2023-02-17 15:16:17,316 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2023-02-17 15:16:18,794 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2023-02-17 15:16:19.660  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Feb 17, 2023 3:16:21 PM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Feb 17, 2023 3:16:21 PM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Feb 17, 2023 3:16:21 PM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Feb 17, 2023 3:16:21 PM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2023-02-17 15:16:22.357 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2023-02-17 15:16:22.662  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2023-02-17 15:16:22.857  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2023-02-17 15:16:23.762 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2023-02-17 15:16:23.765 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2023-02-17 15:16:23.767 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2023-02-17 15:16:23.770 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2023-02-17 15:16:23.811 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) 2023-02-17 15:16:23.814 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2023-02-17 15:16:23.945 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2023-02-17 15:16:24.616 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Feb 17, 2023 3:16:25 PM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2023-02-17 15:16:25.662  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 9.356 seconds (JVM running for 11.422) Feb 17, 2023 3:16:48 PM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2023-02-17 15:17:04.928  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-02-17 15:17:04.936 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-02-17 15:17:04.979 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2023-02-17 15:17:04.982 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-02-17 15:17:05.009  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2023-02-17 15:17:05.012  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-02-17 15:17:05.013  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-02-17 15:17:05.015 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-02-17 15:17:05.015 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-02-17 15:17:05.019 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-02-17 15:17:05.030 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-02-17 15:17:05.035 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-02-17 15:17:05.091 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-02-17 15:17:05.097 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-02-17 15:17:05.098 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-02-17 15:17:05.101 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-02-17 15:17:05.658  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-02-17 15:17:05.662  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-02-17 15:17:05.663 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-02-17 15:17:05.665 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-02-17 15:17:05.676  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-02-17 15:17:05.677  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-02-17 15:17:05.678 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-17 15:17:05.678 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-02-17 15:17:05.679 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-02-17 15:17:05.695 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-17 15:17:05.696 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-02-17 15:17:05.696 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-02-17 15:17:05.703 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-17 15:17:05.703 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-02-17 15:17:05.704 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-02-17 15:17:05.705 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-02-17 15:17:05.755 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 639353506826960770251007027919827850828048456985 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Feb 17 15:14:00 UTC 2023 Final Date: Wed Feb 16 15:13:59 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [cc:ad:57:0c:7f:47:ed:cd:22:5e:7e:d9:a6:c7:74:c2:4a:72:85:c3],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 848987cbc278642af1c9f205068bce4f6eae2b70 cf61e59f1122e011f8e1646b7fa5b7a7bb5b45e1 e69122d0c1d7e67fd7465d377821f57963f22518 6dad844f902011e7b590141753d05b3f9a3eb9b3 63030fea9a404db07d88e2a36714ee251c8628fe 515940ed899a3a5dd959eba06eb74edd41214b90 6fc9481b9523c3cb9f4188a9b4b6e313974602c9 c494d0cae7ab14af5a98a5048477ffeeaf452446 107721592109eda14d96817e2f75558259a71ab5 8439eeaa36464e046e3fad33ff126ba940344498 641389333909fe6d800b5e2781d5630c7051f961 bd334584aaed0a090de39f99b07f9ca175ada04a 75eb1a8df6d3b85cdf130aa23fdc518af9e3dd91 91d9117bc3fabdecd0b46aa39c1a9bc450eb22be 3b39d18f05c4812bd1cc4e060467aee260598c0a e84f5caaecc48b484d7de7b36a6ba984f2017e8c 4eae7d4cec67269f7c443193c76e2b3eb4ce2810 5e4b0c778a75edcb9032ddaf5d9796a488a1bb10 097c9e6066dc05795ac00e0b04271f8b53c79a3e 38490666 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c0:b5:12:3a:fa:d3:37:9d:20:19:23:0c:17:f7:e0:b3:80:52:da:74],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-02-17 21:14:29.555  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-02-17 21:14:29.558 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-02-17 21:14:29.562 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-02-17 21:14:29.563 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-02-17 21:14:29.563  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-02-17 21:14:29.564  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-02-17 21:14:29.565  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-02-17 21:14:29.565 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-02-17 21:14:29.566 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-02-17 21:14:29.566 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-02-17 21:14:29.571 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-02-17 21:14:29.573 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-02-17 21:14:29.573 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-02-17 21:14:29.573 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-02-17 21:14:29.821  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-02-17 21:14:29.822  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-02-17 21:14:29.823 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-02-17 21:14:29.824 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-02-17 21:14:29.828  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-02-17 21:14:29.829  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-02-17 21:14:29.830 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-17 21:14:29.831 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-02-17 21:14:29.831 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-02-17 21:14:29.833 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-17 21:14:29.834 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-02-17 21:14:29.834 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-02-17 21:14:29.836 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-17 21:14:29.836 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-02-17 21:14:29.837 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-02-17 21:14:29.838 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-02-17 21:14:29.844 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 639353506826960770251007027919827850828048456985 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Feb 17 15:14:00 UTC 2023 Final Date: Wed Feb 16 15:13:59 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [cc:ad:57:0c:7f:47:ed:cd:22:5e:7e:d9:a6:c7:74:c2:4a:72:85:c3],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 848987cbc278642af1c9f205068bce4f6eae2b70 cf61e59f1122e011f8e1646b7fa5b7a7bb5b45e1 e69122d0c1d7e67fd7465d377821f57963f22518 6dad844f902011e7b590141753d05b3f9a3eb9b3 63030fea9a404db07d88e2a36714ee251c8628fe 515940ed899a3a5dd959eba06eb74edd41214b90 6fc9481b9523c3cb9f4188a9b4b6e313974602c9 c494d0cae7ab14af5a98a5048477ffeeaf452446 107721592109eda14d96817e2f75558259a71ab5 8439eeaa36464e046e3fad33ff126ba940344498 641389333909fe6d800b5e2781d5630c7051f961 bd334584aaed0a090de39f99b07f9ca175ada04a 75eb1a8df6d3b85cdf130aa23fdc518af9e3dd91 91d9117bc3fabdecd0b46aa39c1a9bc450eb22be 3b39d18f05c4812bd1cc4e060467aee260598c0a e84f5caaecc48b484d7de7b36a6ba984f2017e8c 4eae7d4cec67269f7c443193c76e2b3eb4ce2810 5e4b0c778a75edcb9032ddaf5d9796a488a1bb10 097c9e6066dc05795ac00e0b04271f8b53c79a3e 38490666 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c3:88:15:d1:79:2a:e0:44:a9:5e:dd:6e:1c:9f:fa:89:8b:d6:1b:c1],[56:66:d1:a4] modulus: b04595ecbf7a75bba3e241e73835d4def3c93e2064dc0a1c9c2b5fc7fcd660782d275a47f6ef29eeb0157e44ee34295c7d511a8b7f41bdc49d5899b72a70eac7e3996ada6e801396eefb66322cc8a6634303b833d35c31a5be205dac3424954a8a2b91e5f460ef7a43ac5bae79d1b6b8517ea9a7b8c2b7bb27bdac78b688f6387cd58e140822e3c8ea1c6b3c05afc9ca33f3a8d9e34b217efa3d60d6fbfe213db2fb38ab5b1715c7534e8e5842be3abd0e23cffca4ba0bd7a9bc9581b7cb539c97631e91df2369aa1bfdebb57c58d85165ac180071cfe9e174ee0c80aa5711532df1566fd88d2bedcf65fca7154846e4667bb43a6e2cbaf3d12aa84c1c0427d5 public exponent: 10001 ] 2023-02-17 21:16:17.998  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-02-17 21:16:17.999 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-02-17 21:16:18.001 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2023-02-17 21:16:18.002 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-02-17 21:16:18.003  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2023-02-17 21:16:18.003  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-02-17 21:16:18.008  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-02-17 21:16:18.009 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-02-17 21:16:18.009 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-02-17 21:16:18.010 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-02-17 21:16:18.017 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-02-17 21:16:18.018 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-02-17 21:16:18.018 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-02-17 21:16:18.018 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-02-17 21:16:18.313  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-02-17 21:16:18.314  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-02-17 21:16:18.314 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-02-17 21:16:18.315 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-02-17 21:16:18.318  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-02-17 21:16:18.318  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-02-17 21:16:18.319 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-17 21:16:18.319 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-02-17 21:16:18.319 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-02-17 21:16:18.320 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-17 21:16:18.321 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-02-17 21:16:18.321 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-02-17 21:16:18.322 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-17 21:16:18.322 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-02-17 21:16:18.322 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-02-17 21:16:18.323 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-02-17 21:16:18.328 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 639353506826960770251007027919827850828048456985 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Feb 17 15:14:00 UTC 2023 Final Date: Wed Feb 16 15:13:59 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [cc:ad:57:0c:7f:47:ed:cd:22:5e:7e:d9:a6:c7:74:c2:4a:72:85:c3],[56:66:d1:a4] modulus: d4205ec7b0b4620730b60686ede14b363cc95014d6f52bab567a8ef3c9c5d04beaa8e9ccf2cc7eb1126463e2a4ceadc0d79a4645006f95b16644416cddc73cf3be9784be3ab50e457a819de84c7bdfaf4dd11df8e966f51bebb3379f1b4b0ff05db0969c244b29adbed8b380d37b44b001d51203e391c1780f248d637b47f3471ddd7183b754a9d52730ca536762843ee236c8b41b9b4e7ae797e26a6d4f21f6384c4fe3cf69ebe7f25c2f88fc90c1fcbe5a2e0ae531b5f996d7a22bcb1819134eebd40cd1d063e3c53433d9864f4f9e382fce1f51cfe351a0518357aeb08254ad3b01d3e3c7324d16582adcf2d33177dd558d2f68979e959ceef5451c10a3d0120f67899e665f3b11877c6f7172da3b2d253326f85551c596b0c6cfb600219fa5ad657c5fabdb17c2950941df28d5f885ed3a148c54f10e3284b372386736b57544e31ede670ca30b429b8703f545517e496f4d798e6f750211a1147e4b64744b4561e1935d20386582dd2e51be0c290bafd87e16b8cdf306f459aad18c101d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 848987cbc278642af1c9f205068bce4f6eae2b70 cf61e59f1122e011f8e1646b7fa5b7a7bb5b45e1 e69122d0c1d7e67fd7465d377821f57963f22518 6dad844f902011e7b590141753d05b3f9a3eb9b3 63030fea9a404db07d88e2a36714ee251c8628fe 515940ed899a3a5dd959eba06eb74edd41214b90 6fc9481b9523c3cb9f4188a9b4b6e313974602c9 c494d0cae7ab14af5a98a5048477ffeeaf452446 107721592109eda14d96817e2f75558259a71ab5 8439eeaa36464e046e3fad33ff126ba940344498 641389333909fe6d800b5e2781d5630c7051f961 bd334584aaed0a090de39f99b07f9ca175ada04a 75eb1a8df6d3b85cdf130aa23fdc518af9e3dd91 91d9117bc3fabdecd0b46aa39c1a9bc450eb22be 3b39d18f05c4812bd1cc4e060467aee260598c0a e84f5caaecc48b484d7de7b36a6ba984f2017e8c 4eae7d4cec67269f7c443193c76e2b3eb4ce2810 5e4b0c778a75edcb9032ddaf5d9796a488a1bb10 097c9e6066dc05795ac00e0b04271f8b53c79a3e 38490666 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [bc:b3:b4:52:49:9b:ae:2c:31:56:a0:18:01:79:a2:b5:c0:88:63:8c],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-02-17 21:18:22.442  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-02-17 21:18:22.444 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-02-17 21:18:22.445 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2023-02-17 21:18:22.446 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-02-17 21:18:22.447  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2023-02-17 21:18:22.448  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-02-17 21:18:22.449  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-02-17 21:18:22.449 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-02-17 21:18:22.450 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-02-17 21:18:22.450 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-02-17 21:18:22.455 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-02-17 21:18:22.455 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-02-17 21:18:22.456 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-02-17 21:18:22.456 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-02-17 21:18:22.630  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-02-17 21:18:22.631  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-02-17 21:18:22.632 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-02-17 21:18:22.632 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-02-17 21:18:22.634  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-02-17 21:18:22.635  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-02-17 21:18:22.636 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-17 21:18:22.636 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-02-17 21:18:22.637 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-02-17 21:18:22.638 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-17 21:18:22.638 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-02-17 21:18:22.638 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-02-17 21:18:22.639 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-17 21:18:22.640 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-02-17 21:18:22.640 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-02-17 21:18:22.641 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-02-17 21:18:22.645 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 639353506826960770251007027919827850828048456985 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Feb 17 15:14:00 UTC 2023 Final Date: Wed Feb 16 15:13:59 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [cc:ad:57:0c:7f:47:ed:cd:22:5e:7e:d9:a6:c7:74:c2:4a:72:85:c3],[56:66:d1:a4] modulus: d4205ec7b0b4620730b60686ede14b363cc95014d6f52bab567a8ef3c9c5d04beaa8e9ccf2cc7eb1126463e2a4ceadc0d79a4645006f95b16644416cddc73cf3be9784be3ab50e457a819de84c7bdfaf4dd11df8e966f51bebb3379f1b4b0ff05db0969c244b29adbed8b380d37b44b001d51203e391c1780f248d637b47f3471ddd7183b754a9d52730ca536762843ee236c8b41b9b4e7ae797e26a6d4f21f6384c4fe3cf69ebe7f25c2f88fc90c1fcbe5a2e0ae531b5f996d7a22bcb1819134eebd40cd1d063e3c53433d9864f4f9e382fce1f51cfe351a0518357aeb08254ad3b01d3e3c7324d16582adcf2d33177dd558d2f68979e959ceef5451c10a3d0120f67899e665f3b11877c6f7172da3b2d253326f85551c596b0c6cfb600219fa5ad657c5fabdb17c2950941df28d5f885ed3a148c54f10e3284b372386736b57544e31ede670ca30b429b8703f545517e496f4d798e6f750211a1147e4b64744b4561e1935d20386582dd2e51be0c290bafd87e16b8cdf306f459aad18c101d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 848987cbc278642af1c9f205068bce4f6eae2b70 cf61e59f1122e011f8e1646b7fa5b7a7bb5b45e1 e69122d0c1d7e67fd7465d377821f57963f22518 6dad844f902011e7b590141753d05b3f9a3eb9b3 63030fea9a404db07d88e2a36714ee251c8628fe 515940ed899a3a5dd959eba06eb74edd41214b90 6fc9481b9523c3cb9f4188a9b4b6e313974602c9 c494d0cae7ab14af5a98a5048477ffeeaf452446 107721592109eda14d96817e2f75558259a71ab5 8439eeaa36464e046e3fad33ff126ba940344498 641389333909fe6d800b5e2781d5630c7051f961 bd334584aaed0a090de39f99b07f9ca175ada04a 75eb1a8df6d3b85cdf130aa23fdc518af9e3dd91 91d9117bc3fabdecd0b46aa39c1a9bc450eb22be 3b39d18f05c4812bd1cc4e060467aee260598c0a e84f5caaecc48b484d7de7b36a6ba984f2017e8c 4eae7d4cec67269f7c443193c76e2b3eb4ce2810 5e4b0c778a75edcb9032ddaf5d9796a488a1bb10 097c9e6066dc05795ac00e0b04271f8b53c79a3e 38490666 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a2:5d:be:42:4d:44:d7:cb:26:df:69:22:9b:49:95:31:33:59:57:23],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-02-17 21:21:59.263  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-02-17 21:21:59.264 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-02-17 21:21:59.266 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-02-17 21:21:59.267 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-02-17 21:21:59.268  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-02-17 21:21:59.268  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-02-17 21:21:59.269  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-02-17 21:21:59.270 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-02-17 21:21:59.270 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-02-17 21:21:59.271 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-02-17 21:21:59.276 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-02-17 21:21:59.277 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-02-17 21:21:59.277 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-02-17 21:21:59.278 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-02-17 21:21:59.485  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-02-17 21:21:59.486  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-02-17 21:21:59.486 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-02-17 21:21:59.487 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-02-17 21:21:59.489  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-02-17 21:21:59.489  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-02-17 21:21:59.490 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-17 21:21:59.490 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-02-17 21:21:59.491 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-02-17 21:21:59.491 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-17 21:21:59.492 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-02-17 21:21:59.492 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-02-17 21:21:59.493 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-17 21:21:59.493 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-02-17 21:21:59.493 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-02-17 21:21:59.494 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-02-17 21:21:59.497 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 639353506826960770251007027919827850828048456985 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Feb 17 15:14:00 UTC 2023 Final Date: Wed Feb 16 15:13:59 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [cc:ad:57:0c:7f:47:ed:cd:22:5e:7e:d9:a6:c7:74:c2:4a:72:85:c3],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 848987cbc278642af1c9f205068bce4f6eae2b70 cf61e59f1122e011f8e1646b7fa5b7a7bb5b45e1 e69122d0c1d7e67fd7465d377821f57963f22518 6dad844f902011e7b590141753d05b3f9a3eb9b3 63030fea9a404db07d88e2a36714ee251c8628fe 515940ed899a3a5dd959eba06eb74edd41214b90 6fc9481b9523c3cb9f4188a9b4b6e313974602c9 c494d0cae7ab14af5a98a5048477ffeeaf452446 107721592109eda14d96817e2f75558259a71ab5 8439eeaa36464e046e3fad33ff126ba940344498 641389333909fe6d800b5e2781d5630c7051f961 bd334584aaed0a090de39f99b07f9ca175ada04a 75eb1a8df6d3b85cdf130aa23fdc518af9e3dd91 91d9117bc3fabdecd0b46aa39c1a9bc450eb22be 3b39d18f05c4812bd1cc4e060467aee260598c0a e84f5caaecc48b484d7de7b36a6ba984f2017e8c 4eae7d4cec67269f7c443193c76e2b3eb4ce2810 5e4b0c778a75edcb9032ddaf5d9796a488a1bb10 097c9e6066dc05795ac00e0b04271f8b53c79a3e 38490666 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e5:62:77:7c:85:48:11:76:c4:99:0e:41:a3:d1:f2:b6:27:88:14:c0],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-02-17 21:37:57.575  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-02-17 21:37:57.578 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-02-17 21:37:57.581 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-02-17 21:37:57.582 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-02-17 21:37:57.583  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-02-17 21:37:57.584  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-02-17 21:37:57.584  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-02-17 21:37:57.585 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-02-17 21:37:57.585 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-02-17 21:37:57.586 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-02-17 21:37:57.592 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-02-17 21:37:57.593 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-02-17 21:37:57.594 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-02-17 21:37:57.594 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-02-17 21:37:57.788  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-02-17 21:37:57.789  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-02-17 21:37:57.790 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-02-17 21:37:57.790 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-02-17 21:37:57.792  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-02-17 21:37:57.792  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-02-17 21:37:57.793 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-17 21:37:57.793 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-02-17 21:37:57.794 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-02-17 21:37:57.796 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-17 21:37:57.796 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-02-17 21:37:57.796 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-02-17 21:37:57.797 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-17 21:37:57.798 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-02-17 21:37:57.798 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-02-17 21:37:57.799 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-02-17 21:37:57.805 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 639353506826960770251007027919827850828048456985 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Feb 17 15:14:00 UTC 2023 Final Date: Wed Feb 16 15:13:59 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [cc:ad:57:0c:7f:47:ed:cd:22:5e:7e:d9:a6:c7:74:c2:4a:72:85:c3],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 848987cbc278642af1c9f205068bce4f6eae2b70 cf61e59f1122e011f8e1646b7fa5b7a7bb5b45e1 e69122d0c1d7e67fd7465d377821f57963f22518 6dad844f902011e7b590141753d05b3f9a3eb9b3 63030fea9a404db07d88e2a36714ee251c8628fe 515940ed899a3a5dd959eba06eb74edd41214b90 6fc9481b9523c3cb9f4188a9b4b6e313974602c9 c494d0cae7ab14af5a98a5048477ffeeaf452446 107721592109eda14d96817e2f75558259a71ab5 8439eeaa36464e046e3fad33ff126ba940344498 641389333909fe6d800b5e2781d5630c7051f961 bd334584aaed0a090de39f99b07f9ca175ada04a 75eb1a8df6d3b85cdf130aa23fdc518af9e3dd91 91d9117bc3fabdecd0b46aa39c1a9bc450eb22be 3b39d18f05c4812bd1cc4e060467aee260598c0a e84f5caaecc48b484d7de7b36a6ba984f2017e8c 4eae7d4cec67269f7c443193c76e2b3eb4ce2810 5e4b0c778a75edcb9032ddaf5d9796a488a1bb10 097c9e6066dc05795ac00e0b04271f8b53c79a3e 38490666 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [90:25:c7:cc:2a:d1:2b:01:8e:b8:63:18:8c:8c:a7:b9:a5:77:78:94],[56:66:d1:a4] modulus: acb11fd0d887f4554cb2461aeea315976950eb744a88fa8086f453cc61069784ac23bae61c05288d61bbbdca6be0e83876304384886a16ef64694727d04eea68c7e9b1394ebe3062b36bc4439a2e98f326350c6163880f5a52825b3e6b143396f4f301f9c783e5543d80b49251467dab5cc5c2a6a163c80eb779319c3186cb0db8af21bebab05b82e158b4ed84ddcb281dde100833c861ded37c53b70fb0704f7e07c53898376913efd5b0048cd5e673956a5743fca522af3115f3ec616eea9b35956027216b87ec8ff5fb433c47f2895b24ec03c3aa35e82d96fc0b970841e22d8dcc87c71310c7d392e396768262d18a74736ae73e70d70e0e8e591a762053 public exponent: 10001 ] 2023-02-17 21:44:49.556  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-02-17 21:44:49.558 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-02-17 21:44:49.560 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-02-17 21:44:49.560 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-02-17 21:44:49.561  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-02-17 21:44:49.561  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-02-17 21:44:49.562  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-02-17 21:44:49.562 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-02-17 21:44:49.563 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-02-17 21:44:49.564 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-02-17 21:44:49.568 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-02-17 21:44:49.569 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-02-17 21:44:49.569 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-02-17 21:44:49.569 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-02-17 21:44:49.754  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-02-17 21:44:49.755  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-02-17 21:44:49.756 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-02-17 21:44:49.757 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-02-17 21:44:49.762  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-02-17 21:44:49.763  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-02-17 21:44:49.764 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-17 21:44:49.764 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-02-17 21:44:49.765 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-02-17 21:44:49.766 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-17 21:44:49.767 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-02-17 21:44:49.767 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-02-17 21:44:49.768 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-17 21:44:49.768 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-02-17 21:44:49.769 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-02-17 21:44:49.769 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-02-17 21:44:49.773 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 639353506826960770251007027919827850828048456985 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Feb 17 15:14:00 UTC 2023 Final Date: Wed Feb 16 15:13:59 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [cc:ad:57:0c:7f:47:ed:cd:22:5e:7e:d9:a6:c7:74:c2:4a:72:85:c3],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 848987cbc278642af1c9f205068bce4f6eae2b70 cf61e59f1122e011f8e1646b7fa5b7a7bb5b45e1 e69122d0c1d7e67fd7465d377821f57963f22518 6dad844f902011e7b590141753d05b3f9a3eb9b3 63030fea9a404db07d88e2a36714ee251c8628fe 515940ed899a3a5dd959eba06eb74edd41214b90 6fc9481b9523c3cb9f4188a9b4b6e313974602c9 c494d0cae7ab14af5a98a5048477ffeeaf452446 107721592109eda14d96817e2f75558259a71ab5 8439eeaa36464e046e3fad33ff126ba940344498 641389333909fe6d800b5e2781d5630c7051f961 bd334584aaed0a090de39f99b07f9ca175ada04a 75eb1a8df6d3b85cdf130aa23fdc518af9e3dd91 91d9117bc3fabdecd0b46aa39c1a9bc450eb22be 3b39d18f05c4812bd1cc4e060467aee260598c0a e84f5caaecc48b484d7de7b36a6ba984f2017e8c 4eae7d4cec67269f7c443193c76e2b3eb4ce2810 5e4b0c778a75edcb9032ddaf5d9796a488a1bb10 097c9e6066dc05795ac00e0b04271f8b53c79a3e 38490666 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d5:25:b1:42:33:c3:29:76:2d:4a:67:16:23:d1:e8:99:f2:10:68:e5],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-02-17 22:19:53.074  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-02-17 22:19:53.078 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-02-17 22:19:53.081 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-02-17 22:19:53.082 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-02-17 22:19:53.082  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-02-17 22:19:53.083  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-02-17 22:19:53.083  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-02-17 22:19:53.084 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-02-17 22:19:53.084 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-02-17 22:19:53.085 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-02-17 22:19:53.089 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-02-17 22:19:53.090 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-02-17 22:19:53.090 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-02-17 22:19:53.091 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-02-17 22:19:53.320  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-02-17 22:19:53.322  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-02-17 22:19:53.322 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-02-17 22:19:53.322 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-02-17 22:19:53.325  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-02-17 22:19:53.325  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-02-17 22:19:53.326 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-17 22:19:53.327 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-02-17 22:19:53.327 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-02-17 22:19:53.328 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-17 22:19:53.329 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-02-17 22:19:53.329 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-02-17 22:19:53.330 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-17 22:19:53.330 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-02-17 22:19:53.330 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-02-17 22:19:53.331 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-02-17 22:19:53.336 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 639353506826960770251007027919827850828048456985 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Feb 17 15:14:00 UTC 2023 Final Date: Wed Feb 16 15:13:59 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [cc:ad:57:0c:7f:47:ed:cd:22:5e:7e:d9:a6:c7:74:c2:4a:72:85:c3],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 848987cbc278642af1c9f205068bce4f6eae2b70 cf61e59f1122e011f8e1646b7fa5b7a7bb5b45e1 e69122d0c1d7e67fd7465d377821f57963f22518 6dad844f902011e7b590141753d05b3f9a3eb9b3 63030fea9a404db07d88e2a36714ee251c8628fe 515940ed899a3a5dd959eba06eb74edd41214b90 6fc9481b9523c3cb9f4188a9b4b6e313974602c9 c494d0cae7ab14af5a98a5048477ffeeaf452446 107721592109eda14d96817e2f75558259a71ab5 8439eeaa36464e046e3fad33ff126ba940344498 641389333909fe6d800b5e2781d5630c7051f961 bd334584aaed0a090de39f99b07f9ca175ada04a 75eb1a8df6d3b85cdf130aa23fdc518af9e3dd91 91d9117bc3fabdecd0b46aa39c1a9bc450eb22be 3b39d18f05c4812bd1cc4e060467aee260598c0a e84f5caaecc48b484d7de7b36a6ba984f2017e8c 4eae7d4cec67269f7c443193c76e2b3eb4ce2810 5e4b0c778a75edcb9032ddaf5d9796a488a1bb10 097c9e6066dc05795ac00e0b04271f8b53c79a3e 38490666 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2b:fe:80:12:8e:c4:be:b5:41:3c:ef:37:40:86:ea:b2:5b:be:f9:fc],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-02-17 22:26:49.971  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-02-17 22:26:49.976 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-02-17 22:26:49.979 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-02-17 22:26:49.980 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-02-17 22:26:49.980  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-02-17 22:26:49.981  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-02-17 22:26:49.982  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-02-17 22:26:49.982 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-02-17 22:26:49.983 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-02-17 22:26:49.983 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-02-17 22:26:49.989 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-02-17 22:26:49.990 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-02-17 22:26:49.990 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-02-17 22:26:49.991 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-02-17 22:26:50.233  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-02-17 22:26:50.234  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-02-17 22:26:50.235 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-02-17 22:26:50.235 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-02-17 22:26:50.236  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-02-17 22:26:50.237  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-02-17 22:26:50.237 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-17 22:26:50.237 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-02-17 22:26:50.238 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-02-17 22:26:50.238 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-17 22:26:50.239 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-02-17 22:26:50.239 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-02-17 22:26:50.240 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-17 22:26:50.241 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-02-17 22:26:50.241 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-02-17 22:26:50.242 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-02-17 22:26:50.246 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 639353506826960770251007027919827850828048456985 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Feb 17 15:14:00 UTC 2023 Final Date: Wed Feb 16 15:13:59 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [cc:ad:57:0c:7f:47:ed:cd:22:5e:7e:d9:a6:c7:74:c2:4a:72:85:c3],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 848987cbc278642af1c9f205068bce4f6eae2b70 cf61e59f1122e011f8e1646b7fa5b7a7bb5b45e1 e69122d0c1d7e67fd7465d377821f57963f22518 6dad844f902011e7b590141753d05b3f9a3eb9b3 63030fea9a404db07d88e2a36714ee251c8628fe 515940ed899a3a5dd959eba06eb74edd41214b90 6fc9481b9523c3cb9f4188a9b4b6e313974602c9 c494d0cae7ab14af5a98a5048477ffeeaf452446 107721592109eda14d96817e2f75558259a71ab5 8439eeaa36464e046e3fad33ff126ba940344498 641389333909fe6d800b5e2781d5630c7051f961 bd334584aaed0a090de39f99b07f9ca175ada04a 75eb1a8df6d3b85cdf130aa23fdc518af9e3dd91 91d9117bc3fabdecd0b46aa39c1a9bc450eb22be 3b39d18f05c4812bd1cc4e060467aee260598c0a e84f5caaecc48b484d7de7b36a6ba984f2017e8c 4eae7d4cec67269f7c443193c76e2b3eb4ce2810 5e4b0c778a75edcb9032ddaf5d9796a488a1bb10 097c9e6066dc05795ac00e0b04271f8b53c79a3e 38490666 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f1:7e:d7:6f:72:a6:cf:4f:94:d4:6f:33:53:7f:dc:9f:e5:db:46:59],[56:66:d1:a4] modulus: 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 public exponent: 10001 ]