2022-06-03 03:10:23,826 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-06-03 03:10:24,913 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-06-03 03:10:25.611  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Jun 03, 2022 3:10:27 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jun 03, 2022 3:10:27 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jun 03, 2022 3:10:27 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jun 03, 2022 3:10:27 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-06-03 03:10:28.573 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-06-03 03:10:28.895  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-06-03 03:10:29.113  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-06-03 03:10:30.177 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-06-03 03:10:30.180 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-06-03 03:10:30.181 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-06-03 03:10:30.184 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-06-03 03:10:30.224 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-06-03 03:10:30.227 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-06-03 03:10:30.352 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-06-03 03:10:31.773 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jun 03, 2022 3:10:32 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-06-03 03:10:33.205  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 10.315 seconds (JVM running for 12.467) Jun 03, 2022 3:10:58 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-06-03 03:11:48.942  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-03 03:11:48.953 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-03 03:11:49.004 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-06-03 03:11:49.009 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-03 03:11:49.029  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-06-03 03:11:49.033  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-03 03:11:49.034  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-03 03:11:49.036 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-03 03:11:49.036 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-03 03:11:49.041 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-03 03:11:49.048 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-03 03:11:49.053 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-03 03:11:49.093 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-03 03:11:49.100 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-03 03:11:49.100 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-03 03:11:49.104 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 03:11:49.816  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-03 03:11:49.819  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-03 03:11:49.820 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-03 03:11:49.821 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 03:11:49.831  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-03 03:11:49.832  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-03 03:11:49.833 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 03:11:49.834 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-03 03:11:49.834 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-03 03:11:49.847 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 03:11:49.847 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-03 03:11:49.848 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-03 03:11:49.854 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 03:11:49.855 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-03 03:11:49.855 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-03 03:11:49.857 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-03 03:11:49.892 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 189979291887472986223011075721837157091180317605 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 03 03:08:06 UTC 2022 Final Date: Wed Jun 02 03:08:05 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:8a:d4:d4:93:f4:72:71:48:5a:8f:9b:c2:8c:88:f0:2e:13:fb:b4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a30a5a3f33dbb74e7b34dffbee9bf7b03b42155b 74d586f7ddbe2e7063651e923cacabc7ed54bd01 42676a500528e7719746843e5ba2538834624507 13a98309b96e736ae54063a27a87325909aef51a 78ed12e784b19a1db13e7d730e408ea350e622c0 aa36cbb904c2aad34aa42361821293ad794e03c3 0a67c15a381b64c99749083bc1febdc0d8292fd0 f1694091fc280fad8aad04ed2a35d464a1eeafc0 852f7f859c9121017d5e7c58b8f2e21d161b7e74 733b2ae5ce79b35e985a521024de352f5a41d96b 2de08db49a9e80beef99077675edfbab22baf61a 0d314edcbaac109fb9d83a3bfc02305f24f6380b 17d9d01ae17db666101ea6694965a1700a7d6928 eb2ece8f7c0a3d2e86f8a889f74821234b1bfea2 b41bb0f59bd0424ae07b0b51aac1caf7dedc34d4 13848f3a49eb0c431063941efea9dc9fd9dd977a f7cfebfe6c68cdb04a5ac6e9a5a5b183ac0a4180 59a851837470a6a51fafa2bba41b8caf7ef87234 8e7838ed0de219181269582dd4d79f4930d4e2bf 08b5d724 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [48:28:9f:8d:b3:5f:45:18:78:a6:c5:60:7f:c0:aa:29:f5:62:f2:50] modulus: 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 public exponent: 10001 ] 2022-06-03 05:02:35.053  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-03 05:02:35.057 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-03 05:02:35.061 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 05:02:35.062 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-03 05:02:35.063  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 05:02:35.064  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-03 05:02:35.064  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-03 05:02:35.065 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-03 05:02:35.065 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-03 05:02:35.066 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-03 05:02:35.073 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-03 05:02:35.074 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-03 05:02:35.074 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-03 05:02:35.075 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 05:02:35.274  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-03 05:02:35.275  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-03 05:02:35.276 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-03 05:02:35.276 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 05:02:35.280  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-03 05:02:35.280  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-03 05:02:35.281 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:02:35.282 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:02:35.282 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:02:35.283 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:02:35.284 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:02:35.284 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:02:35.285 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:02:35.285 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:02:35.286 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:02:35.287 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-03 05:02:35.293 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 189979291887472986223011075721837157091180317605 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 03 03:08:06 UTC 2022 Final Date: Wed Jun 02 03:08:05 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:8a:d4:d4:93:f4:72:71:48:5a:8f:9b:c2:8c:88:f0:2e:13:fb:b4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a30a5a3f33dbb74e7b34dffbee9bf7b03b42155b 74d586f7ddbe2e7063651e923cacabc7ed54bd01 42676a500528e7719746843e5ba2538834624507 13a98309b96e736ae54063a27a87325909aef51a 78ed12e784b19a1db13e7d730e408ea350e622c0 aa36cbb904c2aad34aa42361821293ad794e03c3 0a67c15a381b64c99749083bc1febdc0d8292fd0 f1694091fc280fad8aad04ed2a35d464a1eeafc0 852f7f859c9121017d5e7c58b8f2e21d161b7e74 733b2ae5ce79b35e985a521024de352f5a41d96b 2de08db49a9e80beef99077675edfbab22baf61a 0d314edcbaac109fb9d83a3bfc02305f24f6380b 17d9d01ae17db666101ea6694965a1700a7d6928 eb2ece8f7c0a3d2e86f8a889f74821234b1bfea2 b41bb0f59bd0424ae07b0b51aac1caf7dedc34d4 13848f3a49eb0c431063941efea9dc9fd9dd977a f7cfebfe6c68cdb04a5ac6e9a5a5b183ac0a4180 59a851837470a6a51fafa2bba41b8caf7ef87234 8e7838ed0de219181269582dd4d79f4930d4e2bf 08b5d724 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2c:fc:8f:44:cf:fe:e0:dd:1a:d6:33:57:51:b5:84:ee:ba:b7:b3:d9] modulus: de019ce1486097a359555ad6e6b398519593344d2d5e18f8f65028e74e50ac29c6fc843010c76fc4ab0a2e6ad6c773ad81dbdd62f220336160411fc1087478634597545c77fd3a516de3d72c347714e142a3dbfc1025bc1b8bc74c22e33fd0bb8ac91145338286964eebd9a622bd46010e798a71efff2d6c07a84be53c1434b31caba86d559c381a2762efa194bfd2d17af33c0523e38632c930055ef6f2df71e21d4da4c7b5ea58ca9f47bfcc5c1f955d7bdc052846e1f677f600198a411766015049ca5816d0346425874dc1cf52501c60009a00daab5ebbc2e9003d52270382f341d160365cd8334c90c5cba942ce47ebe8856a1d85029603650417710545 public exponent: 10001 ] 2022-06-03 05:04:37.154  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-03 05:04:37.156 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-03 05:04:37.158 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-03 05:04:37.159 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-03 05:04:37.160  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-03 05:04:37.161  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-03 05:04:37.163  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-03 05:04:37.164 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-03 05:04:37.165 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-03 05:04:37.166 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-03 05:04:37.177 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-03 05:04:37.178 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-03 05:04:37.179 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-03 05:04:37.179 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 05:04:37.330  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-03 05:04:37.332  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-03 05:04:37.333 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-03 05:04:37.334 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 05:04:37.346  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-03 05:04:37.346  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-03 05:04:37.347 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:04:37.348 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:04:37.348 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:04:37.351 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:04:37.351 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:04:37.352 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:04:37.353 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:04:37.353 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:04:37.354 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:04:37.355 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-03 05:04:37.359 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 189979291887472986223011075721837157091180317605 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 03 03:08:06 UTC 2022 Final Date: Wed Jun 02 03:08:05 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:8a:d4:d4:93:f4:72:71:48:5a:8f:9b:c2:8c:88:f0:2e:13:fb:b4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a30a5a3f33dbb74e7b34dffbee9bf7b03b42155b 74d586f7ddbe2e7063651e923cacabc7ed54bd01 42676a500528e7719746843e5ba2538834624507 13a98309b96e736ae54063a27a87325909aef51a 78ed12e784b19a1db13e7d730e408ea350e622c0 aa36cbb904c2aad34aa42361821293ad794e03c3 0a67c15a381b64c99749083bc1febdc0d8292fd0 f1694091fc280fad8aad04ed2a35d464a1eeafc0 852f7f859c9121017d5e7c58b8f2e21d161b7e74 733b2ae5ce79b35e985a521024de352f5a41d96b 2de08db49a9e80beef99077675edfbab22baf61a 0d314edcbaac109fb9d83a3bfc02305f24f6380b 17d9d01ae17db666101ea6694965a1700a7d6928 eb2ece8f7c0a3d2e86f8a889f74821234b1bfea2 b41bb0f59bd0424ae07b0b51aac1caf7dedc34d4 13848f3a49eb0c431063941efea9dc9fd9dd977a f7cfebfe6c68cdb04a5ac6e9a5a5b183ac0a4180 59a851837470a6a51fafa2bba41b8caf7ef87234 8e7838ed0de219181269582dd4d79f4930d4e2bf 08b5d724 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [48:26:a6:90:f0:93:f7:1a:14:e9:15:9a:ee:07:f9:1c:d8:7c:2d:e7] modulus: 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 public exponent: 10001 ] 2022-06-03 05:06:02.863  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-03 05:06:02.865 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-03 05:06:02.867 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-03 05:06:02.868 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-03 05:06:02.875  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-03 05:06:02.887  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-03 05:06:02.889  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-03 05:06:02.893 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-03 05:06:02.893 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-03 05:06:02.895 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-03 05:06:02.906 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-03 05:06:02.907 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-03 05:06:02.907 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-03 05:06:02.908 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 05:06:03.033  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-03 05:06:03.034  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-03 05:06:03.034 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-03 05:06:03.034 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 05:06:03.040  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-03 05:06:03.040  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-03 05:06:03.041 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:06:03.041 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:06:03.042 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:06:03.043 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:06:03.043 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:06:03.043 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:06:03.044 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:06:03.045 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:06:03.045 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:06:03.046 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-03 05:06:03.050 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 189979291887472986223011075721837157091180317605 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 03 03:08:06 UTC 2022 Final Date: Wed Jun 02 03:08:05 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:8a:d4:d4:93:f4:72:71:48:5a:8f:9b:c2:8c:88:f0:2e:13:fb:b4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a30a5a3f33dbb74e7b34dffbee9bf7b03b42155b 74d586f7ddbe2e7063651e923cacabc7ed54bd01 42676a500528e7719746843e5ba2538834624507 13a98309b96e736ae54063a27a87325909aef51a 78ed12e784b19a1db13e7d730e408ea350e622c0 aa36cbb904c2aad34aa42361821293ad794e03c3 0a67c15a381b64c99749083bc1febdc0d8292fd0 f1694091fc280fad8aad04ed2a35d464a1eeafc0 852f7f859c9121017d5e7c58b8f2e21d161b7e74 733b2ae5ce79b35e985a521024de352f5a41d96b 2de08db49a9e80beef99077675edfbab22baf61a 0d314edcbaac109fb9d83a3bfc02305f24f6380b 17d9d01ae17db666101ea6694965a1700a7d6928 eb2ece8f7c0a3d2e86f8a889f74821234b1bfea2 b41bb0f59bd0424ae07b0b51aac1caf7dedc34d4 13848f3a49eb0c431063941efea9dc9fd9dd977a f7cfebfe6c68cdb04a5ac6e9a5a5b183ac0a4180 59a851837470a6a51fafa2bba41b8caf7ef87234 8e7838ed0de219181269582dd4d79f4930d4e2bf 08b5d724 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [92:e1:5c:4c:69:e7:c4:59:83:58:e8:c7:7a:d2:cb:e2:7d:d0:d9:a0] modulus: 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 public exponent: 10001 ] 2022-06-03 05:08:46.732  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-03 05:08:46.737 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-03 05:08:46.740 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 05:08:46.741 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-03 05:08:46.742  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 05:08:46.743  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-03 05:08:46.743  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-03 05:08:46.744 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-03 05:08:46.745 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-03 05:08:46.745 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-03 05:08:46.751 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-03 05:08:46.752 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-03 05:08:46.752 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-03 05:08:46.753 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 05:08:46.990  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-03 05:08:46.991  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-03 05:08:46.992 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-03 05:08:46.992 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 05:08:46.994  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-03 05:08:46.995  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-03 05:08:46.995 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:08:46.996 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:08:46.996 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:08:46.997 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:08:46.997 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:08:46.998 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:08:46.998 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:08:46.999 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:08:46.999 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:08:47.000 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-03 05:08:47.005 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 189979291887472986223011075721837157091180317605 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 03 03:08:06 UTC 2022 Final Date: Wed Jun 02 03:08:05 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:8a:d4:d4:93:f4:72:71:48:5a:8f:9b:c2:8c:88:f0:2e:13:fb:b4] modulus: aec5f187e0f863a667b8e6e0bbade1762c40bb52aa395508951687a02b82320a651d4df855812445947af1283900e0bfaf516934694b9b14544a4dc29356c24e903bd3e6ce260f9f50173b024aa6d3e08582be167341a18aabb2b8d652c69a503842da63176dd1e84095b7fc245909559716af6b8f8ad086bbb1d93d76160d544befec38952183c95db468770d52c4b2c33c0afdf5bcdb38598d59bccfe5e5797c3289553c9311a1b10cf930c11996be77ef6376af95ab4e73315dc90c2964e0f8f1b2c3fc04f655026e9676b9b9f3d99223262b21eed6fe261dce6401d087bb2ef54f981aba3a11db4b115d3f1ddb5b98874a6acf8e43439258bb19ffb9410bad4a9bbeec0eeae81029b82943978c46a6889c2d71a0d1e0e10375b7b125e807219b389495dd01af596f8205bef6f97585e46b77dab748b3270ed2d58210223780ad51a477de5482cc29dfde9859a980b3b1d528819c6cb6cb91866671222303de38f2a8c7defe0e454c15084a7576a463bbba57988435dbfb1bb21daf97c74f public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a30a5a3f33dbb74e7b34dffbee9bf7b03b42155b 74d586f7ddbe2e7063651e923cacabc7ed54bd01 42676a500528e7719746843e5ba2538834624507 13a98309b96e736ae54063a27a87325909aef51a 78ed12e784b19a1db13e7d730e408ea350e622c0 aa36cbb904c2aad34aa42361821293ad794e03c3 0a67c15a381b64c99749083bc1febdc0d8292fd0 f1694091fc280fad8aad04ed2a35d464a1eeafc0 852f7f859c9121017d5e7c58b8f2e21d161b7e74 733b2ae5ce79b35e985a521024de352f5a41d96b 2de08db49a9e80beef99077675edfbab22baf61a 0d314edcbaac109fb9d83a3bfc02305f24f6380b 17d9d01ae17db666101ea6694965a1700a7d6928 eb2ece8f7c0a3d2e86f8a889f74821234b1bfea2 b41bb0f59bd0424ae07b0b51aac1caf7dedc34d4 13848f3a49eb0c431063941efea9dc9fd9dd977a f7cfebfe6c68cdb04a5ac6e9a5a5b183ac0a4180 59a851837470a6a51fafa2bba41b8caf7ef87234 8e7838ed0de219181269582dd4d79f4930d4e2bf 08b5d724 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6a:a6:ca:66:16:0c:5d:ac:bf:91:18:29:9b:ff:e7:a3:57:b5:a3:73] modulus: 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 public exponent: 10001 ] 2022-06-03 05:12:18.732  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-03 05:12:18.734 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-03 05:12:18.736 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 05:12:18.737 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-03 05:12:18.737  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 05:12:18.738  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-03 05:12:18.738  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-03 05:12:18.738 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-03 05:12:18.739 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-03 05:12:18.739 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-03 05:12:18.746 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-03 05:12:18.746 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-03 05:12:18.747 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-03 05:12:18.747 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 05:12:19.008  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-03 05:12:19.009  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-03 05:12:19.009 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-03 05:12:19.009 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 05:12:19.011  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-03 05:12:19.011  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-03 05:12:19.012 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:12:19.012 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:12:19.012 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:12:19.013 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:12:19.013 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:12:19.013 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:12:19.014 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:12:19.014 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:12:19.015 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:12:19.016 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-03 05:12:19.019 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 189979291887472986223011075721837157091180317605 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 03 03:08:06 UTC 2022 Final Date: Wed Jun 02 03:08:05 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:8a:d4:d4:93:f4:72:71:48:5a:8f:9b:c2:8c:88:f0:2e:13:fb:b4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a30a5a3f33dbb74e7b34dffbee9bf7b03b42155b 74d586f7ddbe2e7063651e923cacabc7ed54bd01 42676a500528e7719746843e5ba2538834624507 13a98309b96e736ae54063a27a87325909aef51a 78ed12e784b19a1db13e7d730e408ea350e622c0 aa36cbb904c2aad34aa42361821293ad794e03c3 0a67c15a381b64c99749083bc1febdc0d8292fd0 f1694091fc280fad8aad04ed2a35d464a1eeafc0 852f7f859c9121017d5e7c58b8f2e21d161b7e74 733b2ae5ce79b35e985a521024de352f5a41d96b 2de08db49a9e80beef99077675edfbab22baf61a 0d314edcbaac109fb9d83a3bfc02305f24f6380b 17d9d01ae17db666101ea6694965a1700a7d6928 eb2ece8f7c0a3d2e86f8a889f74821234b1bfea2 b41bb0f59bd0424ae07b0b51aac1caf7dedc34d4 13848f3a49eb0c431063941efea9dc9fd9dd977a f7cfebfe6c68cdb04a5ac6e9a5a5b183ac0a4180 59a851837470a6a51fafa2bba41b8caf7ef87234 8e7838ed0de219181269582dd4d79f4930d4e2bf 08b5d724 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5f:c7:98:49:4a:74:b7:7c:3b:f6:8c:c9:27:22:69:58:f9:60:b4:77] modulus: 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 public exponent: 10001 ] 2022-06-03 05:17:30.282  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-03 05:17:30.285 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-03 05:17:30.289 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 05:17:30.289 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-03 05:17:30.290  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 05:17:30.291  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-03 05:17:30.291  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-03 05:17:30.292 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-03 05:17:30.292 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-03 05:17:30.292 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-03 05:17:30.298 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-03 05:17:30.300 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-03 05:17:30.300 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-03 05:17:30.300 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 05:17:30.488  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-03 05:17:30.489  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-03 05:17:30.489 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-03 05:17:30.490 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 05:17:30.491  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-03 05:17:30.492  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-03 05:17:30.492 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:17:30.493 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:17:30.493 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:17:30.494 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:17:30.494 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:17:30.495 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:17:30.503 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:17:30.503 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:17:30.504 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:17:30.505 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-03 05:17:30.509 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 189979291887472986223011075721837157091180317605 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 03 03:08:06 UTC 2022 Final Date: Wed Jun 02 03:08:05 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:8a:d4:d4:93:f4:72:71:48:5a:8f:9b:c2:8c:88:f0:2e:13:fb:b4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a30a5a3f33dbb74e7b34dffbee9bf7b03b42155b 74d586f7ddbe2e7063651e923cacabc7ed54bd01 42676a500528e7719746843e5ba2538834624507 13a98309b96e736ae54063a27a87325909aef51a 78ed12e784b19a1db13e7d730e408ea350e622c0 aa36cbb904c2aad34aa42361821293ad794e03c3 0a67c15a381b64c99749083bc1febdc0d8292fd0 f1694091fc280fad8aad04ed2a35d464a1eeafc0 852f7f859c9121017d5e7c58b8f2e21d161b7e74 733b2ae5ce79b35e985a521024de352f5a41d96b 2de08db49a9e80beef99077675edfbab22baf61a 0d314edcbaac109fb9d83a3bfc02305f24f6380b 17d9d01ae17db666101ea6694965a1700a7d6928 eb2ece8f7c0a3d2e86f8a889f74821234b1bfea2 b41bb0f59bd0424ae07b0b51aac1caf7dedc34d4 13848f3a49eb0c431063941efea9dc9fd9dd977a f7cfebfe6c68cdb04a5ac6e9a5a5b183ac0a4180 59a851837470a6a51fafa2bba41b8caf7ef87234 8e7838ed0de219181269582dd4d79f4930d4e2bf 08b5d724 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e1:3c:11:6a:74:dc:eb:4e:2c:90:6a:20:e1:74:ed:5d:42:7d:53:a6] modulus: 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 public exponent: 10001 ] 2022-06-03 05:20:29.598  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-03 05:20:29.602 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-03 05:20:29.609 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-03 05:20:29.614 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-03 05:20:29.615  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-03 05:20:29.616  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-03 05:20:29.620  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-03 05:20:29.621 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-03 05:20:29.621 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-03 05:20:29.621 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-03 05:20:29.631 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-03 05:20:29.632 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-03 05:20:29.632 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-03 05:20:29.632 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 05:20:29.844  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-03 05:20:29.845  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-03 05:20:29.845 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-03 05:20:29.846 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 05:20:29.847  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-03 05:20:29.848  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-03 05:20:29.848 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:20:29.848 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:20:29.853 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:20:29.856 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:20:29.860 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:20:29.861 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:20:29.868 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:20:29.870 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:20:29.871 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:20:29.874 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-03 05:20:29.887 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 189979291887472986223011075721837157091180317605 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 03 03:08:06 UTC 2022 Final Date: Wed Jun 02 03:08:05 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:8a:d4:d4:93:f4:72:71:48:5a:8f:9b:c2:8c:88:f0:2e:13:fb:b4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a30a5a3f33dbb74e7b34dffbee9bf7b03b42155b 74d586f7ddbe2e7063651e923cacabc7ed54bd01 42676a500528e7719746843e5ba2538834624507 13a98309b96e736ae54063a27a87325909aef51a 78ed12e784b19a1db13e7d730e408ea350e622c0 aa36cbb904c2aad34aa42361821293ad794e03c3 0a67c15a381b64c99749083bc1febdc0d8292fd0 f1694091fc280fad8aad04ed2a35d464a1eeafc0 852f7f859c9121017d5e7c58b8f2e21d161b7e74 733b2ae5ce79b35e985a521024de352f5a41d96b 2de08db49a9e80beef99077675edfbab22baf61a 0d314edcbaac109fb9d83a3bfc02305f24f6380b 17d9d01ae17db666101ea6694965a1700a7d6928 eb2ece8f7c0a3d2e86f8a889f74821234b1bfea2 b41bb0f59bd0424ae07b0b51aac1caf7dedc34d4 13848f3a49eb0c431063941efea9dc9fd9dd977a f7cfebfe6c68cdb04a5ac6e9a5a5b183ac0a4180 59a851837470a6a51fafa2bba41b8caf7ef87234 8e7838ed0de219181269582dd4d79f4930d4e2bf 08b5d724 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ba:40:61:15:04:16:2b:8f:b2:e2:04:b5:0e:3e:b4:32:27:64:d3:10] modulus: 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 public exponent: 10001 ] 2022-06-03 05:21:59.585  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-03 05:21:59.586 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-03 05:21:59.592 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 05:21:59.594 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-03 05:21:59.594  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 05:21:59.595  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-03 05:21:59.595  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-03 05:21:59.596 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-03 05:21:59.596 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-03 05:21:59.596 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-03 05:21:59.601 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-03 05:21:59.601 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-03 05:21:59.602 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-03 05:21:59.602 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 05:21:59.802  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-03 05:21:59.802  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-03 05:21:59.803 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-03 05:21:59.803 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 05:21:59.804  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-03 05:21:59.804  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-03 05:21:59.805 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:21:59.805 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:21:59.805 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:21:59.806 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:21:59.806 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:21:59.806 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:21:59.809 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:21:59.809 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:21:59.810 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:21:59.810 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-03 05:21:59.813 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 189979291887472986223011075721837157091180317605 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 03 03:08:06 UTC 2022 Final Date: Wed Jun 02 03:08:05 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:8a:d4:d4:93:f4:72:71:48:5a:8f:9b:c2:8c:88:f0:2e:13:fb:b4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a30a5a3f33dbb74e7b34dffbee9bf7b03b42155b 74d586f7ddbe2e7063651e923cacabc7ed54bd01 42676a500528e7719746843e5ba2538834624507 13a98309b96e736ae54063a27a87325909aef51a 78ed12e784b19a1db13e7d730e408ea350e622c0 aa36cbb904c2aad34aa42361821293ad794e03c3 0a67c15a381b64c99749083bc1febdc0d8292fd0 f1694091fc280fad8aad04ed2a35d464a1eeafc0 852f7f859c9121017d5e7c58b8f2e21d161b7e74 733b2ae5ce79b35e985a521024de352f5a41d96b 2de08db49a9e80beef99077675edfbab22baf61a 0d314edcbaac109fb9d83a3bfc02305f24f6380b 17d9d01ae17db666101ea6694965a1700a7d6928 eb2ece8f7c0a3d2e86f8a889f74821234b1bfea2 b41bb0f59bd0424ae07b0b51aac1caf7dedc34d4 13848f3a49eb0c431063941efea9dc9fd9dd977a f7cfebfe6c68cdb04a5ac6e9a5a5b183ac0a4180 59a851837470a6a51fafa2bba41b8caf7ef87234 8e7838ed0de219181269582dd4d79f4930d4e2bf 08b5d724 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4d:7a:c2:70:0f:3c:25:ef:82:ce:58:e6:60:82:49:df:79:06:de:dc] modulus: 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 public exponent: 10001 ] 2022-06-03 05:25:14.489  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-03 05:25:14.492 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-03 05:25:14.495 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-03 05:25:14.496 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-03 05:25:14.496  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-03 05:25:14.497  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-03 05:25:14.497  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-03 05:25:14.497 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-03 05:25:14.498 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-03 05:25:14.498 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-03 05:25:14.503 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-03 05:25:14.504 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-03 05:25:14.505 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-03 05:25:14.505 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 05:25:14.689  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-03 05:25:14.690  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-03 05:25:14.690 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-03 05:25:14.691 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 05:25:14.692  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-03 05:25:14.693  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-03 05:25:14.694 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:25:14.694 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:25:14.694 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:25:14.695 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:25:14.696 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:25:14.696 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:25:14.697 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:25:14.697 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:25:14.697 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:25:14.698 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-03 05:25:14.703 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 189979291887472986223011075721837157091180317605 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 03 03:08:06 UTC 2022 Final Date: Wed Jun 02 03:08:05 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:8a:d4:d4:93:f4:72:71:48:5a:8f:9b:c2:8c:88:f0:2e:13:fb:b4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a30a5a3f33dbb74e7b34dffbee9bf7b03b42155b 74d586f7ddbe2e7063651e923cacabc7ed54bd01 42676a500528e7719746843e5ba2538834624507 13a98309b96e736ae54063a27a87325909aef51a 78ed12e784b19a1db13e7d730e408ea350e622c0 aa36cbb904c2aad34aa42361821293ad794e03c3 0a67c15a381b64c99749083bc1febdc0d8292fd0 f1694091fc280fad8aad04ed2a35d464a1eeafc0 852f7f859c9121017d5e7c58b8f2e21d161b7e74 733b2ae5ce79b35e985a521024de352f5a41d96b 2de08db49a9e80beef99077675edfbab22baf61a 0d314edcbaac109fb9d83a3bfc02305f24f6380b 17d9d01ae17db666101ea6694965a1700a7d6928 eb2ece8f7c0a3d2e86f8a889f74821234b1bfea2 b41bb0f59bd0424ae07b0b51aac1caf7dedc34d4 13848f3a49eb0c431063941efea9dc9fd9dd977a f7cfebfe6c68cdb04a5ac6e9a5a5b183ac0a4180 59a851837470a6a51fafa2bba41b8caf7ef87234 8e7838ed0de219181269582dd4d79f4930d4e2bf 08b5d724 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [53:59:1e:00:ad:3f:50:f5:30:c4:39:99:bc:53:b5:62:81:28:8d:ea] modulus: a4953abd9cfa73ded5d3273cf520c508b1c3246b541ef78e8a235f4c4a15957a441127e0b9254db491e9ac71a5c890d27772bc630a8756bac9c5369150f18f8083b5742781b419696ca9be08d85f474a7f846fac576ef6d95847e58407e8475d39e5d2154f2ec205bb06d2fcc7f72d8d96d9b3b772dd982e8cac9866f8512acdfe3617d901ff1ab191d286a1d514f7701d32edb27096b39e355d758d108854a85a763305b3674ed4e7beb663b503466ed7a3f59c961bd12f6663d894b0762dee2da15a222f24305dc057e7be46abfedfb7511dcfc09d0b1d3315fc38bd928f2b0dfc3b534baa0ceae71e4ab1e0df2cf87a4055d89860e5d67785715bba38b761 public exponent: 10001 ] 2022-06-03 05:25:29.539  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-03 05:25:29.542 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-03 05:25:29.545 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-03 05:25:29.546 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-03 05:25:29.546  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-03 05:25:29.547  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-03 05:25:29.548  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-03 05:25:29.548 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-03 05:25:29.548 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-03 05:25:29.549 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-03 05:25:29.553 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-03 05:25:29.554 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-03 05:25:29.554 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-03 05:25:29.554 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 05:25:29.682  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-03 05:25:29.684  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-03 05:25:29.685 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-03 05:25:29.685 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 05:25:29.686  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-03 05:25:29.687  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-03 05:25:29.688 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:25:29.688 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:25:29.689 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:25:29.690 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:25:29.691 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:25:29.692 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:25:29.693 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:25:29.694 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:25:29.694 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:25:29.695 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-03 05:25:29.698 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 189979291887472986223011075721837157091180317605 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 03 03:08:06 UTC 2022 Final Date: Wed Jun 02 03:08:05 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:8a:d4:d4:93:f4:72:71:48:5a:8f:9b:c2:8c:88:f0:2e:13:fb:b4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a30a5a3f33dbb74e7b34dffbee9bf7b03b42155b 74d586f7ddbe2e7063651e923cacabc7ed54bd01 42676a500528e7719746843e5ba2538834624507 13a98309b96e736ae54063a27a87325909aef51a 78ed12e784b19a1db13e7d730e408ea350e622c0 aa36cbb904c2aad34aa42361821293ad794e03c3 0a67c15a381b64c99749083bc1febdc0d8292fd0 f1694091fc280fad8aad04ed2a35d464a1eeafc0 852f7f859c9121017d5e7c58b8f2e21d161b7e74 733b2ae5ce79b35e985a521024de352f5a41d96b 2de08db49a9e80beef99077675edfbab22baf61a 0d314edcbaac109fb9d83a3bfc02305f24f6380b 17d9d01ae17db666101ea6694965a1700a7d6928 eb2ece8f7c0a3d2e86f8a889f74821234b1bfea2 b41bb0f59bd0424ae07b0b51aac1caf7dedc34d4 13848f3a49eb0c431063941efea9dc9fd9dd977a f7cfebfe6c68cdb04a5ac6e9a5a5b183ac0a4180 59a851837470a6a51fafa2bba41b8caf7ef87234 8e7838ed0de219181269582dd4d79f4930d4e2bf 08b5d724 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ef:93:f1:70:02:0b:11:94:bd:21:3b:8f:ba:85:03:0b:9d:8c:f6:31] modulus: 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 public exponent: 10001 ] 2022-06-03 05:26:10.715  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-03 05:26:10.717 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-03 05:26:10.718 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 05:26:10.719 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-03 05:26:10.719  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 05:26:10.720  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-03 05:26:10.720  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-03 05:26:10.721 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-03 05:26:10.721 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-03 05:26:10.722 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-03 05:26:10.726 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-03 05:26:10.727 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-03 05:26:10.727 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-03 05:26:10.728 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 05:26:10.963  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-03 05:26:10.964  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-03 05:26:10.964 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-03 05:26:10.965 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 05:26:10.967  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-03 05:26:10.967  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-03 05:26:10.968 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:26:10.968 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:26:10.968 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:26:10.969 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:26:10.970 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:26:10.970 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:26:10.971 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:26:10.971 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:26:10.972 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:26:10.973 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-03 05:26:10.978 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 189979291887472986223011075721837157091180317605 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 03 03:08:06 UTC 2022 Final Date: Wed Jun 02 03:08:05 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:8a:d4:d4:93:f4:72:71:48:5a:8f:9b:c2:8c:88:f0:2e:13:fb:b4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a30a5a3f33dbb74e7b34dffbee9bf7b03b42155b 74d586f7ddbe2e7063651e923cacabc7ed54bd01 42676a500528e7719746843e5ba2538834624507 13a98309b96e736ae54063a27a87325909aef51a 78ed12e784b19a1db13e7d730e408ea350e622c0 aa36cbb904c2aad34aa42361821293ad794e03c3 0a67c15a381b64c99749083bc1febdc0d8292fd0 f1694091fc280fad8aad04ed2a35d464a1eeafc0 852f7f859c9121017d5e7c58b8f2e21d161b7e74 733b2ae5ce79b35e985a521024de352f5a41d96b 2de08db49a9e80beef99077675edfbab22baf61a 0d314edcbaac109fb9d83a3bfc02305f24f6380b 17d9d01ae17db666101ea6694965a1700a7d6928 eb2ece8f7c0a3d2e86f8a889f74821234b1bfea2 b41bb0f59bd0424ae07b0b51aac1caf7dedc34d4 13848f3a49eb0c431063941efea9dc9fd9dd977a f7cfebfe6c68cdb04a5ac6e9a5a5b183ac0a4180 59a851837470a6a51fafa2bba41b8caf7ef87234 8e7838ed0de219181269582dd4d79f4930d4e2bf 08b5d724 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [63:d0:f0:67:ab:08:d3:b7:ba:86:5b:89:9a:4d:fb:ac:43:e6:26:44] modulus: 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 public exponent: 10001 ] 2022-06-03 05:30:26.602  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-03 05:30:26.604 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-03 05:30:26.606 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 05:30:26.607 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-03 05:30:26.608  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 05:30:26.608  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-03 05:30:26.609  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-03 05:30:26.609 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-03 05:30:26.609 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-03 05:30:26.610 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-03 05:30:26.615 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-03 05:30:26.615 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-03 05:30:26.616 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-03 05:30:26.616 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 05:30:26.792  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-03 05:30:26.792  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-03 05:30:26.793 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-03 05:30:26.793 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 05:30:26.794  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-03 05:30:26.795  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-03 05:30:26.795 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:30:26.796 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:30:26.796 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:30:26.796 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:30:26.797 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:30:26.797 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:30:26.798 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:30:26.798 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:30:26.798 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:30:26.799 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-03 05:30:26.803 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 189979291887472986223011075721837157091180317605 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 03 03:08:06 UTC 2022 Final Date: Wed Jun 02 03:08:05 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:8a:d4:d4:93:f4:72:71:48:5a:8f:9b:c2:8c:88:f0:2e:13:fb:b4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a30a5a3f33dbb74e7b34dffbee9bf7b03b42155b 74d586f7ddbe2e7063651e923cacabc7ed54bd01 42676a500528e7719746843e5ba2538834624507 13a98309b96e736ae54063a27a87325909aef51a 78ed12e784b19a1db13e7d730e408ea350e622c0 aa36cbb904c2aad34aa42361821293ad794e03c3 0a67c15a381b64c99749083bc1febdc0d8292fd0 f1694091fc280fad8aad04ed2a35d464a1eeafc0 852f7f859c9121017d5e7c58b8f2e21d161b7e74 733b2ae5ce79b35e985a521024de352f5a41d96b 2de08db49a9e80beef99077675edfbab22baf61a 0d314edcbaac109fb9d83a3bfc02305f24f6380b 17d9d01ae17db666101ea6694965a1700a7d6928 eb2ece8f7c0a3d2e86f8a889f74821234b1bfea2 b41bb0f59bd0424ae07b0b51aac1caf7dedc34d4 13848f3a49eb0c431063941efea9dc9fd9dd977a f7cfebfe6c68cdb04a5ac6e9a5a5b183ac0a4180 59a851837470a6a51fafa2bba41b8caf7ef87234 8e7838ed0de219181269582dd4d79f4930d4e2bf 08b5d724 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [63:31:4a:34:65:c7:09:2d:68:27:42:fb:a5:e2:b1:f6:5e:3c:36:19] modulus: b0fe11e976ab28587fc3f52eacaf184f0c1141abd64f0814535007ca76f8421d2cfa47e5c0a8c0b1a0448021a5da7dffeb37bf9c45ec88c9f926ee0e6dd270c8c10091f820425fc8c79debd67f5fa67dfeb7f0b2c6849d8045aee65af68611f41d115869a114341da8153067eefc9419b54b579c1e3dede32967f4b91e82d262f57efdce985fbd68da7a7e54ef114d28daf54987614c6d80de03dbb5a097114ca737b2862c373e7d74bebdfbb215e5fad0d44defc4c699dc8d3575adb6e582e7f65044f2cb4185512cc7c94d1a793a694f728823ad5237e9877217092569085796627700e28e6910eff6271414122b8d8a0b020caab31f4ecf9578e0fae06bdb public exponent: 10001 ] 2022-06-03 05:34:43.490  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-03 05:34:43.494 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-03 05:34:43.498 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 05:34:43.501 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-03 05:34:43.502  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 05:34:43.505  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-03 05:34:43.505  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-03 05:34:43.506 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-03 05:34:43.506 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-03 05:34:43.507 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-03 05:34:43.520 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-03 05:34:43.523 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-03 05:34:43.523 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-03 05:34:43.524 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 05:34:43.764  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-03 05:34:43.765  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-03 05:34:43.765 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-03 05:34:43.765 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 05:34:43.768  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-03 05:34:43.768  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-03 05:34:43.769 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:34:43.769 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:34:43.769 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:34:43.770 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:34:43.771 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:34:43.771 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:34:43.772 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:34:43.772 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:34:43.772 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:34:43.773 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-03 05:34:43.778 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 189979291887472986223011075721837157091180317605 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 03 03:08:06 UTC 2022 Final Date: Wed Jun 02 03:08:05 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:8a:d4:d4:93:f4:72:71:48:5a:8f:9b:c2:8c:88:f0:2e:13:fb:b4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a30a5a3f33dbb74e7b34dffbee9bf7b03b42155b 74d586f7ddbe2e7063651e923cacabc7ed54bd01 42676a500528e7719746843e5ba2538834624507 13a98309b96e736ae54063a27a87325909aef51a 78ed12e784b19a1db13e7d730e408ea350e622c0 aa36cbb904c2aad34aa42361821293ad794e03c3 0a67c15a381b64c99749083bc1febdc0d8292fd0 f1694091fc280fad8aad04ed2a35d464a1eeafc0 852f7f859c9121017d5e7c58b8f2e21d161b7e74 733b2ae5ce79b35e985a521024de352f5a41d96b 2de08db49a9e80beef99077675edfbab22baf61a 0d314edcbaac109fb9d83a3bfc02305f24f6380b 17d9d01ae17db666101ea6694965a1700a7d6928 eb2ece8f7c0a3d2e86f8a889f74821234b1bfea2 b41bb0f59bd0424ae07b0b51aac1caf7dedc34d4 13848f3a49eb0c431063941efea9dc9fd9dd977a f7cfebfe6c68cdb04a5ac6e9a5a5b183ac0a4180 59a851837470a6a51fafa2bba41b8caf7ef87234 8e7838ed0de219181269582dd4d79f4930d4e2bf 08b5d724 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [36:b6:36:e5:f0:0f:82:0c:7a:26:f2:72:19:b4:2d:37:b8:f3:3a:1f] modulus: 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 public exponent: 10001 ] 2022-06-03 05:39:12.971  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-03 05:39:12.973 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-03 05:39:12.975 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 05:39:12.976 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-03 05:39:12.976  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 05:39:12.977  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-03 05:39:12.977  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-03 05:39:12.978 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-03 05:39:12.978 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-03 05:39:12.978 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-03 05:39:12.983 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-03 05:39:12.984 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-03 05:39:12.985 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-03 05:39:12.985 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 05:39:13.254  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-03 05:39:13.254  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-03 05:39:13.255 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-03 05:39:13.255 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 05:39:13.256  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-03 05:39:13.257  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-03 05:39:13.257 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:39:13.257 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:39:13.258 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:39:13.258 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:39:13.259 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:39:13.259 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:39:13.259 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:39:13.260 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:39:13.260 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:39:13.261 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-03 05:39:13.266 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 189979291887472986223011075721837157091180317605 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 03 03:08:06 UTC 2022 Final Date: Wed Jun 02 03:08:05 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:8a:d4:d4:93:f4:72:71:48:5a:8f:9b:c2:8c:88:f0:2e:13:fb:b4] modulus: aec5f187e0f863a667b8e6e0bbade1762c40bb52aa395508951687a02b82320a651d4df855812445947af1283900e0bfaf516934694b9b14544a4dc29356c24e903bd3e6ce260f9f50173b024aa6d3e08582be167341a18aabb2b8d652c69a503842da63176dd1e84095b7fc245909559716af6b8f8ad086bbb1d93d76160d544befec38952183c95db468770d52c4b2c33c0afdf5bcdb38598d59bccfe5e5797c3289553c9311a1b10cf930c11996be77ef6376af95ab4e73315dc90c2964e0f8f1b2c3fc04f655026e9676b9b9f3d99223262b21eed6fe261dce6401d087bb2ef54f981aba3a11db4b115d3f1ddb5b98874a6acf8e43439258bb19ffb9410bad4a9bbeec0eeae81029b82943978c46a6889c2d71a0d1e0e10375b7b125e807219b389495dd01af596f8205bef6f97585e46b77dab748b3270ed2d58210223780ad51a477de5482cc29dfde9859a980b3b1d528819c6cb6cb91866671222303de38f2a8c7defe0e454c15084a7576a463bbba57988435dbfb1bb21daf97c74f public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a30a5a3f33dbb74e7b34dffbee9bf7b03b42155b 74d586f7ddbe2e7063651e923cacabc7ed54bd01 42676a500528e7719746843e5ba2538834624507 13a98309b96e736ae54063a27a87325909aef51a 78ed12e784b19a1db13e7d730e408ea350e622c0 aa36cbb904c2aad34aa42361821293ad794e03c3 0a67c15a381b64c99749083bc1febdc0d8292fd0 f1694091fc280fad8aad04ed2a35d464a1eeafc0 852f7f859c9121017d5e7c58b8f2e21d161b7e74 733b2ae5ce79b35e985a521024de352f5a41d96b 2de08db49a9e80beef99077675edfbab22baf61a 0d314edcbaac109fb9d83a3bfc02305f24f6380b 17d9d01ae17db666101ea6694965a1700a7d6928 eb2ece8f7c0a3d2e86f8a889f74821234b1bfea2 b41bb0f59bd0424ae07b0b51aac1caf7dedc34d4 13848f3a49eb0c431063941efea9dc9fd9dd977a f7cfebfe6c68cdb04a5ac6e9a5a5b183ac0a4180 59a851837470a6a51fafa2bba41b8caf7ef87234 8e7838ed0de219181269582dd4d79f4930d4e2bf 08b5d724 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [99:41:c0:76:2f:77:9e:79:76:8a:7e:ce:45:29:3d:69:a7:ea:da:12] modulus: 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 public exponent: 10001 ] 2022-06-03 05:44:02.712  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-03 05:44:02.714 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-03 05:44:02.717 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 05:44:02.718 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-03 05:44:02.718  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-03 05:44:02.719  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-03 05:44:02.719  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-03 05:44:02.720 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-03 05:44:02.721 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-03 05:44:02.721 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-03 05:44:02.727 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-03 05:44:02.728 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-03 05:44:02.728 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-03 05:44:02.728 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 05:44:02.934  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-03 05:44:02.935  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-03 05:44:02.935 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-03 05:44:02.936 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-03 05:44:02.937  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-03 05:44:02.937  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-03 05:44:02.938 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:44:02.938 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:44:02.938 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:44:02.939 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:44:02.940 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:44:02.940 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:44:02.940 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-03 05:44:02.941 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-03 05:44:02.941 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-03 05:44:02.942 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-03 05:44:02.946 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 189979291887472986223011075721837157091180317605 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jun 03 03:08:06 UTC 2022 Final Date: Wed Jun 02 03:08:05 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fc:8a:d4:d4:93:f4:72:71:48:5a:8f:9b:c2:8c:88:f0:2e:13:fb:b4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a30a5a3f33dbb74e7b34dffbee9bf7b03b42155b 74d586f7ddbe2e7063651e923cacabc7ed54bd01 42676a500528e7719746843e5ba2538834624507 13a98309b96e736ae54063a27a87325909aef51a 78ed12e784b19a1db13e7d730e408ea350e622c0 aa36cbb904c2aad34aa42361821293ad794e03c3 0a67c15a381b64c99749083bc1febdc0d8292fd0 f1694091fc280fad8aad04ed2a35d464a1eeafc0 852f7f859c9121017d5e7c58b8f2e21d161b7e74 733b2ae5ce79b35e985a521024de352f5a41d96b 2de08db49a9e80beef99077675edfbab22baf61a 0d314edcbaac109fb9d83a3bfc02305f24f6380b 17d9d01ae17db666101ea6694965a1700a7d6928 eb2ece8f7c0a3d2e86f8a889f74821234b1bfea2 b41bb0f59bd0424ae07b0b51aac1caf7dedc34d4 13848f3a49eb0c431063941efea9dc9fd9dd977a f7cfebfe6c68cdb04a5ac6e9a5a5b183ac0a4180 59a851837470a6a51fafa2bba41b8caf7ef87234 8e7838ed0de219181269582dd4d79f4930d4e2bf 08b5d724 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [99:ff:00:98:90:60:ca:c4:31:47:65:38:c7:5a:c5:e9:cc:2e:3a:8e] modulus: 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 public exponent: 10001 ]