By type
2022-05-24 10:37:41,534 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-05-24 10:37:42,557 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-05-24 10:37:43.163 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default May 24, 2022 10:37:44 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] May 24, 2022 10:37:44 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] May 24, 2022 10:37:44 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] May 24, 2022 10:37:44 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-05-24 10:37:45.333 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-05-24 10:37:45.516 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-05-24 10:37:45.639 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-05-24 10:37:46.201 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-05-24 10:37:46.204 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-05-24 10:37:46.205 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-05-24 10:37:46.209 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-05-24 10:37:46.240 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-05-24 10:37:46.243 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-05-24 10:37:46.325 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-05-24 10:37:46.911 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} May 24, 2022 10:37:47 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-05-24 10:37:47.685 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 6.676 seconds (JVM running for 7.952) May 24, 2022 10:38:16 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-05-24 10:38:47.056 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-24 10:38:47.064 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-24 10:38:47.092 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-05-24 10:38:47.095 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-24 10:38:47.106 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-05-24 10:38:47.108 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-24 10:38:47.109 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-24 10:38:47.110 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-24 10:38:47.111 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-24 10:38:47.113 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-24 10:38:47.118 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-24 10:38:47.120 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-24 10:38:47.146 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-24 10:38:47.151 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-24 10:38:47.151 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-24 10:38:47.154 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-24 10:38:47.630 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-24 10:38:47.632 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-24 10:38:47.633 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-24 10:38:47.634 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-24 10:38:47.639 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-24 10:38:47.640 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-24 10:38:47.641 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 10:38:47.641 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-24 10:38:47.641 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-24 10:38:47.649 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 10:38:47.649 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-24 10:38:47.649 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-24 10:38:47.653 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 10:38:47.654 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-24 10:38:47.654 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-24 10:38:47.655 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-24 10:38:47.680 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 33744373258804818365874138739854443926114133558 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue May 24 10:35:36 UTC 2022 Final Date: Sun May 23 10:35:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [8a:14:39:e5:44:2c:29:a6:37:bc:a2:25:4f:d5:e6:44:c5:e8:40:c1] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6e662df8400026cc55f1ca37240f40b0566c8dca 7925a4db19bdc6083f61e7b5664b5cd676fe8838 c705a16d2d6553c65c82d46746f20854d01200d8 da71f9dba67a00015c42c5813a93aa70308a6261 ce3cc8ba044d52e0a859e72e7e4caa7473ac6ca6 c2d20422cf2f67bb4645a8586d5787082106f55d e129fdfbad1e4e2ea957c807509f81373cf4f52b 433545685e68d6a93406753b275ce2c9ac604ec5 7dfc69372b7dbc8f0922331d74606e2f785dd7db aaf9876a6ea48b829ae893007c3422c445e895d5 dd46ac6b990a69309f5df1be3eea86dfa8a1ac12 d9d987f6ae5d57c05b388a5b5fec47fc675de2bb 63e08c3833e48185a11b6c92d0967443758df887 e7655628e421ea18fc809fc15e04e816d05650c1 32ca954d1ec3abd66568ac3c3e9a4a1c71be7442 9e571918018c8a315dd2c3639ed4600a15d1c1a1 68158cd9c5c4c4ba6a96ea42342deb9849e4c01f c55234874b87ba86e8e839c9fc81db1f038b8dfc e1953dd74508530e8fe367c5d3eb7098abc45b26 6edd1fe5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [bd:ee:91:67:f9:5c:e9:ba:b7:07:11:f4:5e:da:4d:31:b6:fe:5a:fc] modulus: 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 public exponent: 10001 ] 2022-05-24 11:54:29.697 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-24 11:54:29.699 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-24 11:54:29.701 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-24 11:54:29.702 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-24 11:54:29.702 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-24 11:54:29.702 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-24 11:54:29.703 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-24 11:54:29.703 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-24 11:54:29.703 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-24 11:54:29.703 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-24 11:54:29.709 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-24 11:54:29.710 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-24 11:54:29.710 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-24 11:54:29.710 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-24 11:54:29.954 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-24 11:54:29.955 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-24 11:54:29.956 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-24 11:54:29.956 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-24 11:54:29.959 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-24 11:54:29.959 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-24 11:54:29.959 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 11:54:29.960 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-24 11:54:29.960 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-24 11:54:29.961 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 11:54:29.961 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-24 11:54:29.962 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-24 11:54:29.962 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 11:54:29.963 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-24 11:54:29.963 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-24 11:54:29.964 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-24 11:54:29.967 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 33744373258804818365874138739854443926114133558 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue May 24 10:35:36 UTC 2022 Final Date: Sun May 23 10:35:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [8a:14:39:e5:44:2c:29:a6:37:bc:a2:25:4f:d5:e6:44:c5:e8:40:c1] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6e662df8400026cc55f1ca37240f40b0566c8dca 7925a4db19bdc6083f61e7b5664b5cd676fe8838 c705a16d2d6553c65c82d46746f20854d01200d8 da71f9dba67a00015c42c5813a93aa70308a6261 ce3cc8ba044d52e0a859e72e7e4caa7473ac6ca6 c2d20422cf2f67bb4645a8586d5787082106f55d e129fdfbad1e4e2ea957c807509f81373cf4f52b 433545685e68d6a93406753b275ce2c9ac604ec5 7dfc69372b7dbc8f0922331d74606e2f785dd7db aaf9876a6ea48b829ae893007c3422c445e895d5 dd46ac6b990a69309f5df1be3eea86dfa8a1ac12 d9d987f6ae5d57c05b388a5b5fec47fc675de2bb 63e08c3833e48185a11b6c92d0967443758df887 e7655628e421ea18fc809fc15e04e816d05650c1 32ca954d1ec3abd66568ac3c3e9a4a1c71be7442 9e571918018c8a315dd2c3639ed4600a15d1c1a1 68158cd9c5c4c4ba6a96ea42342deb9849e4c01f c55234874b87ba86e8e839c9fc81db1f038b8dfc e1953dd74508530e8fe367c5d3eb7098abc45b26 6edd1fe5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [20:85:8a:d0:c6:b1:1b:89:03:bf:09:2e:87:c4:cb:e3:70:47:31:0b] modulus: 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 public exponent: 10001 ] 2022-05-24 11:56:01.498 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-24 11:56:01.499 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-24 11:56:01.501 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-05-24 11:56:01.501 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-24 11:56:01.502 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-05-24 11:56:01.502 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-24 11:56:01.503 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-24 11:56:01.503 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-24 11:56:01.503 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-24 11:56:01.504 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-24 11:56:01.508 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-24 11:56:01.509 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-24 11:56:01.509 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-24 11:56:01.509 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-24 11:56:01.667 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-24 11:56:01.668 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-24 11:56:01.668 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-24 11:56:01.669 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-24 11:56:01.671 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-24 11:56:01.671 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-24 11:56:01.671 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 11:56:01.672 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-24 11:56:01.672 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-24 11:56:01.673 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 11:56:01.673 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-24 11:56:01.673 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-24 11:56:01.674 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 11:56:01.674 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-24 11:56:01.674 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-24 11:56:01.675 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-24 11:56:01.677 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 33744373258804818365874138739854443926114133558 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue May 24 10:35:36 UTC 2022 Final Date: Sun May 23 10:35:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [8a:14:39:e5:44:2c:29:a6:37:bc:a2:25:4f:d5:e6:44:c5:e8:40:c1] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6e662df8400026cc55f1ca37240f40b0566c8dca 7925a4db19bdc6083f61e7b5664b5cd676fe8838 c705a16d2d6553c65c82d46746f20854d01200d8 da71f9dba67a00015c42c5813a93aa70308a6261 ce3cc8ba044d52e0a859e72e7e4caa7473ac6ca6 c2d20422cf2f67bb4645a8586d5787082106f55d e129fdfbad1e4e2ea957c807509f81373cf4f52b 433545685e68d6a93406753b275ce2c9ac604ec5 7dfc69372b7dbc8f0922331d74606e2f785dd7db aaf9876a6ea48b829ae893007c3422c445e895d5 dd46ac6b990a69309f5df1be3eea86dfa8a1ac12 d9d987f6ae5d57c05b388a5b5fec47fc675de2bb 63e08c3833e48185a11b6c92d0967443758df887 e7655628e421ea18fc809fc15e04e816d05650c1 32ca954d1ec3abd66568ac3c3e9a4a1c71be7442 9e571918018c8a315dd2c3639ed4600a15d1c1a1 68158cd9c5c4c4ba6a96ea42342deb9849e4c01f c55234874b87ba86e8e839c9fc81db1f038b8dfc e1953dd74508530e8fe367c5d3eb7098abc45b26 6edd1fe5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ef:b5:e1:5f:e2:49:60:b2:1f:b3:f2:86:3b:c0:4c:6e:cd:00:d2:16] modulus: bfadbb21acb49e0179fb1a5ffcc6ef97abad76e31c56dc6a313fe579330bb77f1e91bbfeed961cac09074ae871e000a5d2b4ebdeee2208e7200d6201277f115e738b0b292619f46161d196b461e1ed0ca5907bc9f7d4c1065be00ecb461468d55671f3210d11de402e0f9e3a8f79864dd8420b0b9c4ebdaf0b916e65b7237dbf171f8aa4941f4c0a71cc0058fbc951804f110f4ff7e39f71557f8baa5a1fa59759ba71d6467e33e21b10c3dfcb546c34401f398fe74a774bc75c8ac7b0a755133fcbbdecb0a097a1cab418ae0bc677af966218d193408e5a76730fe77d1300604b3fc2cd49ec19871842ea20fad54c96fd9be0b41451a54852d022550b0b2439 public exponent: 10001 ] 2022-05-24 11:56:46.091 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-24 11:56:46.092 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-24 11:56:46.093 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-05-24 11:56:46.093 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-24 11:56:46.094 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-05-24 11:56:46.094 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-24 11:56:46.094 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-24 11:56:46.094 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-24 11:56:46.094 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-24 11:56:46.095 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-24 11:56:46.098 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-24 11:56:46.098 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-24 11:56:46.098 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-24 11:56:46.098 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-24 11:56:46.219 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-24 11:56:46.220 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-24 11:56:46.221 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-24 11:56:46.221 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-24 11:56:46.222 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-24 11:56:46.223 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-24 11:56:46.223 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 11:56:46.223 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-24 11:56:46.223 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-24 11:56:46.224 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 11:56:46.224 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-24 11:56:46.224 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-24 11:56:46.225 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 11:56:46.225 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-24 11:56:46.225 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-24 11:56:46.226 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-24 11:56:46.229 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 33744373258804818365874138739854443926114133558 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue May 24 10:35:36 UTC 2022 Final Date: Sun May 23 10:35:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [8a:14:39:e5:44:2c:29:a6:37:bc:a2:25:4f:d5:e6:44:c5:e8:40:c1] modulus: ccc94d477905043f135f0b4d42f8c01793039834cc2dfef71e3c11039702c4842e3c6226e191aac2118d32f74f3b8b077c946bca5857ee2ed674088961f5e83b6ff02e3d5ee204dc62e23226b8ff333b1fbc7f74614040ecadf3b93330d0432f8b7597143091c082bb4f329aca525c7b763244ae171df5c00373397483edd11a97f9bcffded76b5e2d5f631efeda9267473a5b75d781e524fb7c9e40faf1639e0eff0102f390d4dfbb803ecaa14b5c258988ce13c96bca8a3297944ab96101de047ee103d326c49f83a2086be73a4e3f7cb69db9c8d30c012d1de106ca953dbb4b829533397d70cddd17bad78a6a85dfd5c90321b384eefbe8cb8c8f2399b7f9c9b718903c6637bae4261cfc8b84927fb1f5ae394076db9c3419b02a1cf3921ce5979e1937e2b037c0a1262512dd4d59928e0c9b442c4b12f34cb78f4421694137f86c0c64fdec85da5df350b6aface880f75fcd2ee18e9a6fefc6a1f6a58a62cdb0d63d0a67ea6bd2eabad1c9a525461433a1e973571c9b0c460beaa1785e0d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6e662df8400026cc55f1ca37240f40b0566c8dca 7925a4db19bdc6083f61e7b5664b5cd676fe8838 c705a16d2d6553c65c82d46746f20854d01200d8 da71f9dba67a00015c42c5813a93aa70308a6261 ce3cc8ba044d52e0a859e72e7e4caa7473ac6ca6 c2d20422cf2f67bb4645a8586d5787082106f55d e129fdfbad1e4e2ea957c807509f81373cf4f52b 433545685e68d6a93406753b275ce2c9ac604ec5 7dfc69372b7dbc8f0922331d74606e2f785dd7db aaf9876a6ea48b829ae893007c3422c445e895d5 dd46ac6b990a69309f5df1be3eea86dfa8a1ac12 d9d987f6ae5d57c05b388a5b5fec47fc675de2bb 63e08c3833e48185a11b6c92d0967443758df887 e7655628e421ea18fc809fc15e04e816d05650c1 32ca954d1ec3abd66568ac3c3e9a4a1c71be7442 9e571918018c8a315dd2c3639ed4600a15d1c1a1 68158cd9c5c4c4ba6a96ea42342deb9849e4c01f c55234874b87ba86e8e839c9fc81db1f038b8dfc e1953dd74508530e8fe367c5d3eb7098abc45b26 6edd1fe5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [57:64:f8:e6:28:57:0b:50:6b:6c:1f:b4:67:4e:6e:03:21:90:2e:be] modulus: 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 public exponent: 10001 ] 2022-05-24 11:57:23.290 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-24 11:57:23.292 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-24 11:57:23.293 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-05-24 11:57:23.294 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-24 11:57:23.295 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-05-24 11:57:23.296 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-24 11:57:23.297 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-24 11:57:23.297 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-24 11:57:23.297 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-24 11:57:23.298 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-24 11:57:23.301 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-24 11:57:23.301 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-24 11:57:23.302 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-24 11:57:23.302 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-24 11:57:23.455 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-24 11:57:23.456 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-24 11:57:23.456 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-24 11:57:23.457 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-24 11:57:23.458 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-24 11:57:23.459 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-24 11:57:23.460 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 11:57:23.460 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-24 11:57:23.460 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-24 11:57:23.461 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 11:57:23.461 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-24 11:57:23.461 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-24 11:57:23.462 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 11:57:23.462 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-24 11:57:23.462 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-24 11:57:23.462 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-24 11:57:23.469 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 33744373258804818365874138739854443926114133558 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue May 24 10:35:36 UTC 2022 Final Date: Sun May 23 10:35:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [8a:14:39:e5:44:2c:29:a6:37:bc:a2:25:4f:d5:e6:44:c5:e8:40:c1] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6e662df8400026cc55f1ca37240f40b0566c8dca 7925a4db19bdc6083f61e7b5664b5cd676fe8838 c705a16d2d6553c65c82d46746f20854d01200d8 da71f9dba67a00015c42c5813a93aa70308a6261 ce3cc8ba044d52e0a859e72e7e4caa7473ac6ca6 c2d20422cf2f67bb4645a8586d5787082106f55d e129fdfbad1e4e2ea957c807509f81373cf4f52b 433545685e68d6a93406753b275ce2c9ac604ec5 7dfc69372b7dbc8f0922331d74606e2f785dd7db aaf9876a6ea48b829ae893007c3422c445e895d5 dd46ac6b990a69309f5df1be3eea86dfa8a1ac12 d9d987f6ae5d57c05b388a5b5fec47fc675de2bb 63e08c3833e48185a11b6c92d0967443758df887 e7655628e421ea18fc809fc15e04e816d05650c1 32ca954d1ec3abd66568ac3c3e9a4a1c71be7442 9e571918018c8a315dd2c3639ed4600a15d1c1a1 68158cd9c5c4c4ba6a96ea42342deb9849e4c01f c55234874b87ba86e8e839c9fc81db1f038b8dfc e1953dd74508530e8fe367c5d3eb7098abc45b26 6edd1fe5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [50:a2:4d:3e:6e:61:88:58:75:25:d9:21:93:2a:c0:ba:86:02:60:12] modulus: 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 public exponent: 10001 ] 2022-05-24 11:59:16.948 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-24 11:59:16.951 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-24 11:59:16.952 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-24 11:59:16.953 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-24 11:59:16.954 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-24 11:59:16.954 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-24 11:59:16.954 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-24 11:59:16.955 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-24 11:59:16.955 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-24 11:59:16.955 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-24 11:59:16.961 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-24 11:59:16.962 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-24 11:59:16.962 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-24 11:59:16.962 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-24 11:59:17.125 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-24 11:59:17.126 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-24 11:59:17.126 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-24 11:59:17.126 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-24 11:59:17.128 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-24 11:59:17.128 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-24 11:59:17.128 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 11:59:17.129 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-24 11:59:17.129 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-24 11:59:17.129 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 11:59:17.130 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-24 11:59:17.130 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-24 11:59:17.131 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 11:59:17.131 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-24 11:59:17.131 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-24 11:59:17.132 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-24 11:59:17.136 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 33744373258804818365874138739854443926114133558 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue May 24 10:35:36 UTC 2022 Final Date: Sun May 23 10:35:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [8a:14:39:e5:44:2c:29:a6:37:bc:a2:25:4f:d5:e6:44:c5:e8:40:c1] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6e662df8400026cc55f1ca37240f40b0566c8dca 7925a4db19bdc6083f61e7b5664b5cd676fe8838 c705a16d2d6553c65c82d46746f20854d01200d8 da71f9dba67a00015c42c5813a93aa70308a6261 ce3cc8ba044d52e0a859e72e7e4caa7473ac6ca6 c2d20422cf2f67bb4645a8586d5787082106f55d e129fdfbad1e4e2ea957c807509f81373cf4f52b 433545685e68d6a93406753b275ce2c9ac604ec5 7dfc69372b7dbc8f0922331d74606e2f785dd7db aaf9876a6ea48b829ae893007c3422c445e895d5 dd46ac6b990a69309f5df1be3eea86dfa8a1ac12 d9d987f6ae5d57c05b388a5b5fec47fc675de2bb 63e08c3833e48185a11b6c92d0967443758df887 e7655628e421ea18fc809fc15e04e816d05650c1 32ca954d1ec3abd66568ac3c3e9a4a1c71be7442 9e571918018c8a315dd2c3639ed4600a15d1c1a1 68158cd9c5c4c4ba6a96ea42342deb9849e4c01f c55234874b87ba86e8e839c9fc81db1f038b8dfc e1953dd74508530e8fe367c5d3eb7098abc45b26 6edd1fe5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f5:d6:16:99:82:08:c1:40:bb:00:64:3d:11:84:30:85:4d:c7:c2:d7] modulus: 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 public exponent: 10001 ] 2022-05-24 12:01:30.316 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-24 12:01:30.317 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-24 12:01:30.318 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-05-24 12:01:30.319 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-24 12:01:30.319 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-05-24 12:01:30.319 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-24 12:01:30.320 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-24 12:01:30.320 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-24 12:01:30.320 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-24 12:01:30.320 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-24 12:01:30.324 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-24 12:01:30.324 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-24 12:01:30.325 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-24 12:01:30.325 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-24 12:01:30.486 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-24 12:01:30.487 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-24 12:01:30.488 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-24 12:01:30.488 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-24 12:01:30.489 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-24 12:01:30.490 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-24 12:01:30.490 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 12:01:30.490 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-24 12:01:30.491 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-24 12:01:30.491 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 12:01:30.492 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-24 12:01:30.492 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-24 12:01:30.493 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 12:01:30.493 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-24 12:01:30.493 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-24 12:01:30.494 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-24 12:01:30.496 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 33744373258804818365874138739854443926114133558 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue May 24 10:35:36 UTC 2022 Final Date: Sun May 23 10:35:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [8a:14:39:e5:44:2c:29:a6:37:bc:a2:25:4f:d5:e6:44:c5:e8:40:c1] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6e662df8400026cc55f1ca37240f40b0566c8dca 7925a4db19bdc6083f61e7b5664b5cd676fe8838 c705a16d2d6553c65c82d46746f20854d01200d8 da71f9dba67a00015c42c5813a93aa70308a6261 ce3cc8ba044d52e0a859e72e7e4caa7473ac6ca6 c2d20422cf2f67bb4645a8586d5787082106f55d e129fdfbad1e4e2ea957c807509f81373cf4f52b 433545685e68d6a93406753b275ce2c9ac604ec5 7dfc69372b7dbc8f0922331d74606e2f785dd7db aaf9876a6ea48b829ae893007c3422c445e895d5 dd46ac6b990a69309f5df1be3eea86dfa8a1ac12 d9d987f6ae5d57c05b388a5b5fec47fc675de2bb 63e08c3833e48185a11b6c92d0967443758df887 e7655628e421ea18fc809fc15e04e816d05650c1 32ca954d1ec3abd66568ac3c3e9a4a1c71be7442 9e571918018c8a315dd2c3639ed4600a15d1c1a1 68158cd9c5c4c4ba6a96ea42342deb9849e4c01f c55234874b87ba86e8e839c9fc81db1f038b8dfc e1953dd74508530e8fe367c5d3eb7098abc45b26 6edd1fe5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [77:c1:df:73:67:b3:ad:b0:e0:89:40:35:46:86:fe:01:15:bb:de:c9] modulus: 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 public exponent: 10001 ] 2022-05-24 12:01:43.282 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-24 12:01:43.283 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-24 12:01:43.285 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-05-24 12:01:43.285 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-24 12:01:43.285 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-05-24 12:01:43.286 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-24 12:01:43.286 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-24 12:01:43.286 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-24 12:01:43.286 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-24 12:01:43.286 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-24 12:01:43.290 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-24 12:01:43.290 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-24 12:01:43.290 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-24 12:01:43.290 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-24 12:01:43.446 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-24 12:01:43.447 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-24 12:01:43.447 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-24 12:01:43.447 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-24 12:01:43.449 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-24 12:01:43.449 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-24 12:01:43.449 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 12:01:43.449 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-24 12:01:43.449 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-24 12:01:43.450 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 12:01:43.450 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-24 12:01:43.451 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-24 12:01:43.451 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 12:01:43.451 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-24 12:01:43.451 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-24 12:01:43.452 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-24 12:01:43.455 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 33744373258804818365874138739854443926114133558 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue May 24 10:35:36 UTC 2022 Final Date: Sun May 23 10:35:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [8a:14:39:e5:44:2c:29:a6:37:bc:a2:25:4f:d5:e6:44:c5:e8:40:c1] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6e662df8400026cc55f1ca37240f40b0566c8dca 7925a4db19bdc6083f61e7b5664b5cd676fe8838 c705a16d2d6553c65c82d46746f20854d01200d8 da71f9dba67a00015c42c5813a93aa70308a6261 ce3cc8ba044d52e0a859e72e7e4caa7473ac6ca6 c2d20422cf2f67bb4645a8586d5787082106f55d e129fdfbad1e4e2ea957c807509f81373cf4f52b 433545685e68d6a93406753b275ce2c9ac604ec5 7dfc69372b7dbc8f0922331d74606e2f785dd7db aaf9876a6ea48b829ae893007c3422c445e895d5 dd46ac6b990a69309f5df1be3eea86dfa8a1ac12 d9d987f6ae5d57c05b388a5b5fec47fc675de2bb 63e08c3833e48185a11b6c92d0967443758df887 e7655628e421ea18fc809fc15e04e816d05650c1 32ca954d1ec3abd66568ac3c3e9a4a1c71be7442 9e571918018c8a315dd2c3639ed4600a15d1c1a1 68158cd9c5c4c4ba6a96ea42342deb9849e4c01f c55234874b87ba86e8e839c9fc81db1f038b8dfc e1953dd74508530e8fe367c5d3eb7098abc45b26 6edd1fe5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [97:42:60:f5:77:df:88:69:e9:c6:1c:27:bd:80:03:6e:e8:5d:d5:be] modulus: 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 public exponent: 10001 ] 2022-05-24 12:03:03.900 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-24 12:03:03.901 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-24 12:03:03.903 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-24 12:03:03.903 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-24 12:03:03.904 [32m INFO[m [35m1[m [nio-8443-exec-1] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-24 12:03:03.904 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-24 12:03:03.904 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-24 12:03:03.904 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-24 12:03:03.904 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-24 12:03:03.905 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-24 12:03:03.908 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-24 12:03:03.908 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-24 12:03:03.908 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-24 12:03:03.909 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-24 12:03:04.066 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-24 12:03:04.068 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-24 12:03:04.068 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-24 12:03:04.071 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-24 12:03:04.072 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-24 12:03:04.073 [32m INFO[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-24 12:03:04.073 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 12:03:04.073 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-24 12:03:04.073 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-24 12:03:04.074 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 12:03:04.074 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-24 12:03:04.074 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-24 12:03:04.075 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 12:03:04.075 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-24 12:03:04.076 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-24 12:03:04.076 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-24 12:03:04.079 [32mDEBUG[m [35m1[m [nio-8443-exec-1] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 33744373258804818365874138739854443926114133558 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue May 24 10:35:36 UTC 2022 Final Date: Sun May 23 10:35:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [8a:14:39:e5:44:2c:29:a6:37:bc:a2:25:4f:d5:e6:44:c5:e8:40:c1] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6e662df8400026cc55f1ca37240f40b0566c8dca 7925a4db19bdc6083f61e7b5664b5cd676fe8838 c705a16d2d6553c65c82d46746f20854d01200d8 da71f9dba67a00015c42c5813a93aa70308a6261 ce3cc8ba044d52e0a859e72e7e4caa7473ac6ca6 c2d20422cf2f67bb4645a8586d5787082106f55d e129fdfbad1e4e2ea957c807509f81373cf4f52b 433545685e68d6a93406753b275ce2c9ac604ec5 7dfc69372b7dbc8f0922331d74606e2f785dd7db aaf9876a6ea48b829ae893007c3422c445e895d5 dd46ac6b990a69309f5df1be3eea86dfa8a1ac12 d9d987f6ae5d57c05b388a5b5fec47fc675de2bb 63e08c3833e48185a11b6c92d0967443758df887 e7655628e421ea18fc809fc15e04e816d05650c1 32ca954d1ec3abd66568ac3c3e9a4a1c71be7442 9e571918018c8a315dd2c3639ed4600a15d1c1a1 68158cd9c5c4c4ba6a96ea42342deb9849e4c01f c55234874b87ba86e8e839c9fc81db1f038b8dfc e1953dd74508530e8fe367c5d3eb7098abc45b26 6edd1fe5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [fa:04:81:2e:25:b0:ab:6e:9b:3a:7a:d1:89:5d:83:e7:09:15:0e:04] modulus: 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 public exponent: 10001 ] 2022-05-24 12:07:46.762 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-05-24 12:07:46.764 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-05-24 12:07:46.767 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-24 12:07:46.768 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-24 12:07:46.768 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-24 12:07:46.769 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-05-24 12:07:46.770 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-05-24 12:07:46.771 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-05-24 12:07:46.772 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-05-24 12:07:46.772 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-05-24 12:07:46.781 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-05-24 12:07:46.782 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-24 12:07:46.782 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-05-24 12:07:46.783 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-24 12:07:46.950 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-05-24 12:07:46.951 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-05-24 12:07:46.951 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-05-24 12:07:46.952 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-05-24 12:07:46.953 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-05-24 12:07:46.954 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-05-24 12:07:46.954 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 12:07:46.954 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-24 12:07:46.954 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-24 12:07:46.954 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 12:07:46.955 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-24 12:07:46.955 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-24 12:07:46.955 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-24 12:07:46.955 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-05-24 12:07:46.955 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-05-24 12:07:46.956 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-24 12:07:46.959 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 33744373258804818365874138739854443926114133558 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue May 24 10:35:36 UTC 2022 Final Date: Sun May 23 10:35:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [8a:14:39:e5:44:2c:29:a6:37:bc:a2:25:4f:d5:e6:44:c5:e8:40:c1] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6e662df8400026cc55f1ca37240f40b0566c8dca 7925a4db19bdc6083f61e7b5664b5cd676fe8838 c705a16d2d6553c65c82d46746f20854d01200d8 da71f9dba67a00015c42c5813a93aa70308a6261 ce3cc8ba044d52e0a859e72e7e4caa7473ac6ca6 c2d20422cf2f67bb4645a8586d5787082106f55d e129fdfbad1e4e2ea957c807509f81373cf4f52b 433545685e68d6a93406753b275ce2c9ac604ec5 7dfc69372b7dbc8f0922331d74606e2f785dd7db aaf9876a6ea48b829ae893007c3422c445e895d5 dd46ac6b990a69309f5df1be3eea86dfa8a1ac12 d9d987f6ae5d57c05b388a5b5fec47fc675de2bb 63e08c3833e48185a11b6c92d0967443758df887 e7655628e421ea18fc809fc15e04e816d05650c1 32ca954d1ec3abd66568ac3c3e9a4a1c71be7442 9e571918018c8a315dd2c3639ed4600a15d1c1a1 68158cd9c5c4c4ba6a96ea42342deb9849e4c01f c55234874b87ba86e8e839c9fc81db1f038b8dfc e1953dd74508530e8fe367c5d3eb7098abc45b26 6edd1fe5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b2:83:a0:ca:7f:c3:f4:2d:58:ff:ac:82:e6:17:11:c8:80:da:b5:21] modulus: b3580f4ea968b230651b0f078c2766a01fe329a5b6802c8858bd5a14bc4663bba8510050442a6c93628a7d84e17baec68e623bc03739664aadd2e236b004b0398cdb5b5cad25452e67c10a184db85f1b0347bb4f950c9b2cb22b504a43e357c54f3667ee8e1515304843ca435fea555d88e08d5ec8b20572224f949ffdfd053569d94b812a914c6098c5e292c7478976f3ddb2d163b86e051f1d0a6930e770abdef30eb820f51015a50623d1463af379a084895b7350777f96decabbc527e4df003d35acf5abf26316573dab63846f7b61c3759a47e7dd5fbc7ef0eab7ebc8d738e223d32e8244c325ebc204a3a5d6551e397fb26155996c61713e212ede7ef3 public exponent: 10001 ]