2022-06-02 09:54:46,084 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-06-02 09:54:47,040 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-06-02 09:54:47.788  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Jun 02, 2022 9:54:49 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jun 02, 2022 9:54:49 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jun 02, 2022 9:54:49 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jun 02, 2022 9:54:49 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-06-02 09:54:50.353 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-06-02 09:54:50.648  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-06-02 09:54:50.822  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-06-02 09:54:51.484 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-06-02 09:54:51.487 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-06-02 09:54:51.488 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-06-02 09:54:51.492 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-06-02 09:54:51.532 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) 2022-06-02 09:54:51.535 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-06-02 09:54:51.652 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-06-02 09:54:52.256 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jun 02, 2022 9:54:52 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-06-02 09:54:53.154  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 7.865 seconds (JVM running for 9.647) Jun 02, 2022 9:55:16 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-06-02 09:56:26.580  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-02 09:56:26.592 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-02 09:56:26.639 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-06-02 09:56:26.644 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-02 09:56:26.665  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-06-02 09:56:26.668  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-02 09:56:26.670  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-02 09:56:26.672 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-02 09:56:26.673 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-02 09:56:26.677 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-02 09:56:26.685 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-02 09:56:26.689 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-02 09:56:26.736 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-02 09:56:26.748 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-02 09:56:26.749 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-02 09:56:26.754 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 09:56:27.384  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-02 09:56:27.387  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-02 09:56:27.387 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-02 09:56:27.389 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 09:56:27.399  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-02 09:56:27.401  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-02 09:56:27.402 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 09:56:27.403 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-02 09:56:27.404 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-02 09:56:27.416 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 09:56:27.417 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-02 09:56:27.417 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-02 09:56:27.424 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 09:56:27.424 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-02 09:56:27.425 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-02 09:56:27.427 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-02 09:56:27.459 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 350172686299757987743244145922220597110434439842 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 02 09:52:40 UTC 2022 Final Date: Tue Jun 01 09:52:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d1:2c:b9:09:aa:e1:26:e0:0d:b2:c8:7a:d4:1e:93:3f:01:69:d9:f3] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8ce01dd47cb6e1555dbc699fd6953b2c1adbfa2e c2192409df035b24ee07c39baf730f35ec160641 9353d6115cb67fa42d671c03447ad5c66cfa2bcb eec21cb1105ee223a3fc37f7d52c4a5a9b689550 c5c41c7b01c3451bbcd993e8786dd8a6c85ef42c 7d2805b803a58101ee957fef84f45ed8623da051 761082c66338326b29781fe045f6c861b3f43150 66d69cbba4912d6f13f42e186f503f18812f64ad 46494e6ed861d222911d9b92037f68aa34109b77 00d1bc7256b7f88778c8c910b50aae97da71145a b71074ff679e75a9f1b5527138a8b2ccea38bf6a 986470f744bc3fdd66865437908207da9750edb3 be2350466659d5fb23b233d0bc761532b04dc717 0a6fc9242ba859f2578e38b8a0b0aa25e58a76df 11fd38d3d62911c069536ce4e1f477c9340492d8 022749a63d61a68f4dbdf6b42c4d2b70ece5ce3a 868f74a475655fd8bc8a825c4a0ecd1298e1afdb 8c01aec590a4b616cfcd479d61283041a088cd3a d09d904cbf2593271e4f1a9ec67b80de58091dc5 282f8a61 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4f:3c:5b:6f:52:dc:a1:14:c3:6a:1c:cf:1d:4d:a7:34:99:37:7d:75] modulus: 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 public exponent: 10001 ] 2022-06-02 11:41:16.214  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-02 11:41:16.218 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-02 11:41:16.222 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-02 11:41:16.224 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-02 11:41:16.225  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-02 11:41:16.226  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-02 11:41:16.226  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-02 11:41:16.227 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-02 11:41:16.228 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-02 11:41:16.228 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-02 11:41:16.237 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-02 11:41:16.239 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-02 11:41:16.239 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-02 11:41:16.240 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 11:41:16.427  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-02 11:41:16.428  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-02 11:41:16.429 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-02 11:41:16.429 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 11:41:16.432  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-02 11:41:16.433  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-02 11:41:16.433 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 11:41:16.434 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-02 11:41:16.434 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-02 11:41:16.436 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 11:41:16.436 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-02 11:41:16.437 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-02 11:41:16.438 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 11:41:16.438 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-02 11:41:16.439 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-02 11:41:16.440 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-02 11:41:16.447 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 350172686299757987743244145922220597110434439842 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 02 09:52:40 UTC 2022 Final Date: Tue Jun 01 09:52:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d1:2c:b9:09:aa:e1:26:e0:0d:b2:c8:7a:d4:1e:93:3f:01:69:d9:f3] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8ce01dd47cb6e1555dbc699fd6953b2c1adbfa2e c2192409df035b24ee07c39baf730f35ec160641 9353d6115cb67fa42d671c03447ad5c66cfa2bcb eec21cb1105ee223a3fc37f7d52c4a5a9b689550 c5c41c7b01c3451bbcd993e8786dd8a6c85ef42c 7d2805b803a58101ee957fef84f45ed8623da051 761082c66338326b29781fe045f6c861b3f43150 66d69cbba4912d6f13f42e186f503f18812f64ad 46494e6ed861d222911d9b92037f68aa34109b77 00d1bc7256b7f88778c8c910b50aae97da71145a b71074ff679e75a9f1b5527138a8b2ccea38bf6a 986470f744bc3fdd66865437908207da9750edb3 be2350466659d5fb23b233d0bc761532b04dc717 0a6fc9242ba859f2578e38b8a0b0aa25e58a76df 11fd38d3d62911c069536ce4e1f477c9340492d8 022749a63d61a68f4dbdf6b42c4d2b70ece5ce3a 868f74a475655fd8bc8a825c4a0ecd1298e1afdb 8c01aec590a4b616cfcd479d61283041a088cd3a d09d904cbf2593271e4f1a9ec67b80de58091dc5 282f8a61 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [de:2f:83:ce:8c:14:05:1b:1d:e2:71:3b:07:9f:c1:54:8f:e8:6b:56] modulus: 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 public exponent: 10001 ] 2022-06-02 11:44:13.139  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-02 11:44:13.141 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-02 11:44:13.143 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-02 11:44:13.144 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-02 11:44:13.145  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-02 11:44:13.146  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-02 11:44:13.148  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-02 11:44:13.149 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-02 11:44:13.149 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-02 11:44:13.150 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-02 11:44:13.157 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-02 11:44:13.158 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-02 11:44:13.158 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-02 11:44:13.159 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 11:44:13.291  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-02 11:44:13.293  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-02 11:44:13.293 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-02 11:44:13.294 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 11:44:13.297  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-02 11:44:13.298  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-02 11:44:13.299 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 11:44:13.299 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-02 11:44:13.300 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-02 11:44:13.301 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 11:44:13.301 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-02 11:44:13.302 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-02 11:44:13.303 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 11:44:13.304 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-02 11:44:13.304 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-02 11:44:13.306 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-02 11:44:13.310 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 350172686299757987743244145922220597110434439842 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 02 09:52:40 UTC 2022 Final Date: Tue Jun 01 09:52:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d1:2c:b9:09:aa:e1:26:e0:0d:b2:c8:7a:d4:1e:93:3f:01:69:d9:f3] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8ce01dd47cb6e1555dbc699fd6953b2c1adbfa2e c2192409df035b24ee07c39baf730f35ec160641 9353d6115cb67fa42d671c03447ad5c66cfa2bcb eec21cb1105ee223a3fc37f7d52c4a5a9b689550 c5c41c7b01c3451bbcd993e8786dd8a6c85ef42c 7d2805b803a58101ee957fef84f45ed8623da051 761082c66338326b29781fe045f6c861b3f43150 66d69cbba4912d6f13f42e186f503f18812f64ad 46494e6ed861d222911d9b92037f68aa34109b77 00d1bc7256b7f88778c8c910b50aae97da71145a b71074ff679e75a9f1b5527138a8b2ccea38bf6a 986470f744bc3fdd66865437908207da9750edb3 be2350466659d5fb23b233d0bc761532b04dc717 0a6fc9242ba859f2578e38b8a0b0aa25e58a76df 11fd38d3d62911c069536ce4e1f477c9340492d8 022749a63d61a68f4dbdf6b42c4d2b70ece5ce3a 868f74a475655fd8bc8a825c4a0ecd1298e1afdb 8c01aec590a4b616cfcd479d61283041a088cd3a d09d904cbf2593271e4f1a9ec67b80de58091dc5 282f8a61 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6d:f1:5b:8b:91:49:f8:0d:b6:ff:c3:75:b8:71:50:13:90:f0:ca:25] modulus: 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 public exponent: 10001 ] 2022-06-02 11:45:31.552  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-02 11:45:31.553 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-02 11:45:31.555 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-02 11:45:31.556 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-02 11:45:31.556  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-02 11:45:31.557  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-02 11:45:31.558  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-02 11:45:31.559 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-02 11:45:31.559 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-02 11:45:31.560 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-02 11:45:31.565 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-02 11:45:31.566 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-02 11:45:31.566 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-02 11:45:31.566 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 11:45:31.729  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-02 11:45:31.730  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-02 11:45:31.731 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-02 11:45:31.731 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 11:45:31.735  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-02 11:45:31.735  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-02 11:45:31.736 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 11:45:31.737 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-02 11:45:31.737 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-02 11:45:31.738 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 11:45:31.739 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-02 11:45:31.739 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-02 11:45:31.741 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 11:45:31.741 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-02 11:45:31.742 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-02 11:45:31.743 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-02 11:45:31.750 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 350172686299757987743244145922220597110434439842 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 02 09:52:40 UTC 2022 Final Date: Tue Jun 01 09:52:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d1:2c:b9:09:aa:e1:26:e0:0d:b2:c8:7a:d4:1e:93:3f:01:69:d9:f3] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8ce01dd47cb6e1555dbc699fd6953b2c1adbfa2e c2192409df035b24ee07c39baf730f35ec160641 9353d6115cb67fa42d671c03447ad5c66cfa2bcb eec21cb1105ee223a3fc37f7d52c4a5a9b689550 c5c41c7b01c3451bbcd993e8786dd8a6c85ef42c 7d2805b803a58101ee957fef84f45ed8623da051 761082c66338326b29781fe045f6c861b3f43150 66d69cbba4912d6f13f42e186f503f18812f64ad 46494e6ed861d222911d9b92037f68aa34109b77 00d1bc7256b7f88778c8c910b50aae97da71145a b71074ff679e75a9f1b5527138a8b2ccea38bf6a 986470f744bc3fdd66865437908207da9750edb3 be2350466659d5fb23b233d0bc761532b04dc717 0a6fc9242ba859f2578e38b8a0b0aa25e58a76df 11fd38d3d62911c069536ce4e1f477c9340492d8 022749a63d61a68f4dbdf6b42c4d2b70ece5ce3a 868f74a475655fd8bc8a825c4a0ecd1298e1afdb 8c01aec590a4b616cfcd479d61283041a088cd3a d09d904cbf2593271e4f1a9ec67b80de58091dc5 282f8a61 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [81:71:c3:76:a6:d7:12:5b:d9:70:d8:80:1a:a3:27:92:82:19:09:eb] modulus: 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 public exponent: 10001 ] 2022-06-02 11:47:20.175  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-02 11:47:20.177 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-02 11:47:20.179 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-02 11:47:20.181 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-02 11:47:20.181  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-02 11:47:20.182  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-02 11:47:20.183  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-02 11:47:20.184 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-02 11:47:20.184 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-02 11:47:20.185 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-02 11:47:20.193 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-02 11:47:20.194 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-02 11:47:20.194 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-02 11:47:20.195 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 11:47:20.339  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-02 11:47:20.340  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-02 11:47:20.340 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-02 11:47:20.340 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 11:47:20.342  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-02 11:47:20.343  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-02 11:47:20.344 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 11:47:20.345 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-02 11:47:20.345 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-02 11:47:20.346 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 11:47:20.346 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-02 11:47:20.347 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-02 11:47:20.347 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 11:47:20.348 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-02 11:47:20.348 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-02 11:47:20.349 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-02 11:47:20.352 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 350172686299757987743244145922220597110434439842 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 02 09:52:40 UTC 2022 Final Date: Tue Jun 01 09:52:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d1:2c:b9:09:aa:e1:26:e0:0d:b2:c8:7a:d4:1e:93:3f:01:69:d9:f3] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8ce01dd47cb6e1555dbc699fd6953b2c1adbfa2e c2192409df035b24ee07c39baf730f35ec160641 9353d6115cb67fa42d671c03447ad5c66cfa2bcb eec21cb1105ee223a3fc37f7d52c4a5a9b689550 c5c41c7b01c3451bbcd993e8786dd8a6c85ef42c 7d2805b803a58101ee957fef84f45ed8623da051 761082c66338326b29781fe045f6c861b3f43150 66d69cbba4912d6f13f42e186f503f18812f64ad 46494e6ed861d222911d9b92037f68aa34109b77 00d1bc7256b7f88778c8c910b50aae97da71145a b71074ff679e75a9f1b5527138a8b2ccea38bf6a 986470f744bc3fdd66865437908207da9750edb3 be2350466659d5fb23b233d0bc761532b04dc717 0a6fc9242ba859f2578e38b8a0b0aa25e58a76df 11fd38d3d62911c069536ce4e1f477c9340492d8 022749a63d61a68f4dbdf6b42c4d2b70ece5ce3a 868f74a475655fd8bc8a825c4a0ecd1298e1afdb 8c01aec590a4b616cfcd479d61283041a088cd3a d09d904cbf2593271e4f1a9ec67b80de58091dc5 282f8a61 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [31:89:95:e8:64:ab:0f:7f:3e:86:3c:d4:77:88:7b:b2:08:bc:c8:38] modulus: e52d226247b37b49dc37b33da8963854aba325296305008d015de85965db3dcd06d2ab3a466fddbfe353848823a0636cec02ae472fef9e305e97a151d8bcef9e8ec3879aa16e2b685f358a76d668ae0478813c34bdf8fd6135da61864e8471097b453f3588f7aa45d017d6a2afce7b899c6d2c012d0ec236d9a3247fac4cecbfdbf6bffa77062e256b3c90cff4049997e6aea1ef4f37f8a36768d2a7b878a0dba902ec5eb9d536d42f6dd75e70023fdd60ed4476fdf5b99cf60d1fb97a700aaabb9ce3174883ab6572e62710a9599eea00779e4b5d9912949881182bd4075e4739cfff9c9950a7e2be832502bf270c288d1bc48f66fe4ae36adc1f2e10d5b221 public exponent: 10001 ] 2022-06-02 11:49:46.471  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-02 11:49:46.474 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-02 11:49:46.479 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-02 11:49:46.480 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-02 11:49:46.480  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-02 11:49:46.481  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-02 11:49:46.481  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-02 11:49:46.482 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-02 11:49:46.483 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-02 11:49:46.483 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-02 11:49:46.492 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-02 11:49:46.493 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-02 11:49:46.494 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-02 11:49:46.494 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 11:49:46.621  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-02 11:49:46.622  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-02 11:49:46.622 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-02 11:49:46.623 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 11:49:46.624  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-02 11:49:46.624  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-02 11:49:46.625 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 11:49:46.625 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-02 11:49:46.626 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-02 11:49:46.627 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 11:49:46.627 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-02 11:49:46.627 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-02 11:49:46.628 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 11:49:46.629 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-02 11:49:46.629 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-02 11:49:46.630 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-02 11:49:46.636 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 350172686299757987743244145922220597110434439842 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 02 09:52:40 UTC 2022 Final Date: Tue Jun 01 09:52:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d1:2c:b9:09:aa:e1:26:e0:0d:b2:c8:7a:d4:1e:93:3f:01:69:d9:f3] modulus: ad0871b2b5bf594a8885fa6dd541c6a64a1c14e988fd1f1d445c5d718cb696048e5e556b5e8f15485c9a0875d4b691352dab2194b684894c5326a0871e2622f9ca348ef7490e45cdbfa1e0aac6d06c084599c3c7e2d87b0ba1bfc51512697e08e1ac21956b828ae1e6babf4e05db2071e944679f8977418f9c0ac10205353eccb363149e50b235309a1d1c3644428035503887f1234c5a270f29615f552110ea390c77c1a550e41b7c30fd33ce5134334e01d94f825f0300e69eab6401d04bf8a018b3532e65ce9dd44f7e216733e1c70399b7fde45134914ecc780d39a068bf9da36ecd23fb461bce39317ccb4a5f1441e7750b96da85b33f48545e1a612ca8a2c5691eba8f3ae229925cfb096db6f7c42b1fb1df63e7b3004f6f0b5e9402e66a99859abf1cd4be944b13be0de5ae55143311733685ce220e78de21be132fb9b7e8cec7ee66044dfd8bc1fb102cbd4a2d932fc596b6ce1528d80976b901cbd2eb4108a0438bf97c3165af7413eb35b6d4a17c2c471ed8ee0d44538bb494de87 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8ce01dd47cb6e1555dbc699fd6953b2c1adbfa2e c2192409df035b24ee07c39baf730f35ec160641 9353d6115cb67fa42d671c03447ad5c66cfa2bcb eec21cb1105ee223a3fc37f7d52c4a5a9b689550 c5c41c7b01c3451bbcd993e8786dd8a6c85ef42c 7d2805b803a58101ee957fef84f45ed8623da051 761082c66338326b29781fe045f6c861b3f43150 66d69cbba4912d6f13f42e186f503f18812f64ad 46494e6ed861d222911d9b92037f68aa34109b77 00d1bc7256b7f88778c8c910b50aae97da71145a b71074ff679e75a9f1b5527138a8b2ccea38bf6a 986470f744bc3fdd66865437908207da9750edb3 be2350466659d5fb23b233d0bc761532b04dc717 0a6fc9242ba859f2578e38b8a0b0aa25e58a76df 11fd38d3d62911c069536ce4e1f477c9340492d8 022749a63d61a68f4dbdf6b42c4d2b70ece5ce3a 868f74a475655fd8bc8a825c4a0ecd1298e1afdb 8c01aec590a4b616cfcd479d61283041a088cd3a d09d904cbf2593271e4f1a9ec67b80de58091dc5 282f8a61 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [db:26:8b:25:70:b4:af:a7:84:1f:ee:fa:6c:1c:3b:d8:61:b8:97:4b] modulus: bd8603ca836253bb4c4d8ba422b7ea8bdf06b0f8084b5fa3dd1b12d2b0db94d8999bceff3d66a5a049f8cd8c0f1c58cc19fab224bce0382744198c1d5f65592278682323a4612cdc96ef8e48270af73f1e22ae7ea8595f8bc0219c6360979d3dcee99e714a134b82f2ad0055dea10e64e7fd9fa03e4ae7683ac21714f5f07f6ac208ae8612d892bb8849f132166a420ee696ad9432e6b9a7dcd095e43c52792d1d661bbe95dd0e2a16553e80c7b469d17d450212b1d69e1a442afce6e2f874e77a653a94a975217c19699aadaa2eaa1938151a78b45b9f0e38c1113c22af0386800d8d0097263fa827828b7978f6271b4494de7f96a7d608527d9070463fd9a3 public exponent: 10001 ] 2022-06-02 11:54:07.267  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-02 11:54:07.269 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-02 11:54:07.272 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-02 11:54:07.273 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-02 11:54:07.274  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-02 11:54:07.275  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-02 11:54:07.275  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-02 11:54:07.276 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-02 11:54:07.276 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-02 11:54:07.277 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-02 11:54:07.285 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-02 11:54:07.286 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-02 11:54:07.286 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-02 11:54:07.286 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 11:54:07.436  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-02 11:54:07.436  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-02 11:54:07.437 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-02 11:54:07.437 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 11:54:07.438  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-02 11:54:07.439  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-02 11:54:07.439 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 11:54:07.439 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-02 11:54:07.440 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-02 11:54:07.440 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 11:54:07.441 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-02 11:54:07.442 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-02 11:54:07.442 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 11:54:07.443 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-02 11:54:07.443 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-02 11:54:07.444 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-02 11:54:07.448 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 350172686299757987743244145922220597110434439842 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 02 09:52:40 UTC 2022 Final Date: Tue Jun 01 09:52:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d1:2c:b9:09:aa:e1:26:e0:0d:b2:c8:7a:d4:1e:93:3f:01:69:d9:f3] modulus: ad0871b2b5bf594a8885fa6dd541c6a64a1c14e988fd1f1d445c5d718cb696048e5e556b5e8f15485c9a0875d4b691352dab2194b684894c5326a0871e2622f9ca348ef7490e45cdbfa1e0aac6d06c084599c3c7e2d87b0ba1bfc51512697e08e1ac21956b828ae1e6babf4e05db2071e944679f8977418f9c0ac10205353eccb363149e50b235309a1d1c3644428035503887f1234c5a270f29615f552110ea390c77c1a550e41b7c30fd33ce5134334e01d94f825f0300e69eab6401d04bf8a018b3532e65ce9dd44f7e216733e1c70399b7fde45134914ecc780d39a068bf9da36ecd23fb461bce39317ccb4a5f1441e7750b96da85b33f48545e1a612ca8a2c5691eba8f3ae229925cfb096db6f7c42b1fb1df63e7b3004f6f0b5e9402e66a99859abf1cd4be944b13be0de5ae55143311733685ce220e78de21be132fb9b7e8cec7ee66044dfd8bc1fb102cbd4a2d932fc596b6ce1528d80976b901cbd2eb4108a0438bf97c3165af7413eb35b6d4a17c2c471ed8ee0d44538bb494de87 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8ce01dd47cb6e1555dbc699fd6953b2c1adbfa2e c2192409df035b24ee07c39baf730f35ec160641 9353d6115cb67fa42d671c03447ad5c66cfa2bcb eec21cb1105ee223a3fc37f7d52c4a5a9b689550 c5c41c7b01c3451bbcd993e8786dd8a6c85ef42c 7d2805b803a58101ee957fef84f45ed8623da051 761082c66338326b29781fe045f6c861b3f43150 66d69cbba4912d6f13f42e186f503f18812f64ad 46494e6ed861d222911d9b92037f68aa34109b77 00d1bc7256b7f88778c8c910b50aae97da71145a b71074ff679e75a9f1b5527138a8b2ccea38bf6a 986470f744bc3fdd66865437908207da9750edb3 be2350466659d5fb23b233d0bc761532b04dc717 0a6fc9242ba859f2578e38b8a0b0aa25e58a76df 11fd38d3d62911c069536ce4e1f477c9340492d8 022749a63d61a68f4dbdf6b42c4d2b70ece5ce3a 868f74a475655fd8bc8a825c4a0ecd1298e1afdb 8c01aec590a4b616cfcd479d61283041a088cd3a d09d904cbf2593271e4f1a9ec67b80de58091dc5 282f8a61 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [75:83:56:ac:dd:5f:a6:1b:01:4a:5e:4e:6a:33:dc:6b:1e:d4:23:17] modulus: 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 public exponent: 10001 ] 2022-06-02 11:57:58.202  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-02 11:57:58.203 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-02 11:57:58.205 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-02 11:57:58.206 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-02 11:57:58.206  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-02 11:57:58.206  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-02 11:57:58.207  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-02 11:57:58.207 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-02 11:57:58.207 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-02 11:57:58.208 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-02 11:57:58.212 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-02 11:57:58.213 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-02 11:57:58.213 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-02 11:57:58.213 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 11:57:58.332  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-02 11:57:58.333  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-02 11:57:58.333 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-02 11:57:58.333 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 11:57:58.334  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-02 11:57:58.338  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-02 11:57:58.338 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 11:57:58.338 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-02 11:57:58.338 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-02 11:57:58.339 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 11:57:58.339 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-02 11:57:58.340 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-02 11:57:58.340 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 11:57:58.340 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-02 11:57:58.341 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-02 11:57:58.341 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-02 11:57:58.350 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 350172686299757987743244145922220597110434439842 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 02 09:52:40 UTC 2022 Final Date: Tue Jun 01 09:52:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d1:2c:b9:09:aa:e1:26:e0:0d:b2:c8:7a:d4:1e:93:3f:01:69:d9:f3] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8ce01dd47cb6e1555dbc699fd6953b2c1adbfa2e c2192409df035b24ee07c39baf730f35ec160641 9353d6115cb67fa42d671c03447ad5c66cfa2bcb eec21cb1105ee223a3fc37f7d52c4a5a9b689550 c5c41c7b01c3451bbcd993e8786dd8a6c85ef42c 7d2805b803a58101ee957fef84f45ed8623da051 761082c66338326b29781fe045f6c861b3f43150 66d69cbba4912d6f13f42e186f503f18812f64ad 46494e6ed861d222911d9b92037f68aa34109b77 00d1bc7256b7f88778c8c910b50aae97da71145a b71074ff679e75a9f1b5527138a8b2ccea38bf6a 986470f744bc3fdd66865437908207da9750edb3 be2350466659d5fb23b233d0bc761532b04dc717 0a6fc9242ba859f2578e38b8a0b0aa25e58a76df 11fd38d3d62911c069536ce4e1f477c9340492d8 022749a63d61a68f4dbdf6b42c4d2b70ece5ce3a 868f74a475655fd8bc8a825c4a0ecd1298e1afdb 8c01aec590a4b616cfcd479d61283041a088cd3a d09d904cbf2593271e4f1a9ec67b80de58091dc5 282f8a61 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c8:fe:7e:54:9a:74:23:7a:23:01:03:c9:5b:61:bf:06:fa:18:28:f4] modulus: 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 public exponent: 10001 ] 2022-06-02 12:02:10.001  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-02 12:02:10.004 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-02 12:02:10.007 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-02 12:02:10.009 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-02 12:02:10.009  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-02 12:02:10.011  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-02 12:02:10.011  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-02 12:02:10.012 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-02 12:02:10.013 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-02 12:02:10.014 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-02 12:02:10.023 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-02 12:02:10.025 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-02 12:02:10.025 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-02 12:02:10.026 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 12:02:10.221  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-02 12:02:10.222  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-02 12:02:10.223 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-02 12:02:10.223 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 12:02:10.224  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-02 12:02:10.225  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-02 12:02:10.225 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 12:02:10.226 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-02 12:02:10.226 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-02 12:02:10.227 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 12:02:10.227 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-02 12:02:10.227 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-02 12:02:10.228 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 12:02:10.228 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-02 12:02:10.228 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-02 12:02:10.229 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-02 12:02:10.233 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 350172686299757987743244145922220597110434439842 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 02 09:52:40 UTC 2022 Final Date: Tue Jun 01 09:52:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d1:2c:b9:09:aa:e1:26:e0:0d:b2:c8:7a:d4:1e:93:3f:01:69:d9:f3] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8ce01dd47cb6e1555dbc699fd6953b2c1adbfa2e c2192409df035b24ee07c39baf730f35ec160641 9353d6115cb67fa42d671c03447ad5c66cfa2bcb eec21cb1105ee223a3fc37f7d52c4a5a9b689550 c5c41c7b01c3451bbcd993e8786dd8a6c85ef42c 7d2805b803a58101ee957fef84f45ed8623da051 761082c66338326b29781fe045f6c861b3f43150 66d69cbba4912d6f13f42e186f503f18812f64ad 46494e6ed861d222911d9b92037f68aa34109b77 00d1bc7256b7f88778c8c910b50aae97da71145a b71074ff679e75a9f1b5527138a8b2ccea38bf6a 986470f744bc3fdd66865437908207da9750edb3 be2350466659d5fb23b233d0bc761532b04dc717 0a6fc9242ba859f2578e38b8a0b0aa25e58a76df 11fd38d3d62911c069536ce4e1f477c9340492d8 022749a63d61a68f4dbdf6b42c4d2b70ece5ce3a 868f74a475655fd8bc8a825c4a0ecd1298e1afdb 8c01aec590a4b616cfcd479d61283041a088cd3a d09d904cbf2593271e4f1a9ec67b80de58091dc5 282f8a61 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [91:01:9f:9b:e0:42:9e:21:28:82:04:dd:26:45:4b:e6:21:f0:75:39] modulus: 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 public exponent: 10001 ] 2022-06-02 12:05:46.670  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-02 12:05:46.672 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-02 12:05:46.673 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-02 12:05:46.674 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-02 12:05:46.674  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-02 12:05:46.675  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-02 12:05:46.675  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-02 12:05:46.675 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-02 12:05:46.676 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-02 12:05:46.676 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-02 12:05:46.681 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-02 12:05:46.682 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-02 12:05:46.682 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-02 12:05:46.682 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 12:05:46.835  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-02 12:05:46.835  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-02 12:05:46.836 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-02 12:05:46.836 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 12:05:46.837  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-02 12:05:46.837  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-02 12:05:46.838 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 12:05:46.838 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-02 12:05:46.838 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-02 12:05:46.840 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 12:05:46.840 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-02 12:05:46.841 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-02 12:05:46.841 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 12:05:46.842 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-02 12:05:46.842 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-02 12:05:46.843 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-02 12:05:46.846 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 350172686299757987743244145922220597110434439842 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 02 09:52:40 UTC 2022 Final Date: Tue Jun 01 09:52:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d1:2c:b9:09:aa:e1:26:e0:0d:b2:c8:7a:d4:1e:93:3f:01:69:d9:f3] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8ce01dd47cb6e1555dbc699fd6953b2c1adbfa2e c2192409df035b24ee07c39baf730f35ec160641 9353d6115cb67fa42d671c03447ad5c66cfa2bcb eec21cb1105ee223a3fc37f7d52c4a5a9b689550 c5c41c7b01c3451bbcd993e8786dd8a6c85ef42c 7d2805b803a58101ee957fef84f45ed8623da051 761082c66338326b29781fe045f6c861b3f43150 66d69cbba4912d6f13f42e186f503f18812f64ad 46494e6ed861d222911d9b92037f68aa34109b77 00d1bc7256b7f88778c8c910b50aae97da71145a b71074ff679e75a9f1b5527138a8b2ccea38bf6a 986470f744bc3fdd66865437908207da9750edb3 be2350466659d5fb23b233d0bc761532b04dc717 0a6fc9242ba859f2578e38b8a0b0aa25e58a76df 11fd38d3d62911c069536ce4e1f477c9340492d8 022749a63d61a68f4dbdf6b42c4d2b70ece5ce3a 868f74a475655fd8bc8a825c4a0ecd1298e1afdb 8c01aec590a4b616cfcd479d61283041a088cd3a d09d904cbf2593271e4f1a9ec67b80de58091dc5 282f8a61 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c1:ef:b4:db:02:e6:7c:91:cf:f2:ab:63:ab:72:a8:2c:cb:4f:e4:fa] modulus: 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 public exponent: 10001 ] 2022-06-02 12:06:35.200  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-02 12:06:35.202 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-02 12:06:35.204 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-02 12:06:35.205 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-02 12:06:35.205  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-02 12:06:35.206  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-02 12:06:35.206  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-02 12:06:35.207 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-02 12:06:35.207 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-02 12:06:35.208 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-02 12:06:35.213 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-02 12:06:35.214 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-02 12:06:35.214 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-02 12:06:35.215 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 12:06:35.340  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-02 12:06:35.340  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-02 12:06:35.340 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-02 12:06:35.341 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 12:06:35.342  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-02 12:06:35.343  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-02 12:06:35.343 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 12:06:35.343 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-02 12:06:35.344 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-02 12:06:35.344 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 12:06:35.345 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-02 12:06:35.345 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-02 12:06:35.346 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 12:06:35.346 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-02 12:06:35.346 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-02 12:06:35.347 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-02 12:06:35.351 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 350172686299757987743244145922220597110434439842 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 02 09:52:40 UTC 2022 Final Date: Tue Jun 01 09:52:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d1:2c:b9:09:aa:e1:26:e0:0d:b2:c8:7a:d4:1e:93:3f:01:69:d9:f3] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8ce01dd47cb6e1555dbc699fd6953b2c1adbfa2e c2192409df035b24ee07c39baf730f35ec160641 9353d6115cb67fa42d671c03447ad5c66cfa2bcb eec21cb1105ee223a3fc37f7d52c4a5a9b689550 c5c41c7b01c3451bbcd993e8786dd8a6c85ef42c 7d2805b803a58101ee957fef84f45ed8623da051 761082c66338326b29781fe045f6c861b3f43150 66d69cbba4912d6f13f42e186f503f18812f64ad 46494e6ed861d222911d9b92037f68aa34109b77 00d1bc7256b7f88778c8c910b50aae97da71145a b71074ff679e75a9f1b5527138a8b2ccea38bf6a 986470f744bc3fdd66865437908207da9750edb3 be2350466659d5fb23b233d0bc761532b04dc717 0a6fc9242ba859f2578e38b8a0b0aa25e58a76df 11fd38d3d62911c069536ce4e1f477c9340492d8 022749a63d61a68f4dbdf6b42c4d2b70ece5ce3a 868f74a475655fd8bc8a825c4a0ecd1298e1afdb 8c01aec590a4b616cfcd479d61283041a088cd3a d09d904cbf2593271e4f1a9ec67b80de58091dc5 282f8a61 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2f:58:85:be:c1:e9:18:c4:e9:13:fd:ed:01:7e:ce:53:98:26:c0:1c] modulus: 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 public exponent: 10001 ] 2022-06-02 12:11:18.405  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-02 12:11:18.407 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-02 12:11:18.410 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-02 12:11:18.411 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-02 12:11:18.412  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-02 12:11:18.412  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-02 12:11:18.413  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-02 12:11:18.413 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-02 12:11:18.413 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-02 12:11:18.414 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-02 12:11:18.419 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-02 12:11:18.420 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-02 12:11:18.420 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-02 12:11:18.420 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 12:11:18.589  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-02 12:11:18.590  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-02 12:11:18.590 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-02 12:11:18.590 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 12:11:18.592  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-02 12:11:18.592  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-02 12:11:18.593 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 12:11:18.593 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-02 12:11:18.593 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-02 12:11:18.595 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 12:11:18.595 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-02 12:11:18.595 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-02 12:11:18.596 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 12:11:18.596 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-02 12:11:18.597 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-02 12:11:18.598 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-02 12:11:18.602 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 350172686299757987743244145922220597110434439842 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 02 09:52:40 UTC 2022 Final Date: Tue Jun 01 09:52:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d1:2c:b9:09:aa:e1:26:e0:0d:b2:c8:7a:d4:1e:93:3f:01:69:d9:f3] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8ce01dd47cb6e1555dbc699fd6953b2c1adbfa2e c2192409df035b24ee07c39baf730f35ec160641 9353d6115cb67fa42d671c03447ad5c66cfa2bcb eec21cb1105ee223a3fc37f7d52c4a5a9b689550 c5c41c7b01c3451bbcd993e8786dd8a6c85ef42c 7d2805b803a58101ee957fef84f45ed8623da051 761082c66338326b29781fe045f6c861b3f43150 66d69cbba4912d6f13f42e186f503f18812f64ad 46494e6ed861d222911d9b92037f68aa34109b77 00d1bc7256b7f88778c8c910b50aae97da71145a b71074ff679e75a9f1b5527138a8b2ccea38bf6a 986470f744bc3fdd66865437908207da9750edb3 be2350466659d5fb23b233d0bc761532b04dc717 0a6fc9242ba859f2578e38b8a0b0aa25e58a76df 11fd38d3d62911c069536ce4e1f477c9340492d8 022749a63d61a68f4dbdf6b42c4d2b70ece5ce3a 868f74a475655fd8bc8a825c4a0ecd1298e1afdb 8c01aec590a4b616cfcd479d61283041a088cd3a d09d904cbf2593271e4f1a9ec67b80de58091dc5 282f8a61 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0d:48:32:b5:ab:0b:bd:4a:ea:1a:2f:f1:ba:a0:b4:8c:68:6e:de:e4] modulus: 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 public exponent: 10001 ] 2022-06-02 12:12:54.697  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-02 12:12:54.699 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-02 12:12:54.700 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-02 12:12:54.701 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-02 12:12:54.702  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-02 12:12:54.702  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-02 12:12:54.703  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-02 12:12:54.703 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-02 12:12:54.704 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-02 12:12:54.704 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-02 12:12:54.709 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-02 12:12:54.710 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-02 12:12:54.710 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-02 12:12:54.711 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 12:12:54.864  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-02 12:12:54.865  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-02 12:12:54.865 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-02 12:12:54.865 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 12:12:54.867  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-02 12:12:54.867  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-02 12:12:54.867 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 12:12:54.868 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-02 12:12:54.868 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-02 12:12:54.868 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 12:12:54.869 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-02 12:12:54.869 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-02 12:12:54.870 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 12:12:54.870 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-02 12:12:54.870 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-02 12:12:54.871 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-02 12:12:54.874 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 350172686299757987743244145922220597110434439842 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 02 09:52:40 UTC 2022 Final Date: Tue Jun 01 09:52:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d1:2c:b9:09:aa:e1:26:e0:0d:b2:c8:7a:d4:1e:93:3f:01:69:d9:f3] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8ce01dd47cb6e1555dbc699fd6953b2c1adbfa2e c2192409df035b24ee07c39baf730f35ec160641 9353d6115cb67fa42d671c03447ad5c66cfa2bcb eec21cb1105ee223a3fc37f7d52c4a5a9b689550 c5c41c7b01c3451bbcd993e8786dd8a6c85ef42c 7d2805b803a58101ee957fef84f45ed8623da051 761082c66338326b29781fe045f6c861b3f43150 66d69cbba4912d6f13f42e186f503f18812f64ad 46494e6ed861d222911d9b92037f68aa34109b77 00d1bc7256b7f88778c8c910b50aae97da71145a b71074ff679e75a9f1b5527138a8b2ccea38bf6a 986470f744bc3fdd66865437908207da9750edb3 be2350466659d5fb23b233d0bc761532b04dc717 0a6fc9242ba859f2578e38b8a0b0aa25e58a76df 11fd38d3d62911c069536ce4e1f477c9340492d8 022749a63d61a68f4dbdf6b42c4d2b70ece5ce3a 868f74a475655fd8bc8a825c4a0ecd1298e1afdb 8c01aec590a4b616cfcd479d61283041a088cd3a d09d904cbf2593271e4f1a9ec67b80de58091dc5 282f8a61 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d6:f8:4d:30:50:a1:41:6f:60:ed:a1:92:25:ed:8d:c0:c1:60:33:d3] modulus: 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 public exponent: 10001 ] 2022-06-02 12:13:15.613  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-02 12:13:15.616 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-02 12:13:15.617 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-02 12:13:15.618 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-02 12:13:15.619  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-02 12:13:15.620  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-02 12:13:15.620  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-02 12:13:15.621 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-02 12:13:15.621 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-02 12:13:15.622 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-02 12:13:15.628 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-02 12:13:15.629 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-02 12:13:15.630 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-02 12:13:15.630 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 12:13:15.754  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-02 12:13:15.755  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-02 12:13:15.756 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-02 12:13:15.756 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 12:13:15.762  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-02 12:13:15.763  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-02 12:13:15.763 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 12:13:15.764 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-02 12:13:15.764 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-02 12:13:15.765 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 12:13:15.765 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-02 12:13:15.765 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-02 12:13:15.766 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 12:13:15.767 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-02 12:13:15.767 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-02 12:13:15.768 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-02 12:13:15.772 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 350172686299757987743244145922220597110434439842 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 02 09:52:40 UTC 2022 Final Date: Tue Jun 01 09:52:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d1:2c:b9:09:aa:e1:26:e0:0d:b2:c8:7a:d4:1e:93:3f:01:69:d9:f3] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8ce01dd47cb6e1555dbc699fd6953b2c1adbfa2e c2192409df035b24ee07c39baf730f35ec160641 9353d6115cb67fa42d671c03447ad5c66cfa2bcb eec21cb1105ee223a3fc37f7d52c4a5a9b689550 c5c41c7b01c3451bbcd993e8786dd8a6c85ef42c 7d2805b803a58101ee957fef84f45ed8623da051 761082c66338326b29781fe045f6c861b3f43150 66d69cbba4912d6f13f42e186f503f18812f64ad 46494e6ed861d222911d9b92037f68aa34109b77 00d1bc7256b7f88778c8c910b50aae97da71145a b71074ff679e75a9f1b5527138a8b2ccea38bf6a 986470f744bc3fdd66865437908207da9750edb3 be2350466659d5fb23b233d0bc761532b04dc717 0a6fc9242ba859f2578e38b8a0b0aa25e58a76df 11fd38d3d62911c069536ce4e1f477c9340492d8 022749a63d61a68f4dbdf6b42c4d2b70ece5ce3a 868f74a475655fd8bc8a825c4a0ecd1298e1afdb 8c01aec590a4b616cfcd479d61283041a088cd3a d09d904cbf2593271e4f1a9ec67b80de58091dc5 282f8a61 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [67:00:2f:f0:1e:b4:a6:7b:62:e7:63:31:6a:a4:e8:0b:a6:3f:89:06] modulus: c658256553889cc40754bd887e75b12ceec817e45c9e2cd6af79cbc3c90f9e69149aeda313abe39fd8022ae7f8273347af970da68028c908c94600b8a69a10f35e284c6e3ca4537ef3b19b2f01ba94588c76fd53c683413200c71c6c67716e85072db7130bbdad271a8b71a0e0c78ec732c7e747a9a8055c0317d9889ea726ae31a6545889ec76de4b0a24928b3d78eef2e0506fec169cfcb231ab8f8006421313cf0a5a4ed418ebe2cfc22f3d932aa0fdc54a4a92eb05fd5626e08a0b7e7159657fb18818ff867fd49c8d839f709c82310c63b4ce2b577e0c29922ea4ed20ab661e5bc9dbd66137a634f02732942bb3a0d4128b2afe1f0adec423b990721db7 public exponent: 10001 ] 2022-06-02 12:16:23.718  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-02 12:16:23.720 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-02 12:16:23.721 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-02 12:16:23.722 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-02 12:16:23.722  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-02 12:16:23.723  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-02 12:16:23.723  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-02 12:16:23.724 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-02 12:16:23.724 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-02 12:16:23.724 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-02 12:16:23.730 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-02 12:16:23.730 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-02 12:16:23.730 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-02 12:16:23.731 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 12:16:23.918  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-02 12:16:23.918  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-02 12:16:23.919 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-02 12:16:23.919 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 12:16:23.920  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-02 12:16:23.920  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-02 12:16:23.921 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 12:16:23.921 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-02 12:16:23.921 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-02 12:16:23.922 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 12:16:23.922 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-02 12:16:23.922 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-02 12:16:23.923 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 12:16:23.923 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-02 12:16:23.923 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-02 12:16:23.924 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-02 12:16:23.927 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 350172686299757987743244145922220597110434439842 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 02 09:52:40 UTC 2022 Final Date: Tue Jun 01 09:52:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d1:2c:b9:09:aa:e1:26:e0:0d:b2:c8:7a:d4:1e:93:3f:01:69:d9:f3] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8ce01dd47cb6e1555dbc699fd6953b2c1adbfa2e c2192409df035b24ee07c39baf730f35ec160641 9353d6115cb67fa42d671c03447ad5c66cfa2bcb eec21cb1105ee223a3fc37f7d52c4a5a9b689550 c5c41c7b01c3451bbcd993e8786dd8a6c85ef42c 7d2805b803a58101ee957fef84f45ed8623da051 761082c66338326b29781fe045f6c861b3f43150 66d69cbba4912d6f13f42e186f503f18812f64ad 46494e6ed861d222911d9b92037f68aa34109b77 00d1bc7256b7f88778c8c910b50aae97da71145a b71074ff679e75a9f1b5527138a8b2ccea38bf6a 986470f744bc3fdd66865437908207da9750edb3 be2350466659d5fb23b233d0bc761532b04dc717 0a6fc9242ba859f2578e38b8a0b0aa25e58a76df 11fd38d3d62911c069536ce4e1f477c9340492d8 022749a63d61a68f4dbdf6b42c4d2b70ece5ce3a 868f74a475655fd8bc8a825c4a0ecd1298e1afdb 8c01aec590a4b616cfcd479d61283041a088cd3a d09d904cbf2593271e4f1a9ec67b80de58091dc5 282f8a61 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8e:d1:f0:7f:33:66:1c:b5:22:35:40:e5:1a:75:e3:5d:d2:ff:84:2c] modulus: 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 public exponent: 10001 ] 2022-06-02 12:20:49.982  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-02 12:20:49.985 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-02 12:20:49.987 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-02 12:20:49.989 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-02 12:20:49.989  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-02 12:20:49.990  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-02 12:20:49.990  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-02 12:20:49.991 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-02 12:20:49.991 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-02 12:20:49.992 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-02 12:20:49.997 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-02 12:20:49.998 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-02 12:20:49.998 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-02 12:20:49.999 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 12:20:50.157  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-02 12:20:50.158  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-02 12:20:50.161 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-02 12:20:50.161 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 12:20:50.163  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-02 12:20:50.163  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-02 12:20:50.164 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 12:20:50.164 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-02 12:20:50.164 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-02 12:20:50.165 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 12:20:50.165 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-02 12:20:50.166 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-02 12:20:50.167 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 12:20:50.167 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-02 12:20:50.167 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-02 12:20:50.168 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-02 12:20:50.172 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 350172686299757987743244145922220597110434439842 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 02 09:52:40 UTC 2022 Final Date: Tue Jun 01 09:52:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d1:2c:b9:09:aa:e1:26:e0:0d:b2:c8:7a:d4:1e:93:3f:01:69:d9:f3] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8ce01dd47cb6e1555dbc699fd6953b2c1adbfa2e c2192409df035b24ee07c39baf730f35ec160641 9353d6115cb67fa42d671c03447ad5c66cfa2bcb eec21cb1105ee223a3fc37f7d52c4a5a9b689550 c5c41c7b01c3451bbcd993e8786dd8a6c85ef42c 7d2805b803a58101ee957fef84f45ed8623da051 761082c66338326b29781fe045f6c861b3f43150 66d69cbba4912d6f13f42e186f503f18812f64ad 46494e6ed861d222911d9b92037f68aa34109b77 00d1bc7256b7f88778c8c910b50aae97da71145a b71074ff679e75a9f1b5527138a8b2ccea38bf6a 986470f744bc3fdd66865437908207da9750edb3 be2350466659d5fb23b233d0bc761532b04dc717 0a6fc9242ba859f2578e38b8a0b0aa25e58a76df 11fd38d3d62911c069536ce4e1f477c9340492d8 022749a63d61a68f4dbdf6b42c4d2b70ece5ce3a 868f74a475655fd8bc8a825c4a0ecd1298e1afdb 8c01aec590a4b616cfcd479d61283041a088cd3a d09d904cbf2593271e4f1a9ec67b80de58091dc5 282f8a61 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [19:cb:83:ba:5a:db:67:6c:46:16:0d:09:42:08:d0:4e:90:1f:1c:8a] modulus: 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 public exponent: 10001 ] 2022-06-02 12:29:53.058  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-02 12:29:53.060 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-02 12:29:53.062 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-02 12:29:53.062 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-02 12:29:53.063  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-02 12:29:53.064  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-02 12:29:53.064  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-02 12:29:53.064 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-02 12:29:53.065 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-02 12:29:53.065 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-02 12:29:53.070 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-02 12:29:53.071 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-02 12:29:53.071 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-02 12:29:53.071 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 12:29:53.265  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-02 12:29:53.266  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-02 12:29:53.266 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-02 12:29:53.267 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 12:29:53.268  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-02 12:29:53.268  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-02 12:29:53.268 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 12:29:53.269 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-02 12:29:53.269 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-02 12:29:53.269 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 12:29:53.270 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-02 12:29:53.270 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-02 12:29:53.270 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 12:29:53.271 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-02 12:29:53.271 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-02 12:29:53.272 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-02 12:29:53.274 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 350172686299757987743244145922220597110434439842 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 02 09:52:40 UTC 2022 Final Date: Tue Jun 01 09:52:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d1:2c:b9:09:aa:e1:26:e0:0d:b2:c8:7a:d4:1e:93:3f:01:69:d9:f3] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8ce01dd47cb6e1555dbc699fd6953b2c1adbfa2e c2192409df035b24ee07c39baf730f35ec160641 9353d6115cb67fa42d671c03447ad5c66cfa2bcb eec21cb1105ee223a3fc37f7d52c4a5a9b689550 c5c41c7b01c3451bbcd993e8786dd8a6c85ef42c 7d2805b803a58101ee957fef84f45ed8623da051 761082c66338326b29781fe045f6c861b3f43150 66d69cbba4912d6f13f42e186f503f18812f64ad 46494e6ed861d222911d9b92037f68aa34109b77 00d1bc7256b7f88778c8c910b50aae97da71145a b71074ff679e75a9f1b5527138a8b2ccea38bf6a 986470f744bc3fdd66865437908207da9750edb3 be2350466659d5fb23b233d0bc761532b04dc717 0a6fc9242ba859f2578e38b8a0b0aa25e58a76df 11fd38d3d62911c069536ce4e1f477c9340492d8 022749a63d61a68f4dbdf6b42c4d2b70ece5ce3a 868f74a475655fd8bc8a825c4a0ecd1298e1afdb 8c01aec590a4b616cfcd479d61283041a088cd3a d09d904cbf2593271e4f1a9ec67b80de58091dc5 282f8a61 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [df:b5:0d:e7:ab:57:e6:2b:92:fc:aa:ff:b0:69:3e:78:32:74:72:5b] modulus: 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 public exponent: 10001 ] 2022-06-02 12:34:15.350  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-02 12:34:15.353 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-02 12:34:15.356 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-02 12:34:15.357 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-02 12:34:15.358  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-02 12:34:15.359  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-02 12:34:15.359  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-02 12:34:15.360 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-02 12:34:15.361 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-02 12:34:15.361 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-02 12:34:15.368 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-02 12:34:15.370 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-02 12:34:15.370 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-02 12:34:15.371 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 12:34:15.518  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-02 12:34:15.518  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-02 12:34:15.519 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-02 12:34:15.519 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-02 12:34:15.520  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-02 12:34:15.521  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-02 12:34:15.521 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 12:34:15.522 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-02 12:34:15.522 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-02 12:34:15.523 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 12:34:15.523 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-02 12:34:15.523 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-02 12:34:15.528 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-02 12:34:15.528 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-02 12:34:15.528 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-02 12:34:15.529 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-02 12:34:15.532 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 350172686299757987743244145922220597110434439842 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jun 02 09:52:40 UTC 2022 Final Date: Tue Jun 01 09:52:39 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d1:2c:b9:09:aa:e1:26:e0:0d:b2:c8:7a:d4:1e:93:3f:01:69:d9:f3] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8ce01dd47cb6e1555dbc699fd6953b2c1adbfa2e c2192409df035b24ee07c39baf730f35ec160641 9353d6115cb67fa42d671c03447ad5c66cfa2bcb eec21cb1105ee223a3fc37f7d52c4a5a9b689550 c5c41c7b01c3451bbcd993e8786dd8a6c85ef42c 7d2805b803a58101ee957fef84f45ed8623da051 761082c66338326b29781fe045f6c861b3f43150 66d69cbba4912d6f13f42e186f503f18812f64ad 46494e6ed861d222911d9b92037f68aa34109b77 00d1bc7256b7f88778c8c910b50aae97da71145a b71074ff679e75a9f1b5527138a8b2ccea38bf6a 986470f744bc3fdd66865437908207da9750edb3 be2350466659d5fb23b233d0bc761532b04dc717 0a6fc9242ba859f2578e38b8a0b0aa25e58a76df 11fd38d3d62911c069536ce4e1f477c9340492d8 022749a63d61a68f4dbdf6b42c4d2b70ece5ce3a 868f74a475655fd8bc8a825c4a0ecd1298e1afdb 8c01aec590a4b616cfcd479d61283041a088cd3a d09d904cbf2593271e4f1a9ec67b80de58091dc5 282f8a61 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [de:73:a3:03:08:7f:d5:9d:51:2d:69:3d:a8:94:b3:f2:1f:8e:a9:f7] modulus: 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 public exponent: 10001 ]