By type
2023-02-22 11:27:35,869 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2023-02-22 11:27:37,437 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2023-02-22 11:27:38.470 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Feb 22, 2023 11:27:40 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Feb 22, 2023 11:27:40 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Feb 22, 2023 11:27:40 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Feb 22, 2023 11:27:41 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2023-02-22 11:27:41.645 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2023-02-22 11:27:41.941 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2023-02-22 11:27:42.142 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2023-02-22 11:27:42.980 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2023-02-22 11:27:42.982 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2023-02-22 11:27:42.984 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2023-02-22 11:27:42.987 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2023-02-22 11:27:43.026 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2023-02-22 11:27:43.029 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2023-02-22 11:27:43.144 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2023-02-22 11:27:44.124 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Feb 22, 2023 11:27:44 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2023-02-22 11:27:45.191 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 10.223 seconds (JVM running for 12.063) Feb 22, 2023 11:28:06 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2023-02-22 11:28:29.338 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-02-22 11:28:29.346 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-02-22 11:28:29.386 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2023-02-22 11:28:29.390 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-02-22 11:28:29.407 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2023-02-22 11:28:29.409 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-02-22 11:28:29.410 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-02-22 11:28:29.411 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-02-22 11:28:29.412 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-02-22 11:28:29.417 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-02-22 11:28:29.427 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-02-22 11:28:29.431 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-02-22 11:28:29.496 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-02-22 11:28:29.503 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-02-22 11:28:29.504 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-02-22 11:28:29.508 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-02-22 11:28:30.151 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-02-22 11:28:30.153 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-02-22 11:28:30.154 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-02-22 11:28:30.155 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-02-22 11:28:30.165 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-02-22 11:28:30.166 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-02-22 11:28:30.167 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-22 11:28:30.167 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-22 11:28:30.168 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-22 11:28:30.185 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-22 11:28:30.186 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-22 11:28:30.186 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-22 11:28:30.193 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-22 11:28:30.193 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-22 11:28:30.194 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-22 11:28:30.195 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-02-22 11:28:30.231 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 338653787554126507175040896308813123032849424951 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Feb 22 11:25:11 UTC 2023 Final Date: Mon Feb 21 11:25:10 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1f:58:88:ed:eb:33:d6:3c:8f:c2:c8:49:3d:24:9a:2b:91:35:42:44],[56:66:d1:a4] modulus: b417e857125732daee950154c4b9d5d47d3f6481a49612a5023519f79141d0aa1eb6e02996081162f6c925d4a04d2c488a029872b7aebfffef2723d745b8bca6c6f8c316d47a63dc19baa6834a05babbd6eff80445c74d28ead916aee14ccb35f8c10d6a0fa5ddeae295c9fb77d3241202b2bc3c1599fbef15bce3998ded55c7fe6abfaac094068a7cc9e8df2f4029417b71bcacff8373db7a461e89f0952a6c464d3af30907055a414f3abb264511dc04cc6e2451c341735e1566db49106d28cdac5913f21a21aa70d847c6ed5333ceeb66a134d9cc356de01b7064962ca450e39c3337cf0a4ed09c9c55816d08e7136389014ab05592e19674c66904e38e82256d5a7e23af1350a14eee7c1184d185bac422c188beb42999f271bb2db15ddf356bfa39c4f949888d21106bd34dca57e5929dc3f7edd801b99d1dcc96d501cfa15de97350e8331050debcad59a0ed5299fa625422611f32811fba5966e5af2ec649d2672d67f68d51818655c4a94747c8cc7b174e7e429d127015ccf62ab0fd public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 55a2b699dbd682c4c3e19db678760e53fd389df5 24ba33a3cc9bbaf4242905a9de039e1c6cc5cb00 9a5be70f31382a8257df1152e0c7146d0421aea3 43a1e9c0e7cb7e34982e60d83238cf2c9831bb9b c1447e2cd949116834a2c527859fe5e861065c10 52a45e2cafce2eb5d0f9e31d15708a90029365d7 d40a4dd6da90cd5d8476a0a9b2be102f0a7fdf97 bb96a64392054173eaed7d193a6c1d16cc394a9e a2c38f5fc19698cab96c297bde12adfc7d85f470 1ae59be23ee6a86fdd30343471f2ee2fe87d37c7 3e8ef56b3e8224a04421359d8452cce00663104c db371ca983a396b990fa2da0242dbd1de6e1b52b a3816655e8c317464348cd8fc0096531dda919e9 821a6fbd86c4910697ac964e87c7618d2de78871 3655bf15dc0cdec355ddf72da91ffa256766fc31 da0cf16c3cff729fe3930cdcce1a16e2d9dc6c04 793a12ff62af4471dde346a597df415139b37fb2 7a89d503b18142f4bd781867e6bf40fdd9a13047 2099d6595572bd4ae6d57cd29e749a20accf2356 67dbc97c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f0:87:47:5c:a3:d4:bd:85:f8:a9:2e:87:f9:11:ef:3a:0b:57:9d:b9],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-02-22 14:04:57.728 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-02-22 14:04:57.733 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-02-22 14:04:57.738 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-02-22 14:04:57.743 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-02-22 14:04:57.744 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-02-22 14:04:57.745 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-02-22 14:04:57.746 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-02-22 14:04:57.746 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-02-22 14:04:57.747 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-02-22 14:04:57.747 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-02-22 14:04:57.753 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-02-22 14:04:57.754 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-02-22 14:04:57.755 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-02-22 14:04:57.755 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-02-22 14:04:57.957 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-02-22 14:04:57.959 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-02-22 14:04:57.959 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-02-22 14:04:57.960 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-02-22 14:04:57.964 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-02-22 14:04:57.965 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-02-22 14:04:57.967 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-22 14:04:57.967 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-22 14:04:57.968 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-22 14:04:57.970 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-22 14:04:57.971 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-22 14:04:57.972 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-22 14:04:57.974 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-22 14:04:57.975 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-22 14:04:57.976 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-22 14:04:57.977 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-02-22 14:04:57.985 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 338653787554126507175040896308813123032849424951 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Feb 22 11:25:11 UTC 2023 Final Date: Mon Feb 21 11:25:10 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1f:58:88:ed:eb:33:d6:3c:8f:c2:c8:49:3d:24:9a:2b:91:35:42:44],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 55a2b699dbd682c4c3e19db678760e53fd389df5 24ba33a3cc9bbaf4242905a9de039e1c6cc5cb00 9a5be70f31382a8257df1152e0c7146d0421aea3 43a1e9c0e7cb7e34982e60d83238cf2c9831bb9b c1447e2cd949116834a2c527859fe5e861065c10 52a45e2cafce2eb5d0f9e31d15708a90029365d7 d40a4dd6da90cd5d8476a0a9b2be102f0a7fdf97 bb96a64392054173eaed7d193a6c1d16cc394a9e a2c38f5fc19698cab96c297bde12adfc7d85f470 1ae59be23ee6a86fdd30343471f2ee2fe87d37c7 3e8ef56b3e8224a04421359d8452cce00663104c db371ca983a396b990fa2da0242dbd1de6e1b52b a3816655e8c317464348cd8fc0096531dda919e9 821a6fbd86c4910697ac964e87c7618d2de78871 3655bf15dc0cdec355ddf72da91ffa256766fc31 da0cf16c3cff729fe3930cdcce1a16e2d9dc6c04 793a12ff62af4471dde346a597df415139b37fb2 7a89d503b18142f4bd781867e6bf40fdd9a13047 2099d6595572bd4ae6d57cd29e749a20accf2356 67dbc97c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [dc:11:63:9f:59:b6:1d:ee:9a:ed:c1:ef:9c:1e:cd:7b:e0:54:e9:e6],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-02-22 14:06:46.932 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-02-22 14:06:46.935 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-02-22 14:06:46.940 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2023-02-22 14:06:46.942 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-02-22 14:06:46.942 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2023-02-22 14:06:46.943 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-02-22 14:06:46.944 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-02-22 14:06:46.944 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-02-22 14:06:46.945 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-02-22 14:06:46.946 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-02-22 14:06:46.952 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-02-22 14:06:46.953 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-02-22 14:06:46.953 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-02-22 14:06:46.954 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-02-22 14:06:47.110 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-02-22 14:06:47.111 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-02-22 14:06:47.112 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-02-22 14:06:47.112 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-02-22 14:06:47.115 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-02-22 14:06:47.115 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-02-22 14:06:47.116 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-22 14:06:47.117 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-22 14:06:47.117 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-22 14:06:47.118 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-22 14:06:47.119 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-22 14:06:47.120 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-22 14:06:47.121 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-22 14:06:47.121 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-22 14:06:47.122 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-22 14:06:47.123 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-02-22 14:06:47.127 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 338653787554126507175040896308813123032849424951 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Feb 22 11:25:11 UTC 2023 Final Date: Mon Feb 21 11:25:10 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1f:58:88:ed:eb:33:d6:3c:8f:c2:c8:49:3d:24:9a:2b:91:35:42:44],[56:66:d1:a4] modulus: b417e857125732daee950154c4b9d5d47d3f6481a49612a5023519f79141d0aa1eb6e02996081162f6c925d4a04d2c488a029872b7aebfffef2723d745b8bca6c6f8c316d47a63dc19baa6834a05babbd6eff80445c74d28ead916aee14ccb35f8c10d6a0fa5ddeae295c9fb77d3241202b2bc3c1599fbef15bce3998ded55c7fe6abfaac094068a7cc9e8df2f4029417b71bcacff8373db7a461e89f0952a6c464d3af30907055a414f3abb264511dc04cc6e2451c341735e1566db49106d28cdac5913f21a21aa70d847c6ed5333ceeb66a134d9cc356de01b7064962ca450e39c3337cf0a4ed09c9c55816d08e7136389014ab05592e19674c66904e38e82256d5a7e23af1350a14eee7c1184d185bac422c188beb42999f271bb2db15ddf356bfa39c4f949888d21106bd34dca57e5929dc3f7edd801b99d1dcc96d501cfa15de97350e8331050debcad59a0ed5299fa625422611f32811fba5966e5af2ec649d2672d67f68d51818655c4a94747c8cc7b174e7e429d127015ccf62ab0fd public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 55a2b699dbd682c4c3e19db678760e53fd389df5 24ba33a3cc9bbaf4242905a9de039e1c6cc5cb00 9a5be70f31382a8257df1152e0c7146d0421aea3 43a1e9c0e7cb7e34982e60d83238cf2c9831bb9b c1447e2cd949116834a2c527859fe5e861065c10 52a45e2cafce2eb5d0f9e31d15708a90029365d7 d40a4dd6da90cd5d8476a0a9b2be102f0a7fdf97 bb96a64392054173eaed7d193a6c1d16cc394a9e a2c38f5fc19698cab96c297bde12adfc7d85f470 1ae59be23ee6a86fdd30343471f2ee2fe87d37c7 3e8ef56b3e8224a04421359d8452cce00663104c db371ca983a396b990fa2da0242dbd1de6e1b52b a3816655e8c317464348cd8fc0096531dda919e9 821a6fbd86c4910697ac964e87c7618d2de78871 3655bf15dc0cdec355ddf72da91ffa256766fc31 da0cf16c3cff729fe3930cdcce1a16e2d9dc6c04 793a12ff62af4471dde346a597df415139b37fb2 7a89d503b18142f4bd781867e6bf40fdd9a13047 2099d6595572bd4ae6d57cd29e749a20accf2356 67dbc97c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9e:8e:2a:e4:3d:e0:a9:13:e4:80:f1:a3:28:77:45:f0:1d:7a:67:a5],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-02-22 14:08:29.621 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-02-22 14:08:29.622 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-02-22 14:08:29.623 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2023-02-22 14:08:29.624 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-02-22 14:08:29.624 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2023-02-22 14:08:29.625 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-02-22 14:08:29.625 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-02-22 14:08:29.626 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-02-22 14:08:29.626 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-02-22 14:08:29.627 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-02-22 14:08:29.630 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-02-22 14:08:29.631 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-02-22 14:08:29.631 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-02-22 14:08:29.631 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-02-22 14:08:29.762 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-02-22 14:08:29.763 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-02-22 14:08:29.763 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-02-22 14:08:29.764 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-02-22 14:08:29.766 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-02-22 14:08:29.766 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-02-22 14:08:29.767 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-22 14:08:29.767 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-22 14:08:29.767 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-22 14:08:29.768 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-22 14:08:29.768 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-22 14:08:29.768 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-22 14:08:29.769 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-22 14:08:29.770 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-22 14:08:29.770 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-22 14:08:29.771 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-02-22 14:08:29.775 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 338653787554126507175040896308813123032849424951 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Feb 22 11:25:11 UTC 2023 Final Date: Mon Feb 21 11:25:10 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1f:58:88:ed:eb:33:d6:3c:8f:c2:c8:49:3d:24:9a:2b:91:35:42:44],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 55a2b699dbd682c4c3e19db678760e53fd389df5 24ba33a3cc9bbaf4242905a9de039e1c6cc5cb00 9a5be70f31382a8257df1152e0c7146d0421aea3 43a1e9c0e7cb7e34982e60d83238cf2c9831bb9b c1447e2cd949116834a2c527859fe5e861065c10 52a45e2cafce2eb5d0f9e31d15708a90029365d7 d40a4dd6da90cd5d8476a0a9b2be102f0a7fdf97 bb96a64392054173eaed7d193a6c1d16cc394a9e a2c38f5fc19698cab96c297bde12adfc7d85f470 1ae59be23ee6a86fdd30343471f2ee2fe87d37c7 3e8ef56b3e8224a04421359d8452cce00663104c db371ca983a396b990fa2da0242dbd1de6e1b52b a3816655e8c317464348cd8fc0096531dda919e9 821a6fbd86c4910697ac964e87c7618d2de78871 3655bf15dc0cdec355ddf72da91ffa256766fc31 da0cf16c3cff729fe3930cdcce1a16e2d9dc6c04 793a12ff62af4471dde346a597df415139b37fb2 7a89d503b18142f4bd781867e6bf40fdd9a13047 2099d6595572bd4ae6d57cd29e749a20accf2356 67dbc97c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [09:99:77:06:ec:74:ff:31:8c:82:1b:db:1a:9a:33:d1:e0:1a:38:02],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-02-22 14:11:49.663 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2023-02-22 14:11:49.664 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2023-02-22 14:11:49.665 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-02-22 14:11:49.666 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-02-22 14:11:49.666 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-02-22 14:11:49.667 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2023-02-22 14:11:49.667 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2023-02-22 14:11:49.668 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2023-02-22 14:11:49.668 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2023-02-22 14:11:49.669 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2023-02-22 14:11:49.673 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2023-02-22 14:11:49.673 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-02-22 14:11:49.674 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2023-02-22 14:11:49.674 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-02-22 14:11:49.802 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2023-02-22 14:11:49.803 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2023-02-22 14:11:49.803 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2023-02-22 14:11:49.804 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2023-02-22 14:11:49.805 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2023-02-22 14:11:49.806 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2023-02-22 14:11:49.807 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-22 14:11:49.807 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-22 14:11:49.808 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-22 14:11:49.809 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-22 14:11:49.809 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-22 14:11:49.809 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-22 14:11:49.810 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-22 14:11:49.810 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2023-02-22 14:11:49.811 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2023-02-22 14:11:49.812 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-02-22 14:11:49.814 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 338653787554126507175040896308813123032849424951 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Feb 22 11:25:11 UTC 2023 Final Date: Mon Feb 21 11:25:10 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1f:58:88:ed:eb:33:d6:3c:8f:c2:c8:49:3d:24:9a:2b:91:35:42:44],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 55a2b699dbd682c4c3e19db678760e53fd389df5 24ba33a3cc9bbaf4242905a9de039e1c6cc5cb00 9a5be70f31382a8257df1152e0c7146d0421aea3 43a1e9c0e7cb7e34982e60d83238cf2c9831bb9b c1447e2cd949116834a2c527859fe5e861065c10 52a45e2cafce2eb5d0f9e31d15708a90029365d7 d40a4dd6da90cd5d8476a0a9b2be102f0a7fdf97 bb96a64392054173eaed7d193a6c1d16cc394a9e a2c38f5fc19698cab96c297bde12adfc7d85f470 1ae59be23ee6a86fdd30343471f2ee2fe87d37c7 3e8ef56b3e8224a04421359d8452cce00663104c db371ca983a396b990fa2da0242dbd1de6e1b52b a3816655e8c317464348cd8fc0096531dda919e9 821a6fbd86c4910697ac964e87c7618d2de78871 3655bf15dc0cdec355ddf72da91ffa256766fc31 da0cf16c3cff729fe3930cdcce1a16e2d9dc6c04 793a12ff62af4471dde346a597df415139b37fb2 7a89d503b18142f4bd781867e6bf40fdd9a13047 2099d6595572bd4ae6d57cd29e749a20accf2356 67dbc97c Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [75:64:29:dd:e4:9d:ce:63:5b:75:af:73:c6:71:67:eb:85:d3:1e:b0],[56:66:d1:a4] modulus: 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 public exponent: 10001 ]