By type
2023-01-20 05:05:25,638 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2023-01-20 05:05:26,996 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2023-01-20 05:05:27.849 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Jan 20, 2023 5:05:29 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jan 20, 2023 5:05:29 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jan 20, 2023 5:05:29 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jan 20, 2023 5:05:29 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2023-01-20 05:05:30.405 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2023-01-20 05:05:30.703 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2023-01-20 05:05:30.876 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2023-01-20 05:05:31.594 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2023-01-20 05:05:31.597 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2023-01-20 05:05:31.598 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2023-01-20 05:05:31.602 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2023-01-20 05:05:31.641 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2023-01-20 05:05:31.644 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2023-01-20 05:05:31.770 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2023-01-20 05:05:32.351 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jan 20, 2023 5:05:33 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2023-01-20 05:05:33.491 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 8.705 seconds (JVM running for 10.687) Jan 20, 2023 5:05:56 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2023-01-20 05:06:15.385 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-20 05:06:15.396 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-20 05:06:15.438 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2023-01-20 05:06:15.441 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-20 05:06:15.468 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2023-01-20 05:06:15.473 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-20 05:06:15.474 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-20 05:06:15.475 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-20 05:06:15.475 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-20 05:06:15.479 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-20 05:06:15.487 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-20 05:06:15.491 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-20 05:06:15.539 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-20 05:06:15.543 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-20 05:06:15.544 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-20 05:06:15.547 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-20 05:06:16.127 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-20 05:06:16.131 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-20 05:06:16.131 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-20 05:06:16.132 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-20 05:06:16.141 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-20 05:06:16.142 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-20 05:06:16.143 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-20 05:06:16.143 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-20 05:06:16.144 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-20 05:06:16.157 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-20 05:06:16.158 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-20 05:06:16.158 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-20 05:06:16.164 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-20 05:06:16.164 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-20 05:06:16.164 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-20 05:06:16.166 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-20 05:06:16.196 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 458861122131268939813495894079762951469759001064 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 20 05:03:06 UTC 2023 Final Date: Wed Jan 19 05:03:05 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [46:72:19:5c:cb:93:72:8c:2a:37:e8:fc:8e:18:47:68:fc:bf:88:83],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 72c8612c1ce1246d096e2dd23d7e5e63fd677411 1423e211234c6f0fba6530cedf0b5af3007d5702 23e9d642ec3ca7d8d3bc71e32eaf8a6f45cdc1b2 90518e65d629ab56b7885d9010e6f9626f7db0eb 21bafbba7e02ee0b8a26ccd86a114b7de5fb7bc8 727b1a9b70b66f40378849b28456f90c7ba50cd9 e670e9cae1718ff0f3c0962426fae868e1d123ab 0bfcc851a309ef73554d8eaef71c10f6755e72bd 84e88f54ddcbcc711ea864c48bc492d493a5262d a79ebbc7d8022bf028d58f48a6a7c96fa821c29a 892a9cea1f2fdd25d22c35e7abb26f3347d20ddb f85132721ac292ae6208b018b3783983c9fc2a5a 14b85346ee11260803b808cfcb3bc2d1400b4719 c544b2d8f2b8c9020ceb17a276daf3bbbb679342 06e46004fdd164d5d153cc1d1dba24610fdb686d 3e1bc6db4d132d9bcb641555a0e63d4cca9a69e0 cc8061216b62a4ef8225473fbf37c3aa6358fab5 15cdf72a09de9e8e0f321b44b244f0af53415013 eba01a60d9381178da193a7c042d485bd2b3911f a3db9031 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8f:9c:52:42:e8:c8:b1:4e:d3:d0:2e:dc:43:0e:0c:98:81:13:bd:bf],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-20 06:42:02.533 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-20 06:42:02.538 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-20 06:42:02.541 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-20 06:42:02.543 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-20 06:42:02.543 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-20 06:42:02.544 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-20 06:42:02.545 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-20 06:42:02.546 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-20 06:42:02.546 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-20 06:42:02.547 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-20 06:42:02.552 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-20 06:42:02.553 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-20 06:42:02.554 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-20 06:42:02.554 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-20 06:42:02.745 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-20 06:42:02.746 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-20 06:42:02.746 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-20 06:42:02.747 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-20 06:42:02.750 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-20 06:42:02.750 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-20 06:42:02.751 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-20 06:42:02.751 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-20 06:42:02.751 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-20 06:42:02.752 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-20 06:42:02.753 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-20 06:42:02.753 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-20 06:42:02.754 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-20 06:42:02.755 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-20 06:42:02.755 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-20 06:42:02.756 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-20 06:42:02.760 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 458861122131268939813495894079762951469759001064 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 20 05:03:06 UTC 2023 Final Date: Wed Jan 19 05:03:05 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [46:72:19:5c:cb:93:72:8c:2a:37:e8:fc:8e:18:47:68:fc:bf:88:83],[56:66:d1:a4] modulus: af5bd4ddfb53502d72ba21d91d5cde14106070e7d9887ba0f89c7becc43008413c5a1a6458258525bbfdeccbe5d9136fcb5b3f1c859308dad11daea4fbe694de52790f30e803e6e71fd74b2ba8760a510c780e2a7b0974415c3fcca6e4106746d37a76cd54b14fd1aa448432cf93e13086c453c6a377789ae409c04ead2c0f3afcf899f37bc3d618711bac48fd1834d114dad410c254b77b3f169094ffaf77f670bb43eacfc5d4c03f4c63e8cfa80a7df3309da537bec03f72af8edcae39e45f3a31eece436cefb18b017f7ff4d4babef727b32f96de8fb8a4f255cdcc60b2cc7432783283c6a5b518e2b6abc7c4c531aad2edf808d55959efae89d4ba9bae28bee7443d862ed13f966a7e771201a69b23a24ee4caaf0f84c6e9fa058ffa3215404a6788e4abe9f7df083fed0bad625552f84678054d092fa4a8396e5ac57bde5fe075e47c4f67e29c569e7cf50735829cc5d4c04bb26ae9738112cde0c85a7643900b8956ef8a7855295613b7ce7035d9de7cffa97178c75aa75c4bc37cc16f public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 72c8612c1ce1246d096e2dd23d7e5e63fd677411 1423e211234c6f0fba6530cedf0b5af3007d5702 23e9d642ec3ca7d8d3bc71e32eaf8a6f45cdc1b2 90518e65d629ab56b7885d9010e6f9626f7db0eb 21bafbba7e02ee0b8a26ccd86a114b7de5fb7bc8 727b1a9b70b66f40378849b28456f90c7ba50cd9 e670e9cae1718ff0f3c0962426fae868e1d123ab 0bfcc851a309ef73554d8eaef71c10f6755e72bd 84e88f54ddcbcc711ea864c48bc492d493a5262d a79ebbc7d8022bf028d58f48a6a7c96fa821c29a 892a9cea1f2fdd25d22c35e7abb26f3347d20ddb f85132721ac292ae6208b018b3783983c9fc2a5a 14b85346ee11260803b808cfcb3bc2d1400b4719 c544b2d8f2b8c9020ceb17a276daf3bbbb679342 06e46004fdd164d5d153cc1d1dba24610fdb686d 3e1bc6db4d132d9bcb641555a0e63d4cca9a69e0 cc8061216b62a4ef8225473fbf37c3aa6358fab5 15cdf72a09de9e8e0f321b44b244f0af53415013 eba01a60d9381178da193a7c042d485bd2b3911f a3db9031 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [af:7f:ad:15:65:dd:0e:be:76:20:2c:49:8f:4a:67:15:4c:9e:f4:5e],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-20 06:43:47.197 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-20 06:43:47.199 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-20 06:43:47.201 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2023-01-20 06:43:47.202 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-20 06:43:47.202 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2023-01-20 06:43:47.203 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-20 06:43:47.203 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-20 06:43:47.204 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-20 06:43:47.204 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-20 06:43:47.207 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-20 06:43:47.215 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-20 06:43:47.216 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-20 06:43:47.217 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-20 06:43:47.217 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-20 06:43:47.408 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-20 06:43:47.409 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-20 06:43:47.410 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-20 06:43:47.411 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-20 06:43:47.414 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-20 06:43:47.415 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-20 06:43:47.416 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-20 06:43:47.416 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-20 06:43:47.417 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-20 06:43:47.419 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-20 06:43:47.419 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-20 06:43:47.420 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-20 06:43:47.421 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-20 06:43:47.422 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-20 06:43:47.422 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-20 06:43:47.424 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-20 06:43:47.430 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 458861122131268939813495894079762951469759001064 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 20 05:03:06 UTC 2023 Final Date: Wed Jan 19 05:03:05 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [46:72:19:5c:cb:93:72:8c:2a:37:e8:fc:8e:18:47:68:fc:bf:88:83],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 72c8612c1ce1246d096e2dd23d7e5e63fd677411 1423e211234c6f0fba6530cedf0b5af3007d5702 23e9d642ec3ca7d8d3bc71e32eaf8a6f45cdc1b2 90518e65d629ab56b7885d9010e6f9626f7db0eb 21bafbba7e02ee0b8a26ccd86a114b7de5fb7bc8 727b1a9b70b66f40378849b28456f90c7ba50cd9 e670e9cae1718ff0f3c0962426fae868e1d123ab 0bfcc851a309ef73554d8eaef71c10f6755e72bd 84e88f54ddcbcc711ea864c48bc492d493a5262d a79ebbc7d8022bf028d58f48a6a7c96fa821c29a 892a9cea1f2fdd25d22c35e7abb26f3347d20ddb f85132721ac292ae6208b018b3783983c9fc2a5a 14b85346ee11260803b808cfcb3bc2d1400b4719 c544b2d8f2b8c9020ceb17a276daf3bbbb679342 06e46004fdd164d5d153cc1d1dba24610fdb686d 3e1bc6db4d132d9bcb641555a0e63d4cca9a69e0 cc8061216b62a4ef8225473fbf37c3aa6358fab5 15cdf72a09de9e8e0f321b44b244f0af53415013 eba01a60d9381178da193a7c042d485bd2b3911f a3db9031 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a7:c3:40:da:2b:15:14:af:bd:4b:ab:13:ab:fe:dc:5e:30:8f:91:27],[56:66:d1:a4] modulus: d63edfc5737786fe6421d16576a6a8ccc59a81c766455dc7045d422188e4ac7d3f4b4ae49786be0d3713504a9561ac03fd955261fbf4b10101bb43ee6048a9bd8862a7103bc5656abd36764e14945db35e7891a16f1aa1e07b0621a5943c9658cd36e15aab259854c471fc7363e43882de57fa3fd8a15e14cbcccc3f25947b3eea458df7d5b1cda71206404b06214e0ea2238578a3511d05c77d84a1782cc0ac20c7d4e04a6febba6e30051d59f6d0e85ce2199e21a043277fdc8cee0cab317b01267697c19ca4cde8a6e1c09248b277f51261386bb92fcc934e1c4d3ad206c7f3e7e162cc9da23cb79e75483f28432bb5254c0c471cffed145d43721f71bc0f public exponent: 10001 ] 2023-01-20 06:45:39.933 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-20 06:45:39.935 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-20 06:45:39.936 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2023-01-20 06:45:39.937 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-20 06:45:39.937 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2023-01-20 06:45:39.938 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-20 06:45:39.938 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-20 06:45:39.939 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-20 06:45:39.939 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-20 06:45:39.939 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-20 06:45:39.945 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-20 06:45:39.947 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-20 06:45:39.947 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-20 06:45:39.948 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-20 06:45:40.149 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-20 06:45:40.150 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-20 06:45:40.151 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-20 06:45:40.152 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-20 06:45:40.155 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-20 06:45:40.155 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-20 06:45:40.156 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-20 06:45:40.156 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-20 06:45:40.156 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-20 06:45:40.157 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-20 06:45:40.157 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-20 06:45:40.158 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-20 06:45:40.158 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-20 06:45:40.159 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-20 06:45:40.159 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-20 06:45:40.160 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-20 06:45:40.164 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 458861122131268939813495894079762951469759001064 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 20 05:03:06 UTC 2023 Final Date: Wed Jan 19 05:03:05 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [46:72:19:5c:cb:93:72:8c:2a:37:e8:fc:8e:18:47:68:fc:bf:88:83],[56:66:d1:a4] modulus: af5bd4ddfb53502d72ba21d91d5cde14106070e7d9887ba0f89c7becc43008413c5a1a6458258525bbfdeccbe5d9136fcb5b3f1c859308dad11daea4fbe694de52790f30e803e6e71fd74b2ba8760a510c780e2a7b0974415c3fcca6e4106746d37a76cd54b14fd1aa448432cf93e13086c453c6a377789ae409c04ead2c0f3afcf899f37bc3d618711bac48fd1834d114dad410c254b77b3f169094ffaf77f670bb43eacfc5d4c03f4c63e8cfa80a7df3309da537bec03f72af8edcae39e45f3a31eece436cefb18b017f7ff4d4babef727b32f96de8fb8a4f255cdcc60b2cc7432783283c6a5b518e2b6abc7c4c531aad2edf808d55959efae89d4ba9bae28bee7443d862ed13f966a7e771201a69b23a24ee4caaf0f84c6e9fa058ffa3215404a6788e4abe9f7df083fed0bad625552f84678054d092fa4a8396e5ac57bde5fe075e47c4f67e29c569e7cf50735829cc5d4c04bb26ae9738112cde0c85a7643900b8956ef8a7855295613b7ce7035d9de7cffa97178c75aa75c4bc37cc16f public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 72c8612c1ce1246d096e2dd23d7e5e63fd677411 1423e211234c6f0fba6530cedf0b5af3007d5702 23e9d642ec3ca7d8d3bc71e32eaf8a6f45cdc1b2 90518e65d629ab56b7885d9010e6f9626f7db0eb 21bafbba7e02ee0b8a26ccd86a114b7de5fb7bc8 727b1a9b70b66f40378849b28456f90c7ba50cd9 e670e9cae1718ff0f3c0962426fae868e1d123ab 0bfcc851a309ef73554d8eaef71c10f6755e72bd 84e88f54ddcbcc711ea864c48bc492d493a5262d a79ebbc7d8022bf028d58f48a6a7c96fa821c29a 892a9cea1f2fdd25d22c35e7abb26f3347d20ddb f85132721ac292ae6208b018b3783983c9fc2a5a 14b85346ee11260803b808cfcb3bc2d1400b4719 c544b2d8f2b8c9020ceb17a276daf3bbbb679342 06e46004fdd164d5d153cc1d1dba24610fdb686d 3e1bc6db4d132d9bcb641555a0e63d4cca9a69e0 cc8061216b62a4ef8225473fbf37c3aa6358fab5 15cdf72a09de9e8e0f321b44b244f0af53415013 eba01a60d9381178da193a7c042d485bd2b3911f a3db9031 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d1:f6:0c:58:5b:c5:16:8c:26:93:1b:e7:4c:a0:ad:66:2c:57:3a:65],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-20 06:48:39.997 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-20 06:48:40.000 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-20 06:48:40.004 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-20 06:48:40.005 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-20 06:48:40.010 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-20 06:48:40.011 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-20 06:48:40.011 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-20 06:48:40.018 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-20 06:48:40.019 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-20 06:48:40.020 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-20 06:48:40.034 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-20 06:48:40.036 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-20 06:48:40.036 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-20 06:48:40.037 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-20 06:48:40.261 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-20 06:48:40.262 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-20 06:48:40.263 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-20 06:48:40.263 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-20 06:48:40.266 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-20 06:48:40.266 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-20 06:48:40.267 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-20 06:48:40.270 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-20 06:48:40.271 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-20 06:48:40.274 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-20 06:48:40.280 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-20 06:48:40.280 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-20 06:48:40.281 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-20 06:48:40.281 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-20 06:48:40.282 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-20 06:48:40.284 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-20 06:48:40.287 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 458861122131268939813495894079762951469759001064 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 20 05:03:06 UTC 2023 Final Date: Wed Jan 19 05:03:05 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [46:72:19:5c:cb:93:72:8c:2a:37:e8:fc:8e:18:47:68:fc:bf:88:83],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 72c8612c1ce1246d096e2dd23d7e5e63fd677411 1423e211234c6f0fba6530cedf0b5af3007d5702 23e9d642ec3ca7d8d3bc71e32eaf8a6f45cdc1b2 90518e65d629ab56b7885d9010e6f9626f7db0eb 21bafbba7e02ee0b8a26ccd86a114b7de5fb7bc8 727b1a9b70b66f40378849b28456f90c7ba50cd9 e670e9cae1718ff0f3c0962426fae868e1d123ab 0bfcc851a309ef73554d8eaef71c10f6755e72bd 84e88f54ddcbcc711ea864c48bc492d493a5262d a79ebbc7d8022bf028d58f48a6a7c96fa821c29a 892a9cea1f2fdd25d22c35e7abb26f3347d20ddb f85132721ac292ae6208b018b3783983c9fc2a5a 14b85346ee11260803b808cfcb3bc2d1400b4719 c544b2d8f2b8c9020ceb17a276daf3bbbb679342 06e46004fdd164d5d153cc1d1dba24610fdb686d 3e1bc6db4d132d9bcb641555a0e63d4cca9a69e0 cc8061216b62a4ef8225473fbf37c3aa6358fab5 15cdf72a09de9e8e0f321b44b244f0af53415013 eba01a60d9381178da193a7c042d485bd2b3911f a3db9031 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4f:d5:a2:98:d3:79:d6:d3:db:6b:66:63:e4:a8:57:33:fc:36:8b:7e],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-20 06:56:18.426 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-20 06:56:18.428 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-20 06:56:18.431 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-20 06:56:18.432 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-20 06:56:18.432 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-20 06:56:18.433 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-20 06:56:18.433 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-20 06:56:18.434 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-20 06:56:18.434 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-20 06:56:18.435 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-20 06:56:18.441 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-20 06:56:18.442 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-20 06:56:18.442 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-20 06:56:18.442 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-20 06:56:18.732 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-20 06:56:18.733 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-20 06:56:18.733 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-20 06:56:18.734 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-20 06:56:18.736 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-20 06:56:18.736 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-20 06:56:18.737 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-20 06:56:18.737 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-20 06:56:18.738 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-20 06:56:18.739 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-20 06:56:18.740 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-20 06:56:18.740 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-20 06:56:18.742 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-20 06:56:18.742 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-20 06:56:18.743 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-20 06:56:18.744 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-20 06:56:18.749 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 458861122131268939813495894079762951469759001064 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 20 05:03:06 UTC 2023 Final Date: Wed Jan 19 05:03:05 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [46:72:19:5c:cb:93:72:8c:2a:37:e8:fc:8e:18:47:68:fc:bf:88:83],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 72c8612c1ce1246d096e2dd23d7e5e63fd677411 1423e211234c6f0fba6530cedf0b5af3007d5702 23e9d642ec3ca7d8d3bc71e32eaf8a6f45cdc1b2 90518e65d629ab56b7885d9010e6f9626f7db0eb 21bafbba7e02ee0b8a26ccd86a114b7de5fb7bc8 727b1a9b70b66f40378849b28456f90c7ba50cd9 e670e9cae1718ff0f3c0962426fae868e1d123ab 0bfcc851a309ef73554d8eaef71c10f6755e72bd 84e88f54ddcbcc711ea864c48bc492d493a5262d a79ebbc7d8022bf028d58f48a6a7c96fa821c29a 892a9cea1f2fdd25d22c35e7abb26f3347d20ddb f85132721ac292ae6208b018b3783983c9fc2a5a 14b85346ee11260803b808cfcb3bc2d1400b4719 c544b2d8f2b8c9020ceb17a276daf3bbbb679342 06e46004fdd164d5d153cc1d1dba24610fdb686d 3e1bc6db4d132d9bcb641555a0e63d4cca9a69e0 cc8061216b62a4ef8225473fbf37c3aa6358fab5 15cdf72a09de9e8e0f321b44b244f0af53415013 eba01a60d9381178da193a7c042d485bd2b3911f a3db9031 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [56:aa:64:8d:21:06:b7:d6:fa:d2:c5:d4:8c:6a:0f:ec:4b:4f:86:be],[56:66:d1:a4] modulus: d55cff271c6889f14fd21d3d3164b16e137c2a3a6fec5e3f3eabc21e7b85d6b84ae96a6837f3e9113fb97aaf43122c93da0675eedcf1d6ed651e572d3d5c93dea20c2adb5ed6e17fc085ad165286fc921e470a4e5b153b53a1707b7b6f149a8b9355b2d11ed27837fa87ef6aa496e7225d971a38cafb20bc0d5cf9e3e2760c8c7b6cc27accbfaf5a6982581153ddc5ca417d3834f2e18f2792dd5da70448c5ff046dd4d8804d9caa6b03c5e0fa47e1a985943605a27893462c98a50e0f059a8c7dd47102994526d60473661cbca49a1d97968a2c79c53faea609b0e827fd2198e7e837ab8a0d80ca04dd98e3093ecfda94e43124a7760ac0d82021e2853d1d5f public exponent: 10001 ] 2023-01-20 07:02:24.431 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-20 07:02:24.434 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-20 07:02:24.437 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-20 07:02:24.438 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-20 07:02:24.439 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-20 07:02:24.439 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-20 07:02:24.440 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-20 07:02:24.440 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-20 07:02:24.441 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-20 07:02:24.441 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-20 07:02:24.449 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-20 07:02:24.450 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-20 07:02:24.450 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-20 07:02:24.451 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-20 07:02:24.681 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-20 07:02:24.681 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-20 07:02:24.682 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-20 07:02:24.682 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-20 07:02:24.683 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-20 07:02:24.684 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-20 07:02:24.685 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-20 07:02:24.685 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-20 07:02:24.690 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-20 07:02:24.691 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-20 07:02:24.692 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-20 07:02:24.692 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-20 07:02:24.693 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-20 07:02:24.693 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-20 07:02:24.694 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-20 07:02:24.694 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-20 07:02:24.698 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 458861122131268939813495894079762951469759001064 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 20 05:03:06 UTC 2023 Final Date: Wed Jan 19 05:03:05 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [46:72:19:5c:cb:93:72:8c:2a:37:e8:fc:8e:18:47:68:fc:bf:88:83],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 72c8612c1ce1246d096e2dd23d7e5e63fd677411 1423e211234c6f0fba6530cedf0b5af3007d5702 23e9d642ec3ca7d8d3bc71e32eaf8a6f45cdc1b2 90518e65d629ab56b7885d9010e6f9626f7db0eb 21bafbba7e02ee0b8a26ccd86a114b7de5fb7bc8 727b1a9b70b66f40378849b28456f90c7ba50cd9 e670e9cae1718ff0f3c0962426fae868e1d123ab 0bfcc851a309ef73554d8eaef71c10f6755e72bd 84e88f54ddcbcc711ea864c48bc492d493a5262d a79ebbc7d8022bf028d58f48a6a7c96fa821c29a 892a9cea1f2fdd25d22c35e7abb26f3347d20ddb f85132721ac292ae6208b018b3783983c9fc2a5a 14b85346ee11260803b808cfcb3bc2d1400b4719 c544b2d8f2b8c9020ceb17a276daf3bbbb679342 06e46004fdd164d5d153cc1d1dba24610fdb686d 3e1bc6db4d132d9bcb641555a0e63d4cca9a69e0 cc8061216b62a4ef8225473fbf37c3aa6358fab5 15cdf72a09de9e8e0f321b44b244f0af53415013 eba01a60d9381178da193a7c042d485bd2b3911f a3db9031 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [de:7f:e4:6f:b0:16:4a:a3:28:48:48:9c:a2:6a:ea:51:30:d0:85:c3],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-20 07:10:13.508 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-20 07:10:13.512 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-20 07:10:13.515 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-20 07:10:13.517 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-20 07:10:13.517 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-20 07:10:13.518 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-20 07:10:13.518 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-20 07:10:13.519 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-20 07:10:13.520 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-20 07:10:13.520 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-20 07:10:13.525 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-20 07:10:13.527 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-20 07:10:13.527 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-20 07:10:13.527 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-20 07:10:13.744 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-20 07:10:13.745 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-20 07:10:13.745 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-20 07:10:13.745 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-20 07:10:13.747 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-20 07:10:13.748 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-20 07:10:13.749 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-20 07:10:13.749 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-20 07:10:13.749 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-20 07:10:13.751 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-20 07:10:13.752 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-20 07:10:13.752 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-20 07:10:13.753 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-20 07:10:13.754 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-20 07:10:13.754 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-20 07:10:13.755 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-20 07:10:13.760 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 458861122131268939813495894079762951469759001064 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 20 05:03:06 UTC 2023 Final Date: Wed Jan 19 05:03:05 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [46:72:19:5c:cb:93:72:8c:2a:37:e8:fc:8e:18:47:68:fc:bf:88:83],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 72c8612c1ce1246d096e2dd23d7e5e63fd677411 1423e211234c6f0fba6530cedf0b5af3007d5702 23e9d642ec3ca7d8d3bc71e32eaf8a6f45cdc1b2 90518e65d629ab56b7885d9010e6f9626f7db0eb 21bafbba7e02ee0b8a26ccd86a114b7de5fb7bc8 727b1a9b70b66f40378849b28456f90c7ba50cd9 e670e9cae1718ff0f3c0962426fae868e1d123ab 0bfcc851a309ef73554d8eaef71c10f6755e72bd 84e88f54ddcbcc711ea864c48bc492d493a5262d a79ebbc7d8022bf028d58f48a6a7c96fa821c29a 892a9cea1f2fdd25d22c35e7abb26f3347d20ddb f85132721ac292ae6208b018b3783983c9fc2a5a 14b85346ee11260803b808cfcb3bc2d1400b4719 c544b2d8f2b8c9020ceb17a276daf3bbbb679342 06e46004fdd164d5d153cc1d1dba24610fdb686d 3e1bc6db4d132d9bcb641555a0e63d4cca9a69e0 cc8061216b62a4ef8225473fbf37c3aa6358fab5 15cdf72a09de9e8e0f321b44b244f0af53415013 eba01a60d9381178da193a7c042d485bd2b3911f a3db9031 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6c:db:9f:43:8e:ac:38:f4:04:8c:05:14:36:9b:d2:02:88:6e:64:b3],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-20 07:15:32.830 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-20 07:15:32.832 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-20 07:15:32.834 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-20 07:15:32.835 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-20 07:15:32.835 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-20 07:15:32.836 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-20 07:15:32.837 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-20 07:15:32.837 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-20 07:15:32.837 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-20 07:15:32.838 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-20 07:15:32.843 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-20 07:15:32.843 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-20 07:15:32.844 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-20 07:15:32.844 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-20 07:15:32.985 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-20 07:15:32.986 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-20 07:15:32.987 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-20 07:15:32.988 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-20 07:15:32.989 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-20 07:15:32.991 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-20 07:15:32.992 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-20 07:15:32.992 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-20 07:15:32.992 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-20 07:15:33.004 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-20 07:15:33.005 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-20 07:15:33.006 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-20 07:15:33.007 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-20 07:15:33.007 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-20 07:15:33.007 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-20 07:15:33.008 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-20 07:15:33.018 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 458861122131268939813495894079762951469759001064 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 20 05:03:06 UTC 2023 Final Date: Wed Jan 19 05:03:05 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [46:72:19:5c:cb:93:72:8c:2a:37:e8:fc:8e:18:47:68:fc:bf:88:83],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 72c8612c1ce1246d096e2dd23d7e5e63fd677411 1423e211234c6f0fba6530cedf0b5af3007d5702 23e9d642ec3ca7d8d3bc71e32eaf8a6f45cdc1b2 90518e65d629ab56b7885d9010e6f9626f7db0eb 21bafbba7e02ee0b8a26ccd86a114b7de5fb7bc8 727b1a9b70b66f40378849b28456f90c7ba50cd9 e670e9cae1718ff0f3c0962426fae868e1d123ab 0bfcc851a309ef73554d8eaef71c10f6755e72bd 84e88f54ddcbcc711ea864c48bc492d493a5262d a79ebbc7d8022bf028d58f48a6a7c96fa821c29a 892a9cea1f2fdd25d22c35e7abb26f3347d20ddb f85132721ac292ae6208b018b3783983c9fc2a5a 14b85346ee11260803b808cfcb3bc2d1400b4719 c544b2d8f2b8c9020ceb17a276daf3bbbb679342 06e46004fdd164d5d153cc1d1dba24610fdb686d 3e1bc6db4d132d9bcb641555a0e63d4cca9a69e0 cc8061216b62a4ef8225473fbf37c3aa6358fab5 15cdf72a09de9e8e0f321b44b244f0af53415013 eba01a60d9381178da193a7c042d485bd2b3911f a3db9031 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d5:3f:ac:64:e4:a8:93:5e:45:bf:df:37:a2:ae:cb:3d:28:43:3c:61],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-20 07:22:32.553 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-20 07:22:32.555 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-20 07:22:32.557 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2023-01-20 07:22:32.558 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-20 07:22:32.559 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2023-01-20 07:22:32.559 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-20 07:22:32.559 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-20 07:22:32.560 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-20 07:22:32.560 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-20 07:22:32.561 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-20 07:22:32.565 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-20 07:22:32.565 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-20 07:22:32.566 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-20 07:22:32.566 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-20 07:22:32.761 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-20 07:22:32.762 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-20 07:22:32.762 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-20 07:22:32.763 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-20 07:22:32.764 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-20 07:22:32.764 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-20 07:22:32.765 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-20 07:22:32.765 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-20 07:22:32.766 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-20 07:22:32.767 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-20 07:22:32.767 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-20 07:22:32.767 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-20 07:22:32.768 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-20 07:22:32.769 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-20 07:22:32.769 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-20 07:22:32.770 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-20 07:22:32.773 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 458861122131268939813495894079762951469759001064 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 20 05:03:06 UTC 2023 Final Date: Wed Jan 19 05:03:05 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [46:72:19:5c:cb:93:72:8c:2a:37:e8:fc:8e:18:47:68:fc:bf:88:83],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 72c8612c1ce1246d096e2dd23d7e5e63fd677411 1423e211234c6f0fba6530cedf0b5af3007d5702 23e9d642ec3ca7d8d3bc71e32eaf8a6f45cdc1b2 90518e65d629ab56b7885d9010e6f9626f7db0eb 21bafbba7e02ee0b8a26ccd86a114b7de5fb7bc8 727b1a9b70b66f40378849b28456f90c7ba50cd9 e670e9cae1718ff0f3c0962426fae868e1d123ab 0bfcc851a309ef73554d8eaef71c10f6755e72bd 84e88f54ddcbcc711ea864c48bc492d493a5262d a79ebbc7d8022bf028d58f48a6a7c96fa821c29a 892a9cea1f2fdd25d22c35e7abb26f3347d20ddb f85132721ac292ae6208b018b3783983c9fc2a5a 14b85346ee11260803b808cfcb3bc2d1400b4719 c544b2d8f2b8c9020ceb17a276daf3bbbb679342 06e46004fdd164d5d153cc1d1dba24610fdb686d 3e1bc6db4d132d9bcb641555a0e63d4cca9a69e0 cc8061216b62a4ef8225473fbf37c3aa6358fab5 15cdf72a09de9e8e0f321b44b244f0af53415013 eba01a60d9381178da193a7c042d485bd2b3911f a3db9031 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [86:ed:4f:9f:e9:6c:2b:19:9d:82:e2:de:88:9f:51:0b:c0:48:5f:0f],[56:66:d1:a4] modulus: dac81cd0e38e93519042a8c2ff5b54eeb12261ec146c2368de53085d8a8a8dbd37afe6f2cd435c147b3079d08f89d91afd9de0a1a8a80dc260fa2c6829f21496c313d211591938cd573a4ec6fa0caa8abf9b5a475454323f7fb728143aa95f3734f3a1eb82a9d8704a700a6192ee947e067ba1432d7c024470c0c14ab9749b526869511c3e86aeca85c0d8b3a80e6db94ff3ae8eac3712827ef36fce9ee034145d91d8cb23a0009bf430df15a2311ebe9d23638ab0f615e575afee3d6608ce315c373e0be57c80e84aee085dd92f0d472ae0f46fce8776cd6f1251aa0078fc9bfb52cc9086791a1bc647a50f3545045904a6f54ef9211b92f1e8ed9ee2935b87 public exponent: 10001 ] 2023-01-20 07:28:35.668 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-20 07:28:35.670 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-20 07:28:35.671 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-20 07:28:35.672 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-20 07:28:35.672 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-20 07:28:35.673 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-20 07:28:35.673 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-20 07:28:35.673 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-20 07:28:35.674 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-20 07:28:35.674 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-20 07:28:35.678 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-20 07:28:35.678 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-20 07:28:35.679 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-20 07:28:35.679 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-20 07:28:35.848 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-20 07:28:35.849 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-20 07:28:35.849 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-20 07:28:35.850 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-20 07:28:35.854 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-20 07:28:35.854 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-20 07:28:35.855 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-20 07:28:35.855 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-20 07:28:35.855 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-20 07:28:35.856 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-20 07:28:35.856 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-20 07:28:35.856 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-20 07:28:35.857 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-20 07:28:35.857 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-20 07:28:35.858 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-20 07:28:35.869 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-20 07:28:35.872 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 458861122131268939813495894079762951469759001064 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 20 05:03:06 UTC 2023 Final Date: Wed Jan 19 05:03:05 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [46:72:19:5c:cb:93:72:8c:2a:37:e8:fc:8e:18:47:68:fc:bf:88:83],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 72c8612c1ce1246d096e2dd23d7e5e63fd677411 1423e211234c6f0fba6530cedf0b5af3007d5702 23e9d642ec3ca7d8d3bc71e32eaf8a6f45cdc1b2 90518e65d629ab56b7885d9010e6f9626f7db0eb 21bafbba7e02ee0b8a26ccd86a114b7de5fb7bc8 727b1a9b70b66f40378849b28456f90c7ba50cd9 e670e9cae1718ff0f3c0962426fae868e1d123ab 0bfcc851a309ef73554d8eaef71c10f6755e72bd 84e88f54ddcbcc711ea864c48bc492d493a5262d a79ebbc7d8022bf028d58f48a6a7c96fa821c29a 892a9cea1f2fdd25d22c35e7abb26f3347d20ddb f85132721ac292ae6208b018b3783983c9fc2a5a 14b85346ee11260803b808cfcb3bc2d1400b4719 c544b2d8f2b8c9020ceb17a276daf3bbbb679342 06e46004fdd164d5d153cc1d1dba24610fdb686d 3e1bc6db4d132d9bcb641555a0e63d4cca9a69e0 cc8061216b62a4ef8225473fbf37c3aa6358fab5 15cdf72a09de9e8e0f321b44b244f0af53415013 eba01a60d9381178da193a7c042d485bd2b3911f a3db9031 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [62:44:b4:37:07:a7:ff:8e:a2:35:55:c5:7b:7c:b1:9b:a3:53:5d:4e],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-20 07:28:50.729 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-20 07:28:50.730 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-20 07:28:50.731 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-20 07:28:50.731 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-20 07:28:50.732 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-20 07:28:50.733 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-20 07:28:50.733 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-20 07:28:50.733 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-20 07:28:50.734 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-20 07:28:50.734 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-20 07:28:50.738 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-20 07:28:50.739 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-20 07:28:50.739 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-20 07:28:50.740 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-20 07:28:50.841 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-20 07:28:50.841 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-20 07:28:50.842 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-20 07:28:50.842 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-20 07:28:50.843 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-20 07:28:50.844 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-20 07:28:50.845 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-20 07:28:50.845 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-20 07:28:50.845 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-20 07:28:50.846 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-20 07:28:50.846 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-20 07:28:50.846 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-20 07:28:50.847 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-20 07:28:50.847 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-20 07:28:50.848 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-20 07:28:50.848 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-20 07:28:50.851 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 458861122131268939813495894079762951469759001064 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 20 05:03:06 UTC 2023 Final Date: Wed Jan 19 05:03:05 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [46:72:19:5c:cb:93:72:8c:2a:37:e8:fc:8e:18:47:68:fc:bf:88:83],[56:66:d1:a4] modulus: af5bd4ddfb53502d72ba21d91d5cde14106070e7d9887ba0f89c7becc43008413c5a1a6458258525bbfdeccbe5d9136fcb5b3f1c859308dad11daea4fbe694de52790f30e803e6e71fd74b2ba8760a510c780e2a7b0974415c3fcca6e4106746d37a76cd54b14fd1aa448432cf93e13086c453c6a377789ae409c04ead2c0f3afcf899f37bc3d618711bac48fd1834d114dad410c254b77b3f169094ffaf77f670bb43eacfc5d4c03f4c63e8cfa80a7df3309da537bec03f72af8edcae39e45f3a31eece436cefb18b017f7ff4d4babef727b32f96de8fb8a4f255cdcc60b2cc7432783283c6a5b518e2b6abc7c4c531aad2edf808d55959efae89d4ba9bae28bee7443d862ed13f966a7e771201a69b23a24ee4caaf0f84c6e9fa058ffa3215404a6788e4abe9f7df083fed0bad625552f84678054d092fa4a8396e5ac57bde5fe075e47c4f67e29c569e7cf50735829cc5d4c04bb26ae9738112cde0c85a7643900b8956ef8a7855295613b7ce7035d9de7cffa97178c75aa75c4bc37cc16f public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 72c8612c1ce1246d096e2dd23d7e5e63fd677411 1423e211234c6f0fba6530cedf0b5af3007d5702 23e9d642ec3ca7d8d3bc71e32eaf8a6f45cdc1b2 90518e65d629ab56b7885d9010e6f9626f7db0eb 21bafbba7e02ee0b8a26ccd86a114b7de5fb7bc8 727b1a9b70b66f40378849b28456f90c7ba50cd9 e670e9cae1718ff0f3c0962426fae868e1d123ab 0bfcc851a309ef73554d8eaef71c10f6755e72bd 84e88f54ddcbcc711ea864c48bc492d493a5262d a79ebbc7d8022bf028d58f48a6a7c96fa821c29a 892a9cea1f2fdd25d22c35e7abb26f3347d20ddb f85132721ac292ae6208b018b3783983c9fc2a5a 14b85346ee11260803b808cfcb3bc2d1400b4719 c544b2d8f2b8c9020ceb17a276daf3bbbb679342 06e46004fdd164d5d153cc1d1dba24610fdb686d 3e1bc6db4d132d9bcb641555a0e63d4cca9a69e0 cc8061216b62a4ef8225473fbf37c3aa6358fab5 15cdf72a09de9e8e0f321b44b244f0af53415013 eba01a60d9381178da193a7c042d485bd2b3911f a3db9031 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [29:13:43:60:78:4d:58:9d:31:1e:b3:74:08:c7:20:7d:f8:f5:10:fd],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-20 07:52:48.498 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-20 07:52:48.501 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-20 07:52:48.503 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-20 07:52:48.504 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-20 07:52:48.504 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-20 07:52:48.505 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-20 07:52:48.505 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-20 07:52:48.506 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-20 07:52:48.506 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-20 07:52:48.507 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-20 07:52:48.514 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-20 07:52:48.515 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-20 07:52:48.515 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-20 07:52:48.515 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-20 07:52:48.695 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-20 07:52:48.696 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-20 07:52:48.696 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-20 07:52:48.696 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-20 07:52:48.699 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-20 07:52:48.700 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-20 07:52:48.700 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-20 07:52:48.701 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-20 07:52:48.701 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-20 07:52:48.702 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-20 07:52:48.703 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-20 07:52:48.703 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-20 07:52:48.704 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-20 07:52:48.704 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-20 07:52:48.704 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-20 07:52:48.705 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-20 07:52:48.710 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 458861122131268939813495894079762951469759001064 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 20 05:03:06 UTC 2023 Final Date: Wed Jan 19 05:03:05 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [46:72:19:5c:cb:93:72:8c:2a:37:e8:fc:8e:18:47:68:fc:bf:88:83],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 72c8612c1ce1246d096e2dd23d7e5e63fd677411 1423e211234c6f0fba6530cedf0b5af3007d5702 23e9d642ec3ca7d8d3bc71e32eaf8a6f45cdc1b2 90518e65d629ab56b7885d9010e6f9626f7db0eb 21bafbba7e02ee0b8a26ccd86a114b7de5fb7bc8 727b1a9b70b66f40378849b28456f90c7ba50cd9 e670e9cae1718ff0f3c0962426fae868e1d123ab 0bfcc851a309ef73554d8eaef71c10f6755e72bd 84e88f54ddcbcc711ea864c48bc492d493a5262d a79ebbc7d8022bf028d58f48a6a7c96fa821c29a 892a9cea1f2fdd25d22c35e7abb26f3347d20ddb f85132721ac292ae6208b018b3783983c9fc2a5a 14b85346ee11260803b808cfcb3bc2d1400b4719 c544b2d8f2b8c9020ceb17a276daf3bbbb679342 06e46004fdd164d5d153cc1d1dba24610fdb686d 3e1bc6db4d132d9bcb641555a0e63d4cca9a69e0 cc8061216b62a4ef8225473fbf37c3aa6358fab5 15cdf72a09de9e8e0f321b44b244f0af53415013 eba01a60d9381178da193a7c042d485bd2b3911f a3db9031 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ce:08:1d:83:c2:38:d8:89:90:39:8a:8e:9f:30:18:9e:58:b8:91:e4],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-20 07:52:55.184 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-01-20 07:52:55.185 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-01-20 07:52:55.186 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-20 07:52:55.187 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-20 07:52:55.187 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-20 07:52:55.187 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-01-20 07:52:55.188 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-01-20 07:52:55.188 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-01-20 07:52:55.188 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-01-20 07:52:55.188 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-01-20 07:52:55.192 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-01-20 07:52:55.192 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-20 07:52:55.192 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-01-20 07:52:55.193 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-20 07:52:55.290 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-01-20 07:52:55.291 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-01-20 07:52:55.291 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-01-20 07:52:55.291 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-01-20 07:52:55.292 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-01-20 07:52:55.292 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-01-20 07:52:55.292 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-20 07:52:55.293 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-20 07:52:55.293 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-20 07:52:55.293 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-20 07:52:55.294 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-20 07:52:55.294 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-20 07:52:55.295 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-20 07:52:55.295 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-01-20 07:52:55.295 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-01-20 07:52:55.295 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-20 07:52:55.297 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 458861122131268939813495894079762951469759001064 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 20 05:03:06 UTC 2023 Final Date: Wed Jan 19 05:03:05 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [46:72:19:5c:cb:93:72:8c:2a:37:e8:fc:8e:18:47:68:fc:bf:88:83],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 72c8612c1ce1246d096e2dd23d7e5e63fd677411 1423e211234c6f0fba6530cedf0b5af3007d5702 23e9d642ec3ca7d8d3bc71e32eaf8a6f45cdc1b2 90518e65d629ab56b7885d9010e6f9626f7db0eb 21bafbba7e02ee0b8a26ccd86a114b7de5fb7bc8 727b1a9b70b66f40378849b28456f90c7ba50cd9 e670e9cae1718ff0f3c0962426fae868e1d123ab 0bfcc851a309ef73554d8eaef71c10f6755e72bd 84e88f54ddcbcc711ea864c48bc492d493a5262d a79ebbc7d8022bf028d58f48a6a7c96fa821c29a 892a9cea1f2fdd25d22c35e7abb26f3347d20ddb f85132721ac292ae6208b018b3783983c9fc2a5a 14b85346ee11260803b808cfcb3bc2d1400b4719 c544b2d8f2b8c9020ceb17a276daf3bbbb679342 06e46004fdd164d5d153cc1d1dba24610fdb686d 3e1bc6db4d132d9bcb641555a0e63d4cca9a69e0 cc8061216b62a4ef8225473fbf37c3aa6358fab5 15cdf72a09de9e8e0f321b44b244f0af53415013 eba01a60d9381178da193a7c042d485bd2b3911f a3db9031 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d3:ce:29:83:f1:1a:fd:be:67:d2:94:1e:44:98:93:68:39:d8:6b:cd],[56:66:d1:a4] modulus: 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 public exponent: 10001 ]