jan 18 04:56:47 UTC 2023 Final Date: Mon Jan 17 04:56:46 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ae:12:4f:31:0a:ac:81:a0:25:13:cf:3d:42:de:6b:4a:61:09:7c:33],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 58e9e471c152cdae8254c31523ef68f4cae656ba dbd3bb40d719326e7817b71febfb2772956f8bfd 449bfae055e68958c0a1da88bb58192c2e4e093c 0be5ab52ca4d4e2f59d6d0a384b0aae749fc0505 eec3a46a9c64cf1ead10acb3ad3f360259a0ca7a 29530f2c551f73d2090737046d6df7314c44161e 74fca06344d47e2b802770de36878e524f0a2947 5c82a145921b7e9090923c80175e29db630e0bd5 832e8c70714d20c74f8ac604e4cdbc6bef1f5ae2 2658391b5d27deffe0b61869a480dcf5b16171c5 3c8f6a3f9e6cc26bd12e44805c6d03fc49f90811 1e5230a9fad5ffc52e864b2737f9e56f83aed4b6 707c90c5ff907ff96b68192c772803684e448a56 1c33ef88bf169f22a72270a15f790bafd8c25539 e6632704280a0db114e58219cd215e039cb28fd9 f11f4af964bd3a9773a221456a78af4a3f5c290f d547ef5b71be3deadbdbf43100a96ab6cc0cd3e7 b04d4536e90e504dd1c335ad2b558ae59424007d f9236399e57647662a7a26e8e26ad4a5f0ba82cd c741add8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c5:bb:ad:fb:a9:e6:af:9a:f4:91:63:36:33:50:6c:7d:ec:ba:8a:dc],[56:66:d1:a4] modulus: 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 public exponent: 10001 ]