2022-06-04 03:05:44,838 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-06-04 03:05:46,611 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-06-04 03:05:47.997  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Jun 04, 2022 3:05:51 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jun 04, 2022 3:05:51 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jun 04, 2022 3:05:51 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jun 04, 2022 3:05:52 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-06-04 03:05:53.426 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-06-04 03:05:53.985  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-06-04 03:05:54.334  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-06-04 03:05:56.043 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-06-04 03:05:56.050 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-06-04 03:05:56.055 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-06-04 03:05:56.069 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-06-04 03:05:56.156 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-06-04 03:05:56.163 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-06-04 03:05:56.407 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-06-04 03:05:57.724 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jun 04, 2022 3:05:59 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-06-04 03:05:59.741  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 16.639 seconds (JVM running for 20.083) Jun 04, 2022 3:06:12 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-06-04 03:06:32.135  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-04 03:06:32.168 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-04 03:06:32.261 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-06-04 03:06:32.274 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-04 03:06:32.348  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-06-04 03:06:32.369  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-04 03:06:32.374  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-04 03:06:32.386 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-04 03:06:32.388 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-04 03:06:32.401 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-04 03:06:32.416 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-04 03:06:32.424 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-04 03:06:32.551 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-04 03:06:32.563 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-04 03:06:32.565 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-04 03:06:32.572 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 03:06:33.833  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-04 03:06:33.840  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-04 03:06:33.841 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-04 03:06:33.847 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 03:06:33.873  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-04 03:06:33.875  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-04 03:06:33.877 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 03:06:33.877 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-04 03:06:33.878 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-04 03:06:33.932 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 03:06:33.933 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-04 03:06:33.934 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-04 03:06:33.947 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 03:06:33.948 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-04 03:06:33.948 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-04 03:06:33.951 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-04 03:06:34.036 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 196806841254939458942522370049762662793861926910 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jun 04 03:02:51 UTC 2022 Final Date: Thu Jun 03 03:02:50 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6f:67:f5:e6:ec:53:2c:57:82:2f:56:a6:82:70:b0:22:1a:b4:1f:7e] modulus: 9d4c4473ce8095707c66c11def36de633b04e70207c275918840cc8299d7b50f84e62d023a0ae2c811873247a0705e858453999ab2a2f9e9135253aedf460869a9782dc7f349f2711ffd9fce9db51363ab078dcd100466aeae7cdf93d77389e1f7c5594ec846e254004d40dc4fdb3baaeb1e5057a95a7d1a9fff17be2c5a3654449858bf2d0e8621b18eeaed6590a9b96a9935c0e678da179151ad11e8e899e15b6d5eb985f99b12860ca4ba66b9ab7fe899edbdf2512ce361a8a5c9e89c19a982d98e8627995a34f78cd665687d32853dcd805d12d1429b278dc373df01b29af3b5ad095a9ef9b14ed79dde007ef3ccc7f31d4893c01da47f5932d0f2115c99a5aef9d7f1db8a20e08381d4c0e7df3661c83951ee0a74302de15b6aebec1363a7be36f006783bfb1899c884205c54cc37c248bf08774a7a49d0c82fdab334eb08c1d7ac0906920c043517741e5fb4241864560867a153bec125d889a797472211b9f78882da1b65e49b9459f2418f02cc18dde1b48caf142e068ff4051a6131 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0465c66cbabf278d21bc04ed31cdecf082196da8 c5ccd1dceb468985373cf96a92be1d65304549e1 5a8166d782278f9ac2e7fa8b321236f01139061c 37f287746930048258c597c6a07dab28fb1fdb93 ee0539963161c78b30f5ae46bfb705c30767fb6b 068218138530aa1d5a07cb53d11942c5ee9bd588 41c84581b3110fcf3264e05f8d4229e5957917e3 99b48886ad36b86ceecb9cf6731004f84eb421f6 0fd0630186e281f30c03b2d73b60f07fbc7816d9 21f66fc0c1204ac075521d8da96154a823080b03 0fe7d5e15c8e5f05793e9169b3ba39eba93f2eca 682965f42a17b085e98bfed2ba6c9ed7d8b04ee4 f8f4dd0ff53798aadfa438b718822c1e31fe9477 a4ba3e9055d77d02f23f9764f0d7ba08183f4676 2f06701dddbbbcc3d7ff733d292a37cfa9f6065e 298507e72f3b50b4d74ef503bf0ba0bfcb8669f9 2e5dab0977f73087f6720b09ddad3914dfc03759 9768a248afbed2140101a9cc98a89c84229afbc9 ab6a1801395b9e5b3285a7c86124e21569feda18 9d9ef1ed Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [76:87:f8:c5:ba:e4:7a:ba:cb:98:81:37:1e:99:0b:2a:c6:b0:ea:ab] modulus: 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 public exponent: 10001 ] 2022-06-04 04:53:47.612  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-04 04:53:47.618 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-04 04:53:47.622 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-04 04:53:47.624 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-04 04:53:47.625  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-04 04:53:47.626  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-04 04:53:47.627  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-04 04:53:47.628 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-04 04:53:47.629 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-04 04:53:47.630 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-04 04:53:47.644 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-04 04:53:47.646 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-04 04:53:47.647 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-04 04:53:47.648 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 04:53:47.922  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-04 04:53:47.923  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-04 04:53:47.924 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-04 04:53:47.924 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 04:53:47.929  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-04 04:53:47.930  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-04 04:53:47.931 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 04:53:47.933 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-04 04:53:47.934 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-04 04:53:47.936 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 04:53:47.937 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-04 04:53:47.938 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-04 04:53:47.939 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 04:53:47.940 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-04 04:53:47.941 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-04 04:53:47.942 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-04 04:53:47.951 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 196806841254939458942522370049762662793861926910 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jun 04 03:02:51 UTC 2022 Final Date: Thu Jun 03 03:02:50 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6f:67:f5:e6:ec:53:2c:57:82:2f:56:a6:82:70:b0:22:1a:b4:1f:7e] modulus: 9d4c4473ce8095707c66c11def36de633b04e70207c275918840cc8299d7b50f84e62d023a0ae2c811873247a0705e858453999ab2a2f9e9135253aedf460869a9782dc7f349f2711ffd9fce9db51363ab078dcd100466aeae7cdf93d77389e1f7c5594ec846e254004d40dc4fdb3baaeb1e5057a95a7d1a9fff17be2c5a3654449858bf2d0e8621b18eeaed6590a9b96a9935c0e678da179151ad11e8e899e15b6d5eb985f99b12860ca4ba66b9ab7fe899edbdf2512ce361a8a5c9e89c19a982d98e8627995a34f78cd665687d32853dcd805d12d1429b278dc373df01b29af3b5ad095a9ef9b14ed79dde007ef3ccc7f31d4893c01da47f5932d0f2115c99a5aef9d7f1db8a20e08381d4c0e7df3661c83951ee0a74302de15b6aebec1363a7be36f006783bfb1899c884205c54cc37c248bf08774a7a49d0c82fdab334eb08c1d7ac0906920c043517741e5fb4241864560867a153bec125d889a797472211b9f78882da1b65e49b9459f2418f02cc18dde1b48caf142e068ff4051a6131 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0465c66cbabf278d21bc04ed31cdecf082196da8 c5ccd1dceb468985373cf96a92be1d65304549e1 5a8166d782278f9ac2e7fa8b321236f01139061c 37f287746930048258c597c6a07dab28fb1fdb93 ee0539963161c78b30f5ae46bfb705c30767fb6b 068218138530aa1d5a07cb53d11942c5ee9bd588 41c84581b3110fcf3264e05f8d4229e5957917e3 99b48886ad36b86ceecb9cf6731004f84eb421f6 0fd0630186e281f30c03b2d73b60f07fbc7816d9 21f66fc0c1204ac075521d8da96154a823080b03 0fe7d5e15c8e5f05793e9169b3ba39eba93f2eca 682965f42a17b085e98bfed2ba6c9ed7d8b04ee4 f8f4dd0ff53798aadfa438b718822c1e31fe9477 a4ba3e9055d77d02f23f9764f0d7ba08183f4676 2f06701dddbbbcc3d7ff733d292a37cfa9f6065e 298507e72f3b50b4d74ef503bf0ba0bfcb8669f9 2e5dab0977f73087f6720b09ddad3914dfc03759 9768a248afbed2140101a9cc98a89c84229afbc9 ab6a1801395b9e5b3285a7c86124e21569feda18 9d9ef1ed Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ac:a2:dd:25:16:ef:5e:77:b0:0c:a6:45:9f:44:14:bc:ca:d6:29:e7] modulus: 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 public exponent: 10001 ] 2022-06-04 04:55:35.709  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-04 04:55:35.713 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-04 04:55:35.716 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-04 04:55:35.718 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-04 04:55:35.719  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-04 04:55:35.721  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-04 04:55:35.721  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-04 04:55:35.722 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-04 04:55:35.723 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-04 04:55:35.724 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-04 04:55:35.734 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-04 04:55:35.736 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-04 04:55:35.736 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-04 04:55:35.737 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 04:55:35.948  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-04 04:55:35.950  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-04 04:55:35.950 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-04 04:55:35.951 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 04:55:35.956  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-04 04:55:35.957  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-04 04:55:35.958 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 04:55:35.959 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-04 04:55:35.959 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-04 04:55:35.962 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 04:55:35.963 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-04 04:55:35.963 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-04 04:55:35.965 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 04:55:35.966 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-04 04:55:35.966 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-04 04:55:35.968 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-04 04:55:35.978 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 196806841254939458942522370049762662793861926910 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jun 04 03:02:51 UTC 2022 Final Date: Thu Jun 03 03:02:50 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6f:67:f5:e6:ec:53:2c:57:82:2f:56:a6:82:70:b0:22:1a:b4:1f:7e] modulus: 9d4c4473ce8095707c66c11def36de633b04e70207c275918840cc8299d7b50f84e62d023a0ae2c811873247a0705e858453999ab2a2f9e9135253aedf460869a9782dc7f349f2711ffd9fce9db51363ab078dcd100466aeae7cdf93d77389e1f7c5594ec846e254004d40dc4fdb3baaeb1e5057a95a7d1a9fff17be2c5a3654449858bf2d0e8621b18eeaed6590a9b96a9935c0e678da179151ad11e8e899e15b6d5eb985f99b12860ca4ba66b9ab7fe899edbdf2512ce361a8a5c9e89c19a982d98e8627995a34f78cd665687d32853dcd805d12d1429b278dc373df01b29af3b5ad095a9ef9b14ed79dde007ef3ccc7f31d4893c01da47f5932d0f2115c99a5aef9d7f1db8a20e08381d4c0e7df3661c83951ee0a74302de15b6aebec1363a7be36f006783bfb1899c884205c54cc37c248bf08774a7a49d0c82fdab334eb08c1d7ac0906920c043517741e5fb4241864560867a153bec125d889a797472211b9f78882da1b65e49b9459f2418f02cc18dde1b48caf142e068ff4051a6131 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0465c66cbabf278d21bc04ed31cdecf082196da8 c5ccd1dceb468985373cf96a92be1d65304549e1 5a8166d782278f9ac2e7fa8b321236f01139061c 37f287746930048258c597c6a07dab28fb1fdb93 ee0539963161c78b30f5ae46bfb705c30767fb6b 068218138530aa1d5a07cb53d11942c5ee9bd588 41c84581b3110fcf3264e05f8d4229e5957917e3 99b48886ad36b86ceecb9cf6731004f84eb421f6 0fd0630186e281f30c03b2d73b60f07fbc7816d9 21f66fc0c1204ac075521d8da96154a823080b03 0fe7d5e15c8e5f05793e9169b3ba39eba93f2eca 682965f42a17b085e98bfed2ba6c9ed7d8b04ee4 f8f4dd0ff53798aadfa438b718822c1e31fe9477 a4ba3e9055d77d02f23f9764f0d7ba08183f4676 2f06701dddbbbcc3d7ff733d292a37cfa9f6065e 298507e72f3b50b4d74ef503bf0ba0bfcb8669f9 2e5dab0977f73087f6720b09ddad3914dfc03759 9768a248afbed2140101a9cc98a89c84229afbc9 ab6a1801395b9e5b3285a7c86124e21569feda18 9d9ef1ed Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [21:30:60:87:28:09:13:0e:c0:85:97:53:1e:70:e9:61:8c:06:08:f5] modulus: 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 public exponent: 10001 ] 2022-06-04 04:56:57.894  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-04 04:56:57.897 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-04 04:56:57.899 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-04 04:56:57.901 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-04 04:56:57.902  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-04 04:56:57.903  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-04 04:56:57.904  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-04 04:56:57.905 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-04 04:56:57.905 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-04 04:56:57.906 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-04 04:56:57.916 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-04 04:56:57.917 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-04 04:56:57.919 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-04 04:56:57.919 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 04:56:58.128  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-04 04:56:58.130  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-04 04:56:58.131 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-04 04:56:58.131 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 04:56:58.134  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-04 04:56:58.135  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-04 04:56:58.136 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 04:56:58.136 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-04 04:56:58.137 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-04 04:56:58.138 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 04:56:58.139 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-04 04:56:58.139 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-04 04:56:58.142 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 04:56:58.143 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-04 04:56:58.143 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-04 04:56:58.145 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-04 04:56:58.153 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 196806841254939458942522370049762662793861926910 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jun 04 03:02:51 UTC 2022 Final Date: Thu Jun 03 03:02:50 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6f:67:f5:e6:ec:53:2c:57:82:2f:56:a6:82:70:b0:22:1a:b4:1f:7e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0465c66cbabf278d21bc04ed31cdecf082196da8 c5ccd1dceb468985373cf96a92be1d65304549e1 5a8166d782278f9ac2e7fa8b321236f01139061c 37f287746930048258c597c6a07dab28fb1fdb93 ee0539963161c78b30f5ae46bfb705c30767fb6b 068218138530aa1d5a07cb53d11942c5ee9bd588 41c84581b3110fcf3264e05f8d4229e5957917e3 99b48886ad36b86ceecb9cf6731004f84eb421f6 0fd0630186e281f30c03b2d73b60f07fbc7816d9 21f66fc0c1204ac075521d8da96154a823080b03 0fe7d5e15c8e5f05793e9169b3ba39eba93f2eca 682965f42a17b085e98bfed2ba6c9ed7d8b04ee4 f8f4dd0ff53798aadfa438b718822c1e31fe9477 a4ba3e9055d77d02f23f9764f0d7ba08183f4676 2f06701dddbbbcc3d7ff733d292a37cfa9f6065e 298507e72f3b50b4d74ef503bf0ba0bfcb8669f9 2e5dab0977f73087f6720b09ddad3914dfc03759 9768a248afbed2140101a9cc98a89c84229afbc9 ab6a1801395b9e5b3285a7c86124e21569feda18 9d9ef1ed Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [98:c3:30:74:10:30:d5:cb:bb:53:38:5a:7b:20:59:52:67:09:27:a8] modulus: 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 public exponent: 10001 ] 2022-06-04 04:58:59.444  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-04 04:58:59.448 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-04 04:58:59.451 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-04 04:58:59.452 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-04 04:58:59.453  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-04 04:58:59.454  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-04 04:58:59.455  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-04 04:58:59.456 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-04 04:58:59.457 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-04 04:58:59.457 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-04 04:58:59.464 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-04 04:58:59.465 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-04 04:58:59.466 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-04 04:58:59.466 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 04:58:59.629  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-04 04:58:59.630  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-04 04:58:59.630 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-04 04:58:59.631 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 04:58:59.632  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-04 04:58:59.633  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-04 04:58:59.634 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 04:58:59.634 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-04 04:58:59.634 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-04 04:58:59.635 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 04:58:59.635 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-04 04:58:59.636 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-04 04:58:59.636 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 04:58:59.637 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-04 04:58:59.637 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-04 04:58:59.638 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-04 04:58:59.643 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 196806841254939458942522370049762662793861926910 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jun 04 03:02:51 UTC 2022 Final Date: Thu Jun 03 03:02:50 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6f:67:f5:e6:ec:53:2c:57:82:2f:56:a6:82:70:b0:22:1a:b4:1f:7e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0465c66cbabf278d21bc04ed31cdecf082196da8 c5ccd1dceb468985373cf96a92be1d65304549e1 5a8166d782278f9ac2e7fa8b321236f01139061c 37f287746930048258c597c6a07dab28fb1fdb93 ee0539963161c78b30f5ae46bfb705c30767fb6b 068218138530aa1d5a07cb53d11942c5ee9bd588 41c84581b3110fcf3264e05f8d4229e5957917e3 99b48886ad36b86ceecb9cf6731004f84eb421f6 0fd0630186e281f30c03b2d73b60f07fbc7816d9 21f66fc0c1204ac075521d8da96154a823080b03 0fe7d5e15c8e5f05793e9169b3ba39eba93f2eca 682965f42a17b085e98bfed2ba6c9ed7d8b04ee4 f8f4dd0ff53798aadfa438b718822c1e31fe9477 a4ba3e9055d77d02f23f9764f0d7ba08183f4676 2f06701dddbbbcc3d7ff733d292a37cfa9f6065e 298507e72f3b50b4d74ef503bf0ba0bfcb8669f9 2e5dab0977f73087f6720b09ddad3914dfc03759 9768a248afbed2140101a9cc98a89c84229afbc9 ab6a1801395b9e5b3285a7c86124e21569feda18 9d9ef1ed Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [60:9a:4f:fa:3a:ab:2c:59:a2:38:32:c4:59:32:f9:ce:62:70:34:9b] modulus: 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 public exponent: 10001 ] 2022-06-04 05:02:32.538  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-04 05:02:32.543 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-04 05:02:32.548 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-04 05:02:32.550 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-04 05:02:32.551  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-04 05:02:32.552  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-04 05:02:32.553  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-04 05:02:32.554 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-04 05:02:32.554 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-04 05:02:32.555 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-04 05:02:32.568 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-04 05:02:32.571 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-04 05:02:32.571 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-04 05:02:32.572 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 05:02:32.889  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-04 05:02:32.895  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-04 05:02:32.896 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-04 05:02:32.896 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 05:02:32.902  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-04 05:02:32.903  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-04 05:02:32.904 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 05:02:32.913 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-04 05:02:32.914 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-04 05:02:32.916 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 05:02:32.916 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-04 05:02:32.917 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-04 05:02:32.919 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 05:02:32.919 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-04 05:02:32.920 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-04 05:02:32.922 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-04 05:02:32.931 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 196806841254939458942522370049762662793861926910 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jun 04 03:02:51 UTC 2022 Final Date: Thu Jun 03 03:02:50 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6f:67:f5:e6:ec:53:2c:57:82:2f:56:a6:82:70:b0:22:1a:b4:1f:7e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0465c66cbabf278d21bc04ed31cdecf082196da8 c5ccd1dceb468985373cf96a92be1d65304549e1 5a8166d782278f9ac2e7fa8b321236f01139061c 37f287746930048258c597c6a07dab28fb1fdb93 ee0539963161c78b30f5ae46bfb705c30767fb6b 068218138530aa1d5a07cb53d11942c5ee9bd588 41c84581b3110fcf3264e05f8d4229e5957917e3 99b48886ad36b86ceecb9cf6731004f84eb421f6 0fd0630186e281f30c03b2d73b60f07fbc7816d9 21f66fc0c1204ac075521d8da96154a823080b03 0fe7d5e15c8e5f05793e9169b3ba39eba93f2eca 682965f42a17b085e98bfed2ba6c9ed7d8b04ee4 f8f4dd0ff53798aadfa438b718822c1e31fe9477 a4ba3e9055d77d02f23f9764f0d7ba08183f4676 2f06701dddbbbcc3d7ff733d292a37cfa9f6065e 298507e72f3b50b4d74ef503bf0ba0bfcb8669f9 2e5dab0977f73087f6720b09ddad3914dfc03759 9768a248afbed2140101a9cc98a89c84229afbc9 ab6a1801395b9e5b3285a7c86124e21569feda18 9d9ef1ed Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1f:34:70:f2:de:18:58:a5:86:2a:bf:7b:d9:c2:ef:e4:90:40:e9:26] modulus: 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 public exponent: 10001 ] 2022-06-04 05:07:37.404  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-04 05:07:37.408 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-04 05:07:37.412 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-04 05:07:37.414 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-04 05:07:37.415  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-04 05:07:37.416  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-04 05:07:37.417  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-04 05:07:37.417 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-04 05:07:37.418 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-04 05:07:37.419 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-04 05:07:37.426 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-04 05:07:37.428 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-04 05:07:37.428 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-04 05:07:37.429 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 05:07:37.609  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-04 05:07:37.610  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-04 05:07:37.611 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-04 05:07:37.612 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 05:07:37.616  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-04 05:07:37.617  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-04 05:07:37.618 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 05:07:37.619 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-04 05:07:37.619 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-04 05:07:37.621 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 05:07:37.621 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-04 05:07:37.622 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-04 05:07:37.623 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 05:07:37.624 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-04 05:07:37.624 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-04 05:07:37.626 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-04 05:07:37.632 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 196806841254939458942522370049762662793861926910 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jun 04 03:02:51 UTC 2022 Final Date: Thu Jun 03 03:02:50 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6f:67:f5:e6:ec:53:2c:57:82:2f:56:a6:82:70:b0:22:1a:b4:1f:7e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0465c66cbabf278d21bc04ed31cdecf082196da8 c5ccd1dceb468985373cf96a92be1d65304549e1 5a8166d782278f9ac2e7fa8b321236f01139061c 37f287746930048258c597c6a07dab28fb1fdb93 ee0539963161c78b30f5ae46bfb705c30767fb6b 068218138530aa1d5a07cb53d11942c5ee9bd588 41c84581b3110fcf3264e05f8d4229e5957917e3 99b48886ad36b86ceecb9cf6731004f84eb421f6 0fd0630186e281f30c03b2d73b60f07fbc7816d9 21f66fc0c1204ac075521d8da96154a823080b03 0fe7d5e15c8e5f05793e9169b3ba39eba93f2eca 682965f42a17b085e98bfed2ba6c9ed7d8b04ee4 f8f4dd0ff53798aadfa438b718822c1e31fe9477 a4ba3e9055d77d02f23f9764f0d7ba08183f4676 2f06701dddbbbcc3d7ff733d292a37cfa9f6065e 298507e72f3b50b4d74ef503bf0ba0bfcb8669f9 2e5dab0977f73087f6720b09ddad3914dfc03759 9768a248afbed2140101a9cc98a89c84229afbc9 ab6a1801395b9e5b3285a7c86124e21569feda18 9d9ef1ed Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [01:1e:cd:3c:69:24:0b:01:0d:0d:fa:ac:1e:f3:b7:bb:fc:c1:d9:a1] modulus: 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 public exponent: 10001 ] 2022-06-04 05:11:42.591  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-04 05:11:42.598 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-04 05:11:42.602 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-04 05:11:42.605 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-04 05:11:42.605  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-04 05:11:42.606  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-04 05:11:42.607  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-04 05:11:42.608 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-04 05:11:42.608 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-04 05:11:42.609 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-04 05:11:42.622 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-04 05:11:42.625 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-04 05:11:42.626 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-04 05:11:42.627 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 05:11:42.942  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-04 05:11:42.943  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-04 05:11:42.943 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-04 05:11:42.944 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 05:11:42.947  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-04 05:11:42.948  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-04 05:11:42.949 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 05:11:42.949 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-04 05:11:42.954 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-04 05:11:42.956 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 05:11:42.957 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-04 05:11:42.957 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-04 05:11:42.963 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 05:11:42.964 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-04 05:11:42.964 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-04 05:11:42.965 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-04 05:11:42.971 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 196806841254939458942522370049762662793861926910 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jun 04 03:02:51 UTC 2022 Final Date: Thu Jun 03 03:02:50 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6f:67:f5:e6:ec:53:2c:57:82:2f:56:a6:82:70:b0:22:1a:b4:1f:7e] modulus: 9d4c4473ce8095707c66c11def36de633b04e70207c275918840cc8299d7b50f84e62d023a0ae2c811873247a0705e858453999ab2a2f9e9135253aedf460869a9782dc7f349f2711ffd9fce9db51363ab078dcd100466aeae7cdf93d77389e1f7c5594ec846e254004d40dc4fdb3baaeb1e5057a95a7d1a9fff17be2c5a3654449858bf2d0e8621b18eeaed6590a9b96a9935c0e678da179151ad11e8e899e15b6d5eb985f99b12860ca4ba66b9ab7fe899edbdf2512ce361a8a5c9e89c19a982d98e8627995a34f78cd665687d32853dcd805d12d1429b278dc373df01b29af3b5ad095a9ef9b14ed79dde007ef3ccc7f31d4893c01da47f5932d0f2115c99a5aef9d7f1db8a20e08381d4c0e7df3661c83951ee0a74302de15b6aebec1363a7be36f006783bfb1899c884205c54cc37c248bf08774a7a49d0c82fdab334eb08c1d7ac0906920c043517741e5fb4241864560867a153bec125d889a797472211b9f78882da1b65e49b9459f2418f02cc18dde1b48caf142e068ff4051a6131 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0465c66cbabf278d21bc04ed31cdecf082196da8 c5ccd1dceb468985373cf96a92be1d65304549e1 5a8166d782278f9ac2e7fa8b321236f01139061c 37f287746930048258c597c6a07dab28fb1fdb93 ee0539963161c78b30f5ae46bfb705c30767fb6b 068218138530aa1d5a07cb53d11942c5ee9bd588 41c84581b3110fcf3264e05f8d4229e5957917e3 99b48886ad36b86ceecb9cf6731004f84eb421f6 0fd0630186e281f30c03b2d73b60f07fbc7816d9 21f66fc0c1204ac075521d8da96154a823080b03 0fe7d5e15c8e5f05793e9169b3ba39eba93f2eca 682965f42a17b085e98bfed2ba6c9ed7d8b04ee4 f8f4dd0ff53798aadfa438b718822c1e31fe9477 a4ba3e9055d77d02f23f9764f0d7ba08183f4676 2f06701dddbbbcc3d7ff733d292a37cfa9f6065e 298507e72f3b50b4d74ef503bf0ba0bfcb8669f9 2e5dab0977f73087f6720b09ddad3914dfc03759 9768a248afbed2140101a9cc98a89c84229afbc9 ab6a1801395b9e5b3285a7c86124e21569feda18 9d9ef1ed Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [19:c0:cc:ab:38:77:bc:df:bc:63:53:72:22:f5:39:d4:26:ee:03:7a] modulus: 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 public exponent: 10001 ] 2022-06-04 05:15:51.256  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-04 05:15:51.260 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-04 05:15:51.263 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-04 05:15:51.265 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-04 05:15:51.266  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-04 05:15:51.267  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-04 05:15:51.267  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-04 05:15:51.268 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-04 05:15:51.269 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-04 05:15:51.270 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-04 05:15:51.277 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-04 05:15:51.279 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-04 05:15:51.280 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-04 05:15:51.280 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 05:15:51.494  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-04 05:15:51.495  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-04 05:15:51.496 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-04 05:15:51.497 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 05:15:51.499  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-04 05:15:51.504  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-04 05:15:51.505 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 05:15:51.506 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-04 05:15:51.507 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-04 05:15:51.508 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 05:15:51.509 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-04 05:15:51.510 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-04 05:15:51.511 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 05:15:51.512 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-04 05:15:51.512 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-04 05:15:51.516 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-04 05:15:51.529 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 196806841254939458942522370049762662793861926910 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jun 04 03:02:51 UTC 2022 Final Date: Thu Jun 03 03:02:50 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6f:67:f5:e6:ec:53:2c:57:82:2f:56:a6:82:70:b0:22:1a:b4:1f:7e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0465c66cbabf278d21bc04ed31cdecf082196da8 c5ccd1dceb468985373cf96a92be1d65304549e1 5a8166d782278f9ac2e7fa8b321236f01139061c 37f287746930048258c597c6a07dab28fb1fdb93 ee0539963161c78b30f5ae46bfb705c30767fb6b 068218138530aa1d5a07cb53d11942c5ee9bd588 41c84581b3110fcf3264e05f8d4229e5957917e3 99b48886ad36b86ceecb9cf6731004f84eb421f6 0fd0630186e281f30c03b2d73b60f07fbc7816d9 21f66fc0c1204ac075521d8da96154a823080b03 0fe7d5e15c8e5f05793e9169b3ba39eba93f2eca 682965f42a17b085e98bfed2ba6c9ed7d8b04ee4 f8f4dd0ff53798aadfa438b718822c1e31fe9477 a4ba3e9055d77d02f23f9764f0d7ba08183f4676 2f06701dddbbbcc3d7ff733d292a37cfa9f6065e 298507e72f3b50b4d74ef503bf0ba0bfcb8669f9 2e5dab0977f73087f6720b09ddad3914dfc03759 9768a248afbed2140101a9cc98a89c84229afbc9 ab6a1801395b9e5b3285a7c86124e21569feda18 9d9ef1ed Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [08:22:be:a1:24:89:4a:fe:f4:a0:42:16:0b:1c:38:c6:62:fc:ac:d3] modulus: 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 public exponent: 10001 ] 2022-06-04 05:19:44.437  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-04 05:19:44.440 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-04 05:19:44.444 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-04 05:19:44.445 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-04 05:19:44.445  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-04 05:19:44.446  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-04 05:19:44.447  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-04 05:19:44.447 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-04 05:19:44.448 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-04 05:19:44.448 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-04 05:19:44.456 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-04 05:19:44.458 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-04 05:19:44.459 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-04 05:19:44.460 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 05:19:44.720  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-04 05:19:44.721  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-04 05:19:44.722 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-04 05:19:44.723 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 05:19:44.724  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-04 05:19:44.725  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-04 05:19:44.726 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 05:19:44.726 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-04 05:19:44.727 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-04 05:19:44.728 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 05:19:44.728 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-04 05:19:44.728 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-04 05:19:44.729 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 05:19:44.730 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-04 05:19:44.730 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-04 05:19:44.731 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-04 05:19:44.736 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 196806841254939458942522370049762662793861926910 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jun 04 03:02:51 UTC 2022 Final Date: Thu Jun 03 03:02:50 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6f:67:f5:e6:ec:53:2c:57:82:2f:56:a6:82:70:b0:22:1a:b4:1f:7e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0465c66cbabf278d21bc04ed31cdecf082196da8 c5ccd1dceb468985373cf96a92be1d65304549e1 5a8166d782278f9ac2e7fa8b321236f01139061c 37f287746930048258c597c6a07dab28fb1fdb93 ee0539963161c78b30f5ae46bfb705c30767fb6b 068218138530aa1d5a07cb53d11942c5ee9bd588 41c84581b3110fcf3264e05f8d4229e5957917e3 99b48886ad36b86ceecb9cf6731004f84eb421f6 0fd0630186e281f30c03b2d73b60f07fbc7816d9 21f66fc0c1204ac075521d8da96154a823080b03 0fe7d5e15c8e5f05793e9169b3ba39eba93f2eca 682965f42a17b085e98bfed2ba6c9ed7d8b04ee4 f8f4dd0ff53798aadfa438b718822c1e31fe9477 a4ba3e9055d77d02f23f9764f0d7ba08183f4676 2f06701dddbbbcc3d7ff733d292a37cfa9f6065e 298507e72f3b50b4d74ef503bf0ba0bfcb8669f9 2e5dab0977f73087f6720b09ddad3914dfc03759 9768a248afbed2140101a9cc98a89c84229afbc9 ab6a1801395b9e5b3285a7c86124e21569feda18 9d9ef1ed Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a0:ec:ab:1e:cb:b0:ed:95:e5:61:3b:c7:9c:bc:a5:39:93:51:a7:0c] modulus: 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 public exponent: 10001 ] 2022-06-04 05:21:18.213  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-04 05:21:18.216 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-04 05:21:18.218 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-04 05:21:18.219 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-04 05:21:18.220  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-04 05:21:18.220  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-04 05:21:18.221  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-04 05:21:18.221 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-04 05:21:18.222 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-04 05:21:18.222 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-04 05:21:18.229 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-04 05:21:18.230 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-04 05:21:18.231 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-04 05:21:18.231 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 05:21:18.398  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-04 05:21:18.399  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-04 05:21:18.400 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-04 05:21:18.400 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 05:21:18.404  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-04 05:21:18.405  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-04 05:21:18.406 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 05:21:18.406 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-04 05:21:18.406 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-04 05:21:18.408 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 05:21:18.408 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-04 05:21:18.409 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-04 05:21:18.411 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 05:21:18.411 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-04 05:21:18.412 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-04 05:21:18.413 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-04 05:21:18.422 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 196806841254939458942522370049762662793861926910 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jun 04 03:02:51 UTC 2022 Final Date: Thu Jun 03 03:02:50 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6f:67:f5:e6:ec:53:2c:57:82:2f:56:a6:82:70:b0:22:1a:b4:1f:7e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0465c66cbabf278d21bc04ed31cdecf082196da8 c5ccd1dceb468985373cf96a92be1d65304549e1 5a8166d782278f9ac2e7fa8b321236f01139061c 37f287746930048258c597c6a07dab28fb1fdb93 ee0539963161c78b30f5ae46bfb705c30767fb6b 068218138530aa1d5a07cb53d11942c5ee9bd588 41c84581b3110fcf3264e05f8d4229e5957917e3 99b48886ad36b86ceecb9cf6731004f84eb421f6 0fd0630186e281f30c03b2d73b60f07fbc7816d9 21f66fc0c1204ac075521d8da96154a823080b03 0fe7d5e15c8e5f05793e9169b3ba39eba93f2eca 682965f42a17b085e98bfed2ba6c9ed7d8b04ee4 f8f4dd0ff53798aadfa438b718822c1e31fe9477 a4ba3e9055d77d02f23f9764f0d7ba08183f4676 2f06701dddbbbcc3d7ff733d292a37cfa9f6065e 298507e72f3b50b4d74ef503bf0ba0bfcb8669f9 2e5dab0977f73087f6720b09ddad3914dfc03759 9768a248afbed2140101a9cc98a89c84229afbc9 ab6a1801395b9e5b3285a7c86124e21569feda18 9d9ef1ed Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d5:13:bb:fb:17:1f:4c:c4:df:b6:cc:a5:79:ce:2f:ac:58:70:fe:98] modulus: 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 public exponent: 10001 ] 2022-06-04 05:23:34.598  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-04 05:23:34.603 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-04 05:23:34.605 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-04 05:23:34.607 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-04 05:23:34.608  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-04 05:23:34.609  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-04 05:23:34.615  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-04 05:23:34.617 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-04 05:23:34.619 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-04 05:23:34.620 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-04 05:23:34.629 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-04 05:23:34.631 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-04 05:23:34.634 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-04 05:23:34.635 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 05:23:34.870  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-04 05:23:34.875  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-04 05:23:34.875 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-04 05:23:34.876 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 05:23:34.881  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-04 05:23:34.882  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-04 05:23:34.882 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 05:23:34.883 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-04 05:23:34.883 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-04 05:23:34.885 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 05:23:34.888 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-04 05:23:34.888 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-04 05:23:34.890 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 05:23:34.891 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-04 05:23:34.891 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-04 05:23:34.893 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-04 05:23:34.902 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 196806841254939458942522370049762662793861926910 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jun 04 03:02:51 UTC 2022 Final Date: Thu Jun 03 03:02:50 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6f:67:f5:e6:ec:53:2c:57:82:2f:56:a6:82:70:b0:22:1a:b4:1f:7e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0465c66cbabf278d21bc04ed31cdecf082196da8 c5ccd1dceb468985373cf96a92be1d65304549e1 5a8166d782278f9ac2e7fa8b321236f01139061c 37f287746930048258c597c6a07dab28fb1fdb93 ee0539963161c78b30f5ae46bfb705c30767fb6b 068218138530aa1d5a07cb53d11942c5ee9bd588 41c84581b3110fcf3264e05f8d4229e5957917e3 99b48886ad36b86ceecb9cf6731004f84eb421f6 0fd0630186e281f30c03b2d73b60f07fbc7816d9 21f66fc0c1204ac075521d8da96154a823080b03 0fe7d5e15c8e5f05793e9169b3ba39eba93f2eca 682965f42a17b085e98bfed2ba6c9ed7d8b04ee4 f8f4dd0ff53798aadfa438b718822c1e31fe9477 a4ba3e9055d77d02f23f9764f0d7ba08183f4676 2f06701dddbbbcc3d7ff733d292a37cfa9f6065e 298507e72f3b50b4d74ef503bf0ba0bfcb8669f9 2e5dab0977f73087f6720b09ddad3914dfc03759 9768a248afbed2140101a9cc98a89c84229afbc9 ab6a1801395b9e5b3285a7c86124e21569feda18 9d9ef1ed Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6e:d7:ad:77:60:23:02:48:8c:60:f9:e0:45:b3:b1:56:5d:cf:f6:d3] modulus: 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 public exponent: 10001 ] 2022-06-04 05:26:22.102  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-04 05:26:22.107 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-04 05:26:22.111 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-04 05:26:22.118 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-04 05:26:22.119  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-04 05:26:22.120  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-04 05:26:22.120  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-04 05:26:22.121 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-04 05:26:22.121 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-04 05:26:22.122 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-04 05:26:22.130 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-04 05:26:22.131 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-04 05:26:22.132 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-04 05:26:22.133 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 05:26:22.334  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-04 05:26:22.335  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-04 05:26:22.336 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-04 05:26:22.336 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 05:26:22.339  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-04 05:26:22.340  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-04 05:26:22.341 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 05:26:22.342 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-04 05:26:22.342 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-04 05:26:22.343 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 05:26:22.344 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-04 05:26:22.344 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-04 05:26:22.345 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 05:26:22.346 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-04 05:26:22.346 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-04 05:26:22.348 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-04 05:26:22.355 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 196806841254939458942522370049762662793861926910 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jun 04 03:02:51 UTC 2022 Final Date: Thu Jun 03 03:02:50 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6f:67:f5:e6:ec:53:2c:57:82:2f:56:a6:82:70:b0:22:1a:b4:1f:7e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0465c66cbabf278d21bc04ed31cdecf082196da8 c5ccd1dceb468985373cf96a92be1d65304549e1 5a8166d782278f9ac2e7fa8b321236f01139061c 37f287746930048258c597c6a07dab28fb1fdb93 ee0539963161c78b30f5ae46bfb705c30767fb6b 068218138530aa1d5a07cb53d11942c5ee9bd588 41c84581b3110fcf3264e05f8d4229e5957917e3 99b48886ad36b86ceecb9cf6731004f84eb421f6 0fd0630186e281f30c03b2d73b60f07fbc7816d9 21f66fc0c1204ac075521d8da96154a823080b03 0fe7d5e15c8e5f05793e9169b3ba39eba93f2eca 682965f42a17b085e98bfed2ba6c9ed7d8b04ee4 f8f4dd0ff53798aadfa438b718822c1e31fe9477 a4ba3e9055d77d02f23f9764f0d7ba08183f4676 2f06701dddbbbcc3d7ff733d292a37cfa9f6065e 298507e72f3b50b4d74ef503bf0ba0bfcb8669f9 2e5dab0977f73087f6720b09ddad3914dfc03759 9768a248afbed2140101a9cc98a89c84229afbc9 ab6a1801395b9e5b3285a7c86124e21569feda18 9d9ef1ed Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [cf:0b:ce:4e:34:22:00:79:de:6d:4e:ad:f2:ef:b1:a6:4f:21:db:19] modulus: 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 public exponent: 10001 ] 2022-06-04 05:26:43.356  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-04 05:26:43.358 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-04 05:26:43.363 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-04 05:26:43.366 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-04 05:26:43.367  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-04 05:26:43.368  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-04 05:26:43.368  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-04 05:26:43.369 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-04 05:26:43.371 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-04 05:26:43.372 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-04 05:26:43.382 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-04 05:26:43.383 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-04 05:26:43.384 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-04 05:26:43.384 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 05:26:43.574  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-04 05:26:43.574  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-04 05:26:43.575 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-04 05:26:43.575 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 05:26:43.577  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-04 05:26:43.577  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-04 05:26:43.578 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 05:26:43.578 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-04 05:26:43.578 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-04 05:26:43.579 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 05:26:43.580 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-04 05:26:43.580 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-04 05:26:43.582 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 05:26:43.582 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-04 05:26:43.583 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-04 05:26:43.584 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-04 05:26:43.591 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 196806841254939458942522370049762662793861926910 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jun 04 03:02:51 UTC 2022 Final Date: Thu Jun 03 03:02:50 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6f:67:f5:e6:ec:53:2c:57:82:2f:56:a6:82:70:b0:22:1a:b4:1f:7e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0465c66cbabf278d21bc04ed31cdecf082196da8 c5ccd1dceb468985373cf96a92be1d65304549e1 5a8166d782278f9ac2e7fa8b321236f01139061c 37f287746930048258c597c6a07dab28fb1fdb93 ee0539963161c78b30f5ae46bfb705c30767fb6b 068218138530aa1d5a07cb53d11942c5ee9bd588 41c84581b3110fcf3264e05f8d4229e5957917e3 99b48886ad36b86ceecb9cf6731004f84eb421f6 0fd0630186e281f30c03b2d73b60f07fbc7816d9 21f66fc0c1204ac075521d8da96154a823080b03 0fe7d5e15c8e5f05793e9169b3ba39eba93f2eca 682965f42a17b085e98bfed2ba6c9ed7d8b04ee4 f8f4dd0ff53798aadfa438b718822c1e31fe9477 a4ba3e9055d77d02f23f9764f0d7ba08183f4676 2f06701dddbbbcc3d7ff733d292a37cfa9f6065e 298507e72f3b50b4d74ef503bf0ba0bfcb8669f9 2e5dab0977f73087f6720b09ddad3914dfc03759 9768a248afbed2140101a9cc98a89c84229afbc9 ab6a1801395b9e5b3285a7c86124e21569feda18 9d9ef1ed Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ab:49:86:15:50:49:b5:93:fa:35:75:b0:ab:2a:12:eb:88:df:90:ae] modulus: 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 public exponent: 10001 ] 2022-06-04 05:27:23.769  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-04 05:27:23.772 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-04 05:27:23.775 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-04 05:27:23.777 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-04 05:27:23.778  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-04 05:27:23.778  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-04 05:27:23.779  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-04 05:27:23.779 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-04 05:27:23.780 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-04 05:27:23.781 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-04 05:27:23.801 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-04 05:27:23.803 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-04 05:27:23.803 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-04 05:27:23.803 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 05:27:24.020  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-04 05:27:24.021  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-04 05:27:24.022 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-04 05:27:24.022 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 05:27:24.025  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-04 05:27:24.026  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-04 05:27:24.029 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 05:27:24.031 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-04 05:27:24.031 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-04 05:27:24.035 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 05:27:24.036 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-04 05:27:24.037 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-04 05:27:24.041 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 05:27:24.042 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-04 05:27:24.042 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-04 05:27:24.044 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-04 05:27:24.054 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 196806841254939458942522370049762662793861926910 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jun 04 03:02:51 UTC 2022 Final Date: Thu Jun 03 03:02:50 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6f:67:f5:e6:ec:53:2c:57:82:2f:56:a6:82:70:b0:22:1a:b4:1f:7e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0465c66cbabf278d21bc04ed31cdecf082196da8 c5ccd1dceb468985373cf96a92be1d65304549e1 5a8166d782278f9ac2e7fa8b321236f01139061c 37f287746930048258c597c6a07dab28fb1fdb93 ee0539963161c78b30f5ae46bfb705c30767fb6b 068218138530aa1d5a07cb53d11942c5ee9bd588 41c84581b3110fcf3264e05f8d4229e5957917e3 99b48886ad36b86ceecb9cf6731004f84eb421f6 0fd0630186e281f30c03b2d73b60f07fbc7816d9 21f66fc0c1204ac075521d8da96154a823080b03 0fe7d5e15c8e5f05793e9169b3ba39eba93f2eca 682965f42a17b085e98bfed2ba6c9ed7d8b04ee4 f8f4dd0ff53798aadfa438b718822c1e31fe9477 a4ba3e9055d77d02f23f9764f0d7ba08183f4676 2f06701dddbbbcc3d7ff733d292a37cfa9f6065e 298507e72f3b50b4d74ef503bf0ba0bfcb8669f9 2e5dab0977f73087f6720b09ddad3914dfc03759 9768a248afbed2140101a9cc98a89c84229afbc9 ab6a1801395b9e5b3285a7c86124e21569feda18 9d9ef1ed Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7d:b4:67:ac:7a:8f:4d:b9:d5:82:12:65:9c:68:ce:61:22:6a:00:66] modulus: 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 public exponent: 10001 ] 2022-06-04 05:32:02.063  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-04 05:32:02.066 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-04 05:32:02.077 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-04 05:32:02.079 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-04 05:32:02.082  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-04 05:32:02.084  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-04 05:32:02.088  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-04 05:32:02.090 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-04 05:32:02.091 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-04 05:32:02.092 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-04 05:32:02.099 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-04 05:32:02.101 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-04 05:32:02.102 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-04 05:32:02.102 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 05:32:02.357  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-04 05:32:02.358  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-04 05:32:02.358 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-04 05:32:02.359 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 05:32:02.360  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-04 05:32:02.361  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-04 05:32:02.361 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 05:32:02.362 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-04 05:32:02.362 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-04 05:32:02.363 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 05:32:02.363 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-04 05:32:02.363 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-04 05:32:02.364 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 05:32:02.364 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-04 05:32:02.364 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-04 05:32:02.365 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-04 05:32:02.372 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 196806841254939458942522370049762662793861926910 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jun 04 03:02:51 UTC 2022 Final Date: Thu Jun 03 03:02:50 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6f:67:f5:e6:ec:53:2c:57:82:2f:56:a6:82:70:b0:22:1a:b4:1f:7e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0465c66cbabf278d21bc04ed31cdecf082196da8 c5ccd1dceb468985373cf96a92be1d65304549e1 5a8166d782278f9ac2e7fa8b321236f01139061c 37f287746930048258c597c6a07dab28fb1fdb93 ee0539963161c78b30f5ae46bfb705c30767fb6b 068218138530aa1d5a07cb53d11942c5ee9bd588 41c84581b3110fcf3264e05f8d4229e5957917e3 99b48886ad36b86ceecb9cf6731004f84eb421f6 0fd0630186e281f30c03b2d73b60f07fbc7816d9 21f66fc0c1204ac075521d8da96154a823080b03 0fe7d5e15c8e5f05793e9169b3ba39eba93f2eca 682965f42a17b085e98bfed2ba6c9ed7d8b04ee4 f8f4dd0ff53798aadfa438b718822c1e31fe9477 a4ba3e9055d77d02f23f9764f0d7ba08183f4676 2f06701dddbbbcc3d7ff733d292a37cfa9f6065e 298507e72f3b50b4d74ef503bf0ba0bfcb8669f9 2e5dab0977f73087f6720b09ddad3914dfc03759 9768a248afbed2140101a9cc98a89c84229afbc9 ab6a1801395b9e5b3285a7c86124e21569feda18 9d9ef1ed Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [fc:e1:aa:87:e3:c1:09:ad:52:11:24:6e:f1:02:a2:89:0b:5a:0a:c3] modulus: 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 public exponent: 10001 ] 2022-06-04 05:35:53.732  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-04 05:35:53.736 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-04 05:35:53.741 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-04 05:35:53.742 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-04 05:35:53.743  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-04 05:35:53.745  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-04 05:35:53.745  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-04 05:35:53.746 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-04 05:35:53.746 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-04 05:35:53.747 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-04 05:35:53.757 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-04 05:35:53.760 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-04 05:35:53.760 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-04 05:35:53.761 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 05:35:53.959  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-04 05:35:53.960  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-04 05:35:53.961 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-04 05:35:53.961 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 05:35:53.964  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-04 05:35:53.966  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-04 05:35:53.967 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 05:35:53.968 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-04 05:35:53.968 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-04 05:35:53.970 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 05:35:53.970 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-04 05:35:53.971 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-04 05:35:53.972 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 05:35:53.972 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-04 05:35:53.972 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-04 05:35:53.973 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-04 05:35:53.981 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 196806841254939458942522370049762662793861926910 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jun 04 03:02:51 UTC 2022 Final Date: Thu Jun 03 03:02:50 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6f:67:f5:e6:ec:53:2c:57:82:2f:56:a6:82:70:b0:22:1a:b4:1f:7e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0465c66cbabf278d21bc04ed31cdecf082196da8 c5ccd1dceb468985373cf96a92be1d65304549e1 5a8166d782278f9ac2e7fa8b321236f01139061c 37f287746930048258c597c6a07dab28fb1fdb93 ee0539963161c78b30f5ae46bfb705c30767fb6b 068218138530aa1d5a07cb53d11942c5ee9bd588 41c84581b3110fcf3264e05f8d4229e5957917e3 99b48886ad36b86ceecb9cf6731004f84eb421f6 0fd0630186e281f30c03b2d73b60f07fbc7816d9 21f66fc0c1204ac075521d8da96154a823080b03 0fe7d5e15c8e5f05793e9169b3ba39eba93f2eca 682965f42a17b085e98bfed2ba6c9ed7d8b04ee4 f8f4dd0ff53798aadfa438b718822c1e31fe9477 a4ba3e9055d77d02f23f9764f0d7ba08183f4676 2f06701dddbbbcc3d7ff733d292a37cfa9f6065e 298507e72f3b50b4d74ef503bf0ba0bfcb8669f9 2e5dab0977f73087f6720b09ddad3914dfc03759 9768a248afbed2140101a9cc98a89c84229afbc9 ab6a1801395b9e5b3285a7c86124e21569feda18 9d9ef1ed Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [69:43:27:f1:c0:35:51:3b:3c:4a:23:fd:39:fc:78:28:44:24:83:d4] modulus: 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 public exponent: 10001 ] 2022-06-04 05:40:43.780  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-04 05:40:43.783 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-04 05:40:43.787 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-04 05:40:43.789 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-04 05:40:43.789  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-04 05:40:43.790  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-04 05:40:43.791  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-04 05:40:43.791 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-04 05:40:43.792 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-04 05:40:43.792 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-04 05:40:43.801 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-04 05:40:43.804 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-04 05:40:43.805 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-04 05:40:43.808 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 05:40:44.109  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-04 05:40:44.110  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-04 05:40:44.111 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-04 05:40:44.111 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 05:40:44.113  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-04 05:40:44.114  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-04 05:40:44.115 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 05:40:44.116 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-04 05:40:44.116 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-04 05:40:44.117 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 05:40:44.118 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-04 05:40:44.118 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-04 05:40:44.119 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 05:40:44.120 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-04 05:40:44.120 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-04 05:40:44.122 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-04 05:40:44.129 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 196806841254939458942522370049762662793861926910 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jun 04 03:02:51 UTC 2022 Final Date: Thu Jun 03 03:02:50 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6f:67:f5:e6:ec:53:2c:57:82:2f:56:a6:82:70:b0:22:1a:b4:1f:7e] modulus: 9d4c4473ce8095707c66c11def36de633b04e70207c275918840cc8299d7b50f84e62d023a0ae2c811873247a0705e858453999ab2a2f9e9135253aedf460869a9782dc7f349f2711ffd9fce9db51363ab078dcd100466aeae7cdf93d77389e1f7c5594ec846e254004d40dc4fdb3baaeb1e5057a95a7d1a9fff17be2c5a3654449858bf2d0e8621b18eeaed6590a9b96a9935c0e678da179151ad11e8e899e15b6d5eb985f99b12860ca4ba66b9ab7fe899edbdf2512ce361a8a5c9e89c19a982d98e8627995a34f78cd665687d32853dcd805d12d1429b278dc373df01b29af3b5ad095a9ef9b14ed79dde007ef3ccc7f31d4893c01da47f5932d0f2115c99a5aef9d7f1db8a20e08381d4c0e7df3661c83951ee0a74302de15b6aebec1363a7be36f006783bfb1899c884205c54cc37c248bf08774a7a49d0c82fdab334eb08c1d7ac0906920c043517741e5fb4241864560867a153bec125d889a797472211b9f78882da1b65e49b9459f2418f02cc18dde1b48caf142e068ff4051a6131 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0465c66cbabf278d21bc04ed31cdecf082196da8 c5ccd1dceb468985373cf96a92be1d65304549e1 5a8166d782278f9ac2e7fa8b321236f01139061c 37f287746930048258c597c6a07dab28fb1fdb93 ee0539963161c78b30f5ae46bfb705c30767fb6b 068218138530aa1d5a07cb53d11942c5ee9bd588 41c84581b3110fcf3264e05f8d4229e5957917e3 99b48886ad36b86ceecb9cf6731004f84eb421f6 0fd0630186e281f30c03b2d73b60f07fbc7816d9 21f66fc0c1204ac075521d8da96154a823080b03 0fe7d5e15c8e5f05793e9169b3ba39eba93f2eca 682965f42a17b085e98bfed2ba6c9ed7d8b04ee4 f8f4dd0ff53798aadfa438b718822c1e31fe9477 a4ba3e9055d77d02f23f9764f0d7ba08183f4676 2f06701dddbbbcc3d7ff733d292a37cfa9f6065e 298507e72f3b50b4d74ef503bf0ba0bfcb8669f9 2e5dab0977f73087f6720b09ddad3914dfc03759 9768a248afbed2140101a9cc98a89c84229afbc9 ab6a1801395b9e5b3285a7c86124e21569feda18 9d9ef1ed Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [36:79:d6:2f:a1:e3:21:5b:3e:97:ff:bb:bc:7f:80:0b:50:7e:fd:b9] modulus: cee847bf49061031a819be1abcd92c34f5d7fa60c70a37f3d7150b8993692df3c904a01a14a913d750a49059ad5f464bc2f7ee2c1509855235dd43fb50ff9e673d59f321a3c7eb64700d05db57deddbbf516eeb91ba531aa9d8cbff237c48ab18465cf544ad73913862fd75b87854349e1aafb155b04a16ed8f424bac08e0e36994610e8ce06da35c6f193c1dceee482647154365281b07248e9f9c5a954d329128cc3969319cbeff0c8a58077779c88b1e5348c5e89468f1b71a18f6c5f1b328da740f92c0b895cccb1f0f1ced066c9f7146801f033c8b39574cda3163070aaec10bfc54d693eb42eb1de9589e35ebf8b2516bae586ab197b618bd6366df87b public exponent: 10001 ] 2022-06-04 05:44:40.097  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-04 05:44:40.099 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-04 05:44:40.102 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-04 05:44:40.103 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-04 05:44:40.104  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-04 05:44:40.105  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-04 05:44:40.105  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-04 05:44:40.106 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-04 05:44:40.106 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-04 05:44:40.107 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-04 05:44:40.115 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-04 05:44:40.117 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-04 05:44:40.118 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-04 05:44:40.118 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 05:44:40.258  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-04 05:44:40.259  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-04 05:44:40.259 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-04 05:44:40.260 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-04 05:44:40.261  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-04 05:44:40.262  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-04 05:44:40.262 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 05:44:40.262 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-04 05:44:40.263 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-04 05:44:40.264 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 05:44:40.264 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-04 05:44:40.264 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-04 05:44:40.266 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-04 05:44:40.266 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-04 05:44:40.266 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-04 05:44:40.267 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-04 05:44:40.273 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 196806841254939458942522370049762662793861926910 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jun 04 03:02:51 UTC 2022 Final Date: Thu Jun 03 03:02:50 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6f:67:f5:e6:ec:53:2c:57:82:2f:56:a6:82:70:b0:22:1a:b4:1f:7e] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0465c66cbabf278d21bc04ed31cdecf082196da8 c5ccd1dceb468985373cf96a92be1d65304549e1 5a8166d782278f9ac2e7fa8b321236f01139061c 37f287746930048258c597c6a07dab28fb1fdb93 ee0539963161c78b30f5ae46bfb705c30767fb6b 068218138530aa1d5a07cb53d11942c5ee9bd588 41c84581b3110fcf3264e05f8d4229e5957917e3 99b48886ad36b86ceecb9cf6731004f84eb421f6 0fd0630186e281f30c03b2d73b60f07fbc7816d9 21f66fc0c1204ac075521d8da96154a823080b03 0fe7d5e15c8e5f05793e9169b3ba39eba93f2eca 682965f42a17b085e98bfed2ba6c9ed7d8b04ee4 f8f4dd0ff53798aadfa438b718822c1e31fe9477 a4ba3e9055d77d02f23f9764f0d7ba08183f4676 2f06701dddbbbcc3d7ff733d292a37cfa9f6065e 298507e72f3b50b4d74ef503bf0ba0bfcb8669f9 2e5dab0977f73087f6720b09ddad3914dfc03759 9768a248afbed2140101a9cc98a89c84229afbc9 ab6a1801395b9e5b3285a7c86124e21569feda18 9d9ef1ed Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [64:0f:51:e1:e8:3c:55:c7:89:02:68:4a:c8:9e:d9:9f:ce:09:83:7f] modulus: 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 public exponent: 10001 ]