2022-06-14 16:29:38,243 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-06-14 16:29:39,861 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-06-14 16:29:40.937  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Jun 14, 2022 4:29:43 PM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jun 14, 2022 4:29:43 PM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jun 14, 2022 4:29:43 PM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jun 14, 2022 4:29:43 PM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-06-14 16:29:44.635 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-06-14 16:29:45.072  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-06-14 16:29:45.339  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-06-14 16:29:46.340 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-06-14 16:29:46.346 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-06-14 16:29:46.349 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-06-14 16:29:46.357 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-06-14 16:29:46.419 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-06-14 16:29:46.424 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-06-14 16:29:46.629 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-06-14 16:29:47.366 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jun 14, 2022 4:29:48 PM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-06-14 16:29:48.779  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 11.627 seconds (JVM running for 14.082) Jun 14, 2022 4:30:13 PM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-06-14 16:30:28.900  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-14 16:30:28.916 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-14 16:30:28.989 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-06-14 16:30:28.995 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-14 16:30:29.019  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-06-14 16:30:29.022  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-14 16:30:29.023  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-14 16:30:29.024 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-14 16:30:29.025 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-14 16:30:29.029 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-14 16:30:29.036 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-14 16:30:29.040 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-14 16:30:29.101 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-14 16:30:29.108 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-14 16:30:29.109 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-14 16:30:29.114 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-14 16:30:29.944  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-14 16:30:29.948  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-14 16:30:29.948 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-14 16:30:29.950 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-14 16:30:29.964  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-14 16:30:29.966  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-14 16:30:29.968 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 16:30:29.968 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-14 16:30:29.969 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-14 16:30:29.988 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 16:30:29.989 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-14 16:30:29.990 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-14 16:30:30.001 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 16:30:30.002 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-14 16:30:30.003 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-14 16:30:30.005 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-14 16:30:30.035 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 259108171616435258817452829551237291149513660580 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 14 16:26:08 UTC 2022 Final Date: Sun Jun 13 16:26:07 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ea:a7:ef:05:a4:f4:3b:7d:01:f0:92:2b:fb:bf:a2:3b:1e:95:16:f6] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4929be667cb66902315ac84c7740f43af7efda9d 742c7f5a207dd43bdfe6f03152fc7203d48bbb2a 2b1229a1358c22ee94aa5e5d835fd42f14f41030 deeef27c2c61449ca900844072e8280093e726e4 2d01d09ae80bf4b9ce4eb7a36b3aca0364022d14 76f48b9c7a3c5e526f28755706364fe7a295ada5 f4cba41a58db2a4fb8773c2d3371fbfb5bc7319b 4260961e2b0d8da049638fdb56e5d01bd621c914 7b17640aca5991e166f11ef93ce9717171772723 7ce13ddfe360dd7cfe8edbd6838a1c3ef39f0233 4abb8f82c102b149387735f304a54928d2750a83 f9d62268954f55e1346f858f93af6a2797330450 dc384a7ee46b59df88ba5090804c458c0be34840 6459e13fe2941a02f328e8340f498f23099b4c82 2913fa983af62c13abc7b992f1b433387ef3dabc c4ff91ddb350acfbc64fa31d548b4139081720f0 e9797fd097b3ed6c7f4a2a27598ee5fdc507359c f7e2e818ff82179e8c7b474cd01985054a119028 ba76028a389d30e2fe72b9db9655b1db6383a4eb 2d506329 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [af:a7:b7:f2:6f:35:58:41:9e:88:32:92:c2:50:ac:94:57:18:53:b6] modulus: b181a51db1aff2dda7c7345ce7aa3c893f1839af22bfc2b4de0017bf6cdeafc2d82363ee93922bf78c1aef8ecf251d70862a970b40fde3c34788dee1fe45e550d96b6ab61d9d05bcbe1e8613830d3d080284d1fd7541f18a087286d763e3995ce86d22fb197d6126da423111e26f3e4421c7a5c5601f59d0e955485b4055f41dcbcc21a23eaa780b7fee02e04d98f8888b56116125d8a34f530fdf951e291a8d40e38109d702adb3559372a7d7708902e302f4c5ff38b363022613c6ac98793d17d3a3a1ef7483e5179957dd40461d3d2fd7ab2454c76b64411508b945aa0b842640d98375459350e11fa842cd1bd37b97cd0b322cd3536b3036ce21836a68df public exponent: 10001 ] 2022-06-14 17:49:35.626  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-14 17:49:35.629 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-14 17:49:35.632 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-14 17:49:35.634 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-14 17:49:35.635  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-14 17:49:35.636  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-14 17:49:35.637  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-14 17:49:35.637 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-14 17:49:35.638 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-14 17:49:35.639 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-14 17:49:35.646 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-14 17:49:35.648 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-14 17:49:35.648 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-14 17:49:35.649 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-14 17:49:36.034  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-14 17:49:36.036  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-14 17:49:36.036 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-14 17:49:36.037 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-14 17:49:36.040  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-14 17:49:36.041  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-14 17:49:36.042 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 17:49:36.042 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-14 17:49:36.043 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-14 17:49:36.044 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 17:49:36.045 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-14 17:49:36.045 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-14 17:49:36.046 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 17:49:36.047 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-14 17:49:36.047 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-14 17:49:36.049 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-14 17:49:36.055 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 259108171616435258817452829551237291149513660580 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 14 16:26:08 UTC 2022 Final Date: Sun Jun 13 16:26:07 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ea:a7:ef:05:a4:f4:3b:7d:01:f0:92:2b:fb:bf:a2:3b:1e:95:16:f6] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4929be667cb66902315ac84c7740f43af7efda9d 742c7f5a207dd43bdfe6f03152fc7203d48bbb2a 2b1229a1358c22ee94aa5e5d835fd42f14f41030 deeef27c2c61449ca900844072e8280093e726e4 2d01d09ae80bf4b9ce4eb7a36b3aca0364022d14 76f48b9c7a3c5e526f28755706364fe7a295ada5 f4cba41a58db2a4fb8773c2d3371fbfb5bc7319b 4260961e2b0d8da049638fdb56e5d01bd621c914 7b17640aca5991e166f11ef93ce9717171772723 7ce13ddfe360dd7cfe8edbd6838a1c3ef39f0233 4abb8f82c102b149387735f304a54928d2750a83 f9d62268954f55e1346f858f93af6a2797330450 dc384a7ee46b59df88ba5090804c458c0be34840 6459e13fe2941a02f328e8340f498f23099b4c82 2913fa983af62c13abc7b992f1b433387ef3dabc c4ff91ddb350acfbc64fa31d548b4139081720f0 e9797fd097b3ed6c7f4a2a27598ee5fdc507359c f7e2e818ff82179e8c7b474cd01985054a119028 ba76028a389d30e2fe72b9db9655b1db6383a4eb 2d506329 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [de:2e:df:9e:92:52:f4:ed:86:45:c1:a9:76:0c:60:cc:b0:4a:76:ef] modulus: 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 public exponent: 10001 ] 2022-06-14 17:51:37.828  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-14 17:51:37.831 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-14 17:51:37.836 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-14 17:51:37.838 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-14 17:51:37.839  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-14 17:51:37.841  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-14 17:51:37.842  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-14 17:51:37.843 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-14 17:51:37.844 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-14 17:51:37.845 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-14 17:51:37.861 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-14 17:51:37.863 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-14 17:51:37.864 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-14 17:51:37.865 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-14 17:51:38.104  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-14 17:51:38.105  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-14 17:51:38.106 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-14 17:51:38.107 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-14 17:51:38.111  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-14 17:51:38.112  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-14 17:51:38.113 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 17:51:38.114 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-14 17:51:38.114 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-14 17:51:38.120 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 17:51:38.121 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-14 17:51:38.122 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-14 17:51:38.124 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 17:51:38.125 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-14 17:51:38.125 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-14 17:51:38.129 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-14 17:51:38.173 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 259108171616435258817452829551237291149513660580 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 14 16:26:08 UTC 2022 Final Date: Sun Jun 13 16:26:07 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ea:a7:ef:05:a4:f4:3b:7d:01:f0:92:2b:fb:bf:a2:3b:1e:95:16:f6] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4929be667cb66902315ac84c7740f43af7efda9d 742c7f5a207dd43bdfe6f03152fc7203d48bbb2a 2b1229a1358c22ee94aa5e5d835fd42f14f41030 deeef27c2c61449ca900844072e8280093e726e4 2d01d09ae80bf4b9ce4eb7a36b3aca0364022d14 76f48b9c7a3c5e526f28755706364fe7a295ada5 f4cba41a58db2a4fb8773c2d3371fbfb5bc7319b 4260961e2b0d8da049638fdb56e5d01bd621c914 7b17640aca5991e166f11ef93ce9717171772723 7ce13ddfe360dd7cfe8edbd6838a1c3ef39f0233 4abb8f82c102b149387735f304a54928d2750a83 f9d62268954f55e1346f858f93af6a2797330450 dc384a7ee46b59df88ba5090804c458c0be34840 6459e13fe2941a02f328e8340f498f23099b4c82 2913fa983af62c13abc7b992f1b433387ef3dabc c4ff91ddb350acfbc64fa31d548b4139081720f0 e9797fd097b3ed6c7f4a2a27598ee5fdc507359c f7e2e818ff82179e8c7b474cd01985054a119028 ba76028a389d30e2fe72b9db9655b1db6383a4eb 2d506329 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [30:e0:40:ec:6e:92:8e:d8:c3:e2:18:17:0d:b4:63:77:b7:82:ca:05] modulus: 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 public exponent: 10001 ] 2022-06-14 17:52:57.772  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-14 17:52:57.776 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-14 17:52:57.780 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-14 17:52:57.782 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-14 17:52:57.782  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-14 17:52:57.784  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-14 17:52:57.784  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-14 17:52:57.785 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-14 17:52:57.785 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-14 17:52:57.786 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-14 17:52:57.794 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-14 17:52:57.796 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-14 17:52:57.796 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-14 17:52:57.797 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-14 17:52:58.032  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-14 17:52:58.033  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-14 17:52:58.034 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-14 17:52:58.035 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-14 17:52:58.038  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-14 17:52:58.039  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-14 17:52:58.040 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 17:52:58.040 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-14 17:52:58.041 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-14 17:52:58.042 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 17:52:58.043 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-14 17:52:58.043 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-14 17:52:58.044 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 17:52:58.045 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-14 17:52:58.045 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-14 17:52:58.047 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-14 17:52:58.055 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 259108171616435258817452829551237291149513660580 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 14 16:26:08 UTC 2022 Final Date: Sun Jun 13 16:26:07 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ea:a7:ef:05:a4:f4:3b:7d:01:f0:92:2b:fb:bf:a2:3b:1e:95:16:f6] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4929be667cb66902315ac84c7740f43af7efda9d 742c7f5a207dd43bdfe6f03152fc7203d48bbb2a 2b1229a1358c22ee94aa5e5d835fd42f14f41030 deeef27c2c61449ca900844072e8280093e726e4 2d01d09ae80bf4b9ce4eb7a36b3aca0364022d14 76f48b9c7a3c5e526f28755706364fe7a295ada5 f4cba41a58db2a4fb8773c2d3371fbfb5bc7319b 4260961e2b0d8da049638fdb56e5d01bd621c914 7b17640aca5991e166f11ef93ce9717171772723 7ce13ddfe360dd7cfe8edbd6838a1c3ef39f0233 4abb8f82c102b149387735f304a54928d2750a83 f9d62268954f55e1346f858f93af6a2797330450 dc384a7ee46b59df88ba5090804c458c0be34840 6459e13fe2941a02f328e8340f498f23099b4c82 2913fa983af62c13abc7b992f1b433387ef3dabc c4ff91ddb350acfbc64fa31d548b4139081720f0 e9797fd097b3ed6c7f4a2a27598ee5fdc507359c f7e2e818ff82179e8c7b474cd01985054a119028 ba76028a389d30e2fe72b9db9655b1db6383a4eb 2d506329 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [08:11:17:e5:16:50:d4:33:93:27:35:49:35:39:41:6d:52:04:72:86] modulus: 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 public exponent: 10001 ] 2022-06-14 17:55:40.890  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-14 17:55:40.891 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-14 17:55:40.893 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-14 17:55:40.894 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-14 17:55:40.897  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-14 17:55:40.898  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-14 17:55:40.899  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-14 17:55:40.900 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-14 17:55:40.900 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-14 17:55:40.901 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-14 17:55:40.907 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-14 17:55:40.908 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-14 17:55:40.909 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-14 17:55:40.909 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-14 17:55:41.262  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-14 17:55:41.264  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-14 17:55:41.264 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-14 17:55:41.264 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-14 17:55:41.267  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-14 17:55:41.267  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-14 17:55:41.268 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 17:55:41.269 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-14 17:55:41.269 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-14 17:55:41.270 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 17:55:41.270 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-14 17:55:41.271 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-14 17:55:41.272 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 17:55:41.272 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-14 17:55:41.273 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-14 17:55:41.274 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-14 17:55:41.277 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 259108171616435258817452829551237291149513660580 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 14 16:26:08 UTC 2022 Final Date: Sun Jun 13 16:26:07 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ea:a7:ef:05:a4:f4:3b:7d:01:f0:92:2b:fb:bf:a2:3b:1e:95:16:f6] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4929be667cb66902315ac84c7740f43af7efda9d 742c7f5a207dd43bdfe6f03152fc7203d48bbb2a 2b1229a1358c22ee94aa5e5d835fd42f14f41030 deeef27c2c61449ca900844072e8280093e726e4 2d01d09ae80bf4b9ce4eb7a36b3aca0364022d14 76f48b9c7a3c5e526f28755706364fe7a295ada5 f4cba41a58db2a4fb8773c2d3371fbfb5bc7319b 4260961e2b0d8da049638fdb56e5d01bd621c914 7b17640aca5991e166f11ef93ce9717171772723 7ce13ddfe360dd7cfe8edbd6838a1c3ef39f0233 4abb8f82c102b149387735f304a54928d2750a83 f9d62268954f55e1346f858f93af6a2797330450 dc384a7ee46b59df88ba5090804c458c0be34840 6459e13fe2941a02f328e8340f498f23099b4c82 2913fa983af62c13abc7b992f1b433387ef3dabc c4ff91ddb350acfbc64fa31d548b4139081720f0 e9797fd097b3ed6c7f4a2a27598ee5fdc507359c f7e2e818ff82179e8c7b474cd01985054a119028 ba76028a389d30e2fe72b9db9655b1db6383a4eb 2d506329 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5c:50:20:f5:77:f0:0f:cd:b3:6d:c7:aa:24:e9:a5:1e:94:4b:67:5d] modulus: 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 public exponent: 10001 ] 2022-06-14 17:59:13.481  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-14 17:59:13.483 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-14 17:59:13.487 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-14 17:59:13.489 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-14 17:59:13.489  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-14 17:59:13.490  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-14 17:59:13.491  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-14 17:59:13.491 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-14 17:59:13.492 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-14 17:59:13.493 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-14 17:59:13.500 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-14 17:59:13.501 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-14 17:59:13.502 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-14 17:59:13.502 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-14 17:59:13.772  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-14 17:59:13.774  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-14 17:59:13.775 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-14 17:59:13.775 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-14 17:59:13.778  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-14 17:59:13.779  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-14 17:59:13.781 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 17:59:13.781 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-14 17:59:13.782 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-14 17:59:13.783 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 17:59:13.784 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-14 17:59:13.784 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-14 17:59:13.786 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 17:59:13.786 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-14 17:59:13.786 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-14 17:59:13.788 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-14 17:59:13.794 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 259108171616435258817452829551237291149513660580 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 14 16:26:08 UTC 2022 Final Date: Sun Jun 13 16:26:07 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ea:a7:ef:05:a4:f4:3b:7d:01:f0:92:2b:fb:bf:a2:3b:1e:95:16:f6] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4929be667cb66902315ac84c7740f43af7efda9d 742c7f5a207dd43bdfe6f03152fc7203d48bbb2a 2b1229a1358c22ee94aa5e5d835fd42f14f41030 deeef27c2c61449ca900844072e8280093e726e4 2d01d09ae80bf4b9ce4eb7a36b3aca0364022d14 76f48b9c7a3c5e526f28755706364fe7a295ada5 f4cba41a58db2a4fb8773c2d3371fbfb5bc7319b 4260961e2b0d8da049638fdb56e5d01bd621c914 7b17640aca5991e166f11ef93ce9717171772723 7ce13ddfe360dd7cfe8edbd6838a1c3ef39f0233 4abb8f82c102b149387735f304a54928d2750a83 f9d62268954f55e1346f858f93af6a2797330450 dc384a7ee46b59df88ba5090804c458c0be34840 6459e13fe2941a02f328e8340f498f23099b4c82 2913fa983af62c13abc7b992f1b433387ef3dabc c4ff91ddb350acfbc64fa31d548b4139081720f0 e9797fd097b3ed6c7f4a2a27598ee5fdc507359c f7e2e818ff82179e8c7b474cd01985054a119028 ba76028a389d30e2fe72b9db9655b1db6383a4eb 2d506329 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [52:e7:83:a4:30:90:fe:ea:88:1a:5b:29:ea:cb:25:41:1f:c9:02:45] modulus: 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 public exponent: 10001 ] 2022-06-14 18:03:35.297  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-14 18:03:35.301 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-14 18:03:35.306 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-14 18:03:35.308 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-14 18:03:35.309  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-14 18:03:35.311  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-14 18:03:35.311  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-14 18:03:35.312 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-14 18:03:35.313 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-14 18:03:35.313 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-14 18:03:35.323 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-14 18:03:35.326 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-14 18:03:35.328 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-14 18:03:35.329 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-14 18:03:35.604  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-14 18:03:35.604  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-14 18:03:35.605 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-14 18:03:35.605 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-14 18:03:35.607  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-14 18:03:35.608  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-14 18:03:35.608 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 18:03:35.609 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-14 18:03:35.609 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-14 18:03:35.610 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 18:03:35.610 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-14 18:03:35.611 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-14 18:03:35.612 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 18:03:35.612 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-14 18:03:35.613 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-14 18:03:35.614 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-14 18:03:35.621 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 259108171616435258817452829551237291149513660580 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 14 16:26:08 UTC 2022 Final Date: Sun Jun 13 16:26:07 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ea:a7:ef:05:a4:f4:3b:7d:01:f0:92:2b:fb:bf:a2:3b:1e:95:16:f6] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4929be667cb66902315ac84c7740f43af7efda9d 742c7f5a207dd43bdfe6f03152fc7203d48bbb2a 2b1229a1358c22ee94aa5e5d835fd42f14f41030 deeef27c2c61449ca900844072e8280093e726e4 2d01d09ae80bf4b9ce4eb7a36b3aca0364022d14 76f48b9c7a3c5e526f28755706364fe7a295ada5 f4cba41a58db2a4fb8773c2d3371fbfb5bc7319b 4260961e2b0d8da049638fdb56e5d01bd621c914 7b17640aca5991e166f11ef93ce9717171772723 7ce13ddfe360dd7cfe8edbd6838a1c3ef39f0233 4abb8f82c102b149387735f304a54928d2750a83 f9d62268954f55e1346f858f93af6a2797330450 dc384a7ee46b59df88ba5090804c458c0be34840 6459e13fe2941a02f328e8340f498f23099b4c82 2913fa983af62c13abc7b992f1b433387ef3dabc c4ff91ddb350acfbc64fa31d548b4139081720f0 e9797fd097b3ed6c7f4a2a27598ee5fdc507359c f7e2e818ff82179e8c7b474cd01985054a119028 ba76028a389d30e2fe72b9db9655b1db6383a4eb 2d506329 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0b:a6:38:f2:04:98:5f:83:d1:74:f7:d4:32:50:92:e2:8d:2a:e4:68] modulus: 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 public exponent: 10001 ] 2022-06-14 18:05:22.091  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-14 18:05:22.093 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-14 18:05:22.094 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-14 18:05:22.095 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-14 18:05:22.095  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-14 18:05:22.096  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-14 18:05:22.097  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-14 18:05:22.097 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-14 18:05:22.097 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-14 18:05:22.098 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-14 18:05:22.103 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-14 18:05:22.104 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-14 18:05:22.104 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-14 18:05:22.105 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-14 18:05:22.362  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-14 18:05:22.363  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-14 18:05:22.363 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-14 18:05:22.364 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-14 18:05:22.366  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-14 18:05:22.368  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-14 18:05:22.368 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 18:05:22.369 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-14 18:05:22.369 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-14 18:05:22.370 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 18:05:22.371 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-14 18:05:22.371 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-14 18:05:22.372 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 18:05:22.373 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-14 18:05:22.373 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-14 18:05:22.375 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-14 18:05:22.381 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 259108171616435258817452829551237291149513660580 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 14 16:26:08 UTC 2022 Final Date: Sun Jun 13 16:26:07 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ea:a7:ef:05:a4:f4:3b:7d:01:f0:92:2b:fb:bf:a2:3b:1e:95:16:f6] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4929be667cb66902315ac84c7740f43af7efda9d 742c7f5a207dd43bdfe6f03152fc7203d48bbb2a 2b1229a1358c22ee94aa5e5d835fd42f14f41030 deeef27c2c61449ca900844072e8280093e726e4 2d01d09ae80bf4b9ce4eb7a36b3aca0364022d14 76f48b9c7a3c5e526f28755706364fe7a295ada5 f4cba41a58db2a4fb8773c2d3371fbfb5bc7319b 4260961e2b0d8da049638fdb56e5d01bd621c914 7b17640aca5991e166f11ef93ce9717171772723 7ce13ddfe360dd7cfe8edbd6838a1c3ef39f0233 4abb8f82c102b149387735f304a54928d2750a83 f9d62268954f55e1346f858f93af6a2797330450 dc384a7ee46b59df88ba5090804c458c0be34840 6459e13fe2941a02f328e8340f498f23099b4c82 2913fa983af62c13abc7b992f1b433387ef3dabc c4ff91ddb350acfbc64fa31d548b4139081720f0 e9797fd097b3ed6c7f4a2a27598ee5fdc507359c f7e2e818ff82179e8c7b474cd01985054a119028 ba76028a389d30e2fe72b9db9655b1db6383a4eb 2d506329 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2b:66:77:c9:e4:86:87:45:33:d7:0b:f9:df:9b:5c:e3:c6:af:e4:6b] modulus: 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 public exponent: 10001 ] 2022-06-14 18:08:31.323  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-14 18:08:31.327 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-14 18:08:31.336 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-14 18:08:31.338 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-14 18:08:31.339  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-14 18:08:31.340  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-14 18:08:31.340  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-14 18:08:31.341 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-14 18:08:31.341 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-14 18:08:31.342 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-14 18:08:31.351 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-14 18:08:31.352 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-14 18:08:31.352 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-14 18:08:31.353 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-14 18:08:31.585  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-14 18:08:31.586  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-14 18:08:31.586 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-14 18:08:31.586 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-14 18:08:31.589  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-14 18:08:31.589  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-14 18:08:31.590 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 18:08:31.590 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-14 18:08:31.591 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-14 18:08:31.592 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 18:08:31.592 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-14 18:08:31.593 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-14 18:08:31.594 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 18:08:31.595 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-14 18:08:31.595 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-14 18:08:31.596 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-14 18:08:31.602 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 259108171616435258817452829551237291149513660580 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 14 16:26:08 UTC 2022 Final Date: Sun Jun 13 16:26:07 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ea:a7:ef:05:a4:f4:3b:7d:01:f0:92:2b:fb:bf:a2:3b:1e:95:16:f6] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4929be667cb66902315ac84c7740f43af7efda9d 742c7f5a207dd43bdfe6f03152fc7203d48bbb2a 2b1229a1358c22ee94aa5e5d835fd42f14f41030 deeef27c2c61449ca900844072e8280093e726e4 2d01d09ae80bf4b9ce4eb7a36b3aca0364022d14 76f48b9c7a3c5e526f28755706364fe7a295ada5 f4cba41a58db2a4fb8773c2d3371fbfb5bc7319b 4260961e2b0d8da049638fdb56e5d01bd621c914 7b17640aca5991e166f11ef93ce9717171772723 7ce13ddfe360dd7cfe8edbd6838a1c3ef39f0233 4abb8f82c102b149387735f304a54928d2750a83 f9d62268954f55e1346f858f93af6a2797330450 dc384a7ee46b59df88ba5090804c458c0be34840 6459e13fe2941a02f328e8340f498f23099b4c82 2913fa983af62c13abc7b992f1b433387ef3dabc c4ff91ddb350acfbc64fa31d548b4139081720f0 e9797fd097b3ed6c7f4a2a27598ee5fdc507359c f7e2e818ff82179e8c7b474cd01985054a119028 ba76028a389d30e2fe72b9db9655b1db6383a4eb 2d506329 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6a:6f:0c:92:f9:74:36:51:fa:a5:8d:1a:a1:3b:52:ba:03:6b:59:28] modulus: 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 public exponent: 10001 ] 2022-06-14 18:09:52.762  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-14 18:09:52.764 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-14 18:09:52.766 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-14 18:09:52.767 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-14 18:09:52.767  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-14 18:09:52.768  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-14 18:09:52.769  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-14 18:09:52.769 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-14 18:09:52.770 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-14 18:09:52.770 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-14 18:09:52.778 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-14 18:09:52.780 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-14 18:09:52.781 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-14 18:09:52.782 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-14 18:09:53.017  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-14 18:09:53.017  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-14 18:09:53.018 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-14 18:09:53.018 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-14 18:09:53.020  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-14 18:09:53.021  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-14 18:09:53.021 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 18:09:53.022 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-14 18:09:53.022 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-14 18:09:53.023 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 18:09:53.024 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-14 18:09:53.024 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-14 18:09:53.024 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 18:09:53.025 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-14 18:09:53.025 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-14 18:09:53.027 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-14 18:09:53.030 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 259108171616435258817452829551237291149513660580 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 14 16:26:08 UTC 2022 Final Date: Sun Jun 13 16:26:07 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ea:a7:ef:05:a4:f4:3b:7d:01:f0:92:2b:fb:bf:a2:3b:1e:95:16:f6] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4929be667cb66902315ac84c7740f43af7efda9d 742c7f5a207dd43bdfe6f03152fc7203d48bbb2a 2b1229a1358c22ee94aa5e5d835fd42f14f41030 deeef27c2c61449ca900844072e8280093e726e4 2d01d09ae80bf4b9ce4eb7a36b3aca0364022d14 76f48b9c7a3c5e526f28755706364fe7a295ada5 f4cba41a58db2a4fb8773c2d3371fbfb5bc7319b 4260961e2b0d8da049638fdb56e5d01bd621c914 7b17640aca5991e166f11ef93ce9717171772723 7ce13ddfe360dd7cfe8edbd6838a1c3ef39f0233 4abb8f82c102b149387735f304a54928d2750a83 f9d62268954f55e1346f858f93af6a2797330450 dc384a7ee46b59df88ba5090804c458c0be34840 6459e13fe2941a02f328e8340f498f23099b4c82 2913fa983af62c13abc7b992f1b433387ef3dabc c4ff91ddb350acfbc64fa31d548b4139081720f0 e9797fd097b3ed6c7f4a2a27598ee5fdc507359c f7e2e818ff82179e8c7b474cd01985054a119028 ba76028a389d30e2fe72b9db9655b1db6383a4eb 2d506329 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e3:6f:cf:e5:9c:ba:f2:90:3f:34:b1:ef:10:83:e0:3e:19:70:d2:6f] modulus: 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 public exponent: 10001 ] 2022-06-14 18:13:36.603  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-14 18:13:36.606 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-14 18:13:36.610 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-14 18:13:36.612 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-14 18:13:36.613  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-14 18:13:36.614  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-14 18:13:36.615  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-14 18:13:36.616 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-14 18:13:36.616 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-14 18:13:36.616 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-14 18:13:36.624 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-14 18:13:36.626 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-14 18:13:36.626 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-14 18:13:36.627 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-14 18:13:36.843  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-14 18:13:36.844  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-14 18:13:36.844 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-14 18:13:36.844 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-14 18:13:36.846  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-14 18:13:36.846  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-14 18:13:36.847 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 18:13:36.847 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-14 18:13:36.847 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-14 18:13:36.848 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 18:13:36.848 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-14 18:13:36.849 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-14 18:13:36.849 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 18:13:36.850 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-14 18:13:36.850 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-14 18:13:36.852 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-14 18:13:36.856 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 259108171616435258817452829551237291149513660580 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 14 16:26:08 UTC 2022 Final Date: Sun Jun 13 16:26:07 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ea:a7:ef:05:a4:f4:3b:7d:01:f0:92:2b:fb:bf:a2:3b:1e:95:16:f6] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4929be667cb66902315ac84c7740f43af7efda9d 742c7f5a207dd43bdfe6f03152fc7203d48bbb2a 2b1229a1358c22ee94aa5e5d835fd42f14f41030 deeef27c2c61449ca900844072e8280093e726e4 2d01d09ae80bf4b9ce4eb7a36b3aca0364022d14 76f48b9c7a3c5e526f28755706364fe7a295ada5 f4cba41a58db2a4fb8773c2d3371fbfb5bc7319b 4260961e2b0d8da049638fdb56e5d01bd621c914 7b17640aca5991e166f11ef93ce9717171772723 7ce13ddfe360dd7cfe8edbd6838a1c3ef39f0233 4abb8f82c102b149387735f304a54928d2750a83 f9d62268954f55e1346f858f93af6a2797330450 dc384a7ee46b59df88ba5090804c458c0be34840 6459e13fe2941a02f328e8340f498f23099b4c82 2913fa983af62c13abc7b992f1b433387ef3dabc c4ff91ddb350acfbc64fa31d548b4139081720f0 e9797fd097b3ed6c7f4a2a27598ee5fdc507359c f7e2e818ff82179e8c7b474cd01985054a119028 ba76028a389d30e2fe72b9db9655b1db6383a4eb 2d506329 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c1:38:3d:00:69:26:a2:31:a9:9d:ef:60:45:1f:d2:29:a5:a7:d6:55] modulus: b137393bd1095dfdb114126d5a9b589456595bffcb86f0ae2680732d5c0fc079985e8a775dee95418dcb0b53d9e07de1d8ff7d3bf0621c9886676ab3aa7dd671bb77e92865023957e8e0d8b7330fd7983c03dabd08c40ce5faffd62584fdc216891ea005890483e34b1444c945b0c45cdd3af5c0de4f5cc7aa18a386186ae5ffe639c66b0d40ca58c5fddcf02a9a9d4909a34f1c4f6ae64c923559b07a5a2a7997429b1a8e47b62fb4a850dd5e6dd4936a87442b9cfde6bf951c820b0aa2c01d43b0b54155dc722b4b8f0c73c969d21297869117489f3fa629cbeb38afeaddb4ee98d81b9a24ae8178c8fa366c5062afc3cb817573edc9e1d4f06401fc6abe51 public exponent: 10001 ] 2022-06-14 18:14:05.582  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-14 18:14:05.584 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-14 18:14:05.586 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-14 18:14:05.587 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-14 18:14:05.588  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-14 18:14:05.588  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-14 18:14:05.589  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-14 18:14:05.589 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-14 18:14:05.590 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-14 18:14:05.590 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-14 18:14:05.598 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-14 18:14:05.599 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-14 18:14:05.599 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-14 18:14:05.600 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-14 18:14:05.871  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-14 18:14:05.872  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-14 18:14:05.873 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-14 18:14:05.873 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-14 18:14:05.875  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-14 18:14:05.875  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-14 18:14:05.876 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 18:14:05.876 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-14 18:14:05.877 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-14 18:14:05.878 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 18:14:05.878 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-14 18:14:05.878 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-14 18:14:05.879 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 18:14:05.880 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-14 18:14:05.880 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-14 18:14:05.881 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-14 18:14:05.886 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 259108171616435258817452829551237291149513660580 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 14 16:26:08 UTC 2022 Final Date: Sun Jun 13 16:26:07 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ea:a7:ef:05:a4:f4:3b:7d:01:f0:92:2b:fb:bf:a2:3b:1e:95:16:f6] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4929be667cb66902315ac84c7740f43af7efda9d 742c7f5a207dd43bdfe6f03152fc7203d48bbb2a 2b1229a1358c22ee94aa5e5d835fd42f14f41030 deeef27c2c61449ca900844072e8280093e726e4 2d01d09ae80bf4b9ce4eb7a36b3aca0364022d14 76f48b9c7a3c5e526f28755706364fe7a295ada5 f4cba41a58db2a4fb8773c2d3371fbfb5bc7319b 4260961e2b0d8da049638fdb56e5d01bd621c914 7b17640aca5991e166f11ef93ce9717171772723 7ce13ddfe360dd7cfe8edbd6838a1c3ef39f0233 4abb8f82c102b149387735f304a54928d2750a83 f9d62268954f55e1346f858f93af6a2797330450 dc384a7ee46b59df88ba5090804c458c0be34840 6459e13fe2941a02f328e8340f498f23099b4c82 2913fa983af62c13abc7b992f1b433387ef3dabc c4ff91ddb350acfbc64fa31d548b4139081720f0 e9797fd097b3ed6c7f4a2a27598ee5fdc507359c f7e2e818ff82179e8c7b474cd01985054a119028 ba76028a389d30e2fe72b9db9655b1db6383a4eb 2d506329 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [51:71:95:47:26:99:c4:1f:07:01:ba:7a:5c:f0:5e:c1:a2:5b:75:46] modulus: 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 public exponent: 10001 ] 2022-06-14 18:14:13.393  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-14 18:14:13.394 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-14 18:14:13.396 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-14 18:14:13.397 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-14 18:14:13.397  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-14 18:14:13.398  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-14 18:14:13.399  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-14 18:14:13.399 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-14 18:14:13.400 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-14 18:14:13.400 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-14 18:14:13.407 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-14 18:14:13.408 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-14 18:14:13.409 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-14 18:14:13.409 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-14 18:14:13.658  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-14 18:14:13.659  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-14 18:14:13.660 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-14 18:14:13.660 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-14 18:14:13.662  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-14 18:14:13.662  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-14 18:14:13.663 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 18:14:13.663 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-14 18:14:13.663 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-14 18:14:13.664 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 18:14:13.665 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-14 18:14:13.665 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-14 18:14:13.666 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 18:14:13.667 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-14 18:14:13.667 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-14 18:14:13.669 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-14 18:14:13.674 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 259108171616435258817452829551237291149513660580 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 14 16:26:08 UTC 2022 Final Date: Sun Jun 13 16:26:07 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ea:a7:ef:05:a4:f4:3b:7d:01:f0:92:2b:fb:bf:a2:3b:1e:95:16:f6] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4929be667cb66902315ac84c7740f43af7efda9d 742c7f5a207dd43bdfe6f03152fc7203d48bbb2a 2b1229a1358c22ee94aa5e5d835fd42f14f41030 deeef27c2c61449ca900844072e8280093e726e4 2d01d09ae80bf4b9ce4eb7a36b3aca0364022d14 76f48b9c7a3c5e526f28755706364fe7a295ada5 f4cba41a58db2a4fb8773c2d3371fbfb5bc7319b 4260961e2b0d8da049638fdb56e5d01bd621c914 7b17640aca5991e166f11ef93ce9717171772723 7ce13ddfe360dd7cfe8edbd6838a1c3ef39f0233 4abb8f82c102b149387735f304a54928d2750a83 f9d62268954f55e1346f858f93af6a2797330450 dc384a7ee46b59df88ba5090804c458c0be34840 6459e13fe2941a02f328e8340f498f23099b4c82 2913fa983af62c13abc7b992f1b433387ef3dabc c4ff91ddb350acfbc64fa31d548b4139081720f0 e9797fd097b3ed6c7f4a2a27598ee5fdc507359c f7e2e818ff82179e8c7b474cd01985054a119028 ba76028a389d30e2fe72b9db9655b1db6383a4eb 2d506329 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [25:73:a5:3e:58:d2:19:16:c1:24:dd:c7:26:b4:f2:cb:d6:26:1d:cb] modulus: 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 public exponent: 10001 ] 2022-06-14 18:19:07.263  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-14 18:19:07.267 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-14 18:19:07.271 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-14 18:19:07.273 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-14 18:19:07.274  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-14 18:19:07.275  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-14 18:19:07.275  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-14 18:19:07.276 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-14 18:19:07.277 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-14 18:19:07.278 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-14 18:19:07.285 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-14 18:19:07.286 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-14 18:19:07.286 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-14 18:19:07.287 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-14 18:19:07.536  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-14 18:19:07.537  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-14 18:19:07.538 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-14 18:19:07.538 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-14 18:19:07.539  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-14 18:19:07.540  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-14 18:19:07.540 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 18:19:07.540 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-14 18:19:07.541 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-14 18:19:07.541 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 18:19:07.542 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-14 18:19:07.542 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-14 18:19:07.543 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 18:19:07.543 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-14 18:19:07.544 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-14 18:19:07.545 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-14 18:19:07.550 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 259108171616435258817452829551237291149513660580 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 14 16:26:08 UTC 2022 Final Date: Sun Jun 13 16:26:07 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ea:a7:ef:05:a4:f4:3b:7d:01:f0:92:2b:fb:bf:a2:3b:1e:95:16:f6] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4929be667cb66902315ac84c7740f43af7efda9d 742c7f5a207dd43bdfe6f03152fc7203d48bbb2a 2b1229a1358c22ee94aa5e5d835fd42f14f41030 deeef27c2c61449ca900844072e8280093e726e4 2d01d09ae80bf4b9ce4eb7a36b3aca0364022d14 76f48b9c7a3c5e526f28755706364fe7a295ada5 f4cba41a58db2a4fb8773c2d3371fbfb5bc7319b 4260961e2b0d8da049638fdb56e5d01bd621c914 7b17640aca5991e166f11ef93ce9717171772723 7ce13ddfe360dd7cfe8edbd6838a1c3ef39f0233 4abb8f82c102b149387735f304a54928d2750a83 f9d62268954f55e1346f858f93af6a2797330450 dc384a7ee46b59df88ba5090804c458c0be34840 6459e13fe2941a02f328e8340f498f23099b4c82 2913fa983af62c13abc7b992f1b433387ef3dabc c4ff91ddb350acfbc64fa31d548b4139081720f0 e9797fd097b3ed6c7f4a2a27598ee5fdc507359c f7e2e818ff82179e8c7b474cd01985054a119028 ba76028a389d30e2fe72b9db9655b1db6383a4eb 2d506329 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [01:51:3b:45:f8:9c:41:59:b0:ff:e5:ad:f0:31:28:c0:eb:56:d0:45] modulus: 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 public exponent: 10001 ] 2022-06-14 18:23:59.419  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-14 18:23:59.423 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-14 18:23:59.426 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-14 18:23:59.427 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-14 18:23:59.428  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-14 18:23:59.429  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-14 18:23:59.429  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-14 18:23:59.430 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-14 18:23:59.430 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-14 18:23:59.431 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-14 18:23:59.438 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-14 18:23:59.439 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-14 18:23:59.440 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-14 18:23:59.440 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-14 18:23:59.695  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-14 18:23:59.696  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-14 18:23:59.696 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-14 18:23:59.697 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-14 18:23:59.699  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-14 18:23:59.699  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-14 18:23:59.700 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 18:23:59.700 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-14 18:23:59.701 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-14 18:23:59.702 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 18:23:59.702 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-14 18:23:59.702 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-14 18:23:59.703 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 18:23:59.704 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-14 18:23:59.704 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-14 18:23:59.705 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-14 18:23:59.712 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 259108171616435258817452829551237291149513660580 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 14 16:26:08 UTC 2022 Final Date: Sun Jun 13 16:26:07 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ea:a7:ef:05:a4:f4:3b:7d:01:f0:92:2b:fb:bf:a2:3b:1e:95:16:f6] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4929be667cb66902315ac84c7740f43af7efda9d 742c7f5a207dd43bdfe6f03152fc7203d48bbb2a 2b1229a1358c22ee94aa5e5d835fd42f14f41030 deeef27c2c61449ca900844072e8280093e726e4 2d01d09ae80bf4b9ce4eb7a36b3aca0364022d14 76f48b9c7a3c5e526f28755706364fe7a295ada5 f4cba41a58db2a4fb8773c2d3371fbfb5bc7319b 4260961e2b0d8da049638fdb56e5d01bd621c914 7b17640aca5991e166f11ef93ce9717171772723 7ce13ddfe360dd7cfe8edbd6838a1c3ef39f0233 4abb8f82c102b149387735f304a54928d2750a83 f9d62268954f55e1346f858f93af6a2797330450 dc384a7ee46b59df88ba5090804c458c0be34840 6459e13fe2941a02f328e8340f498f23099b4c82 2913fa983af62c13abc7b992f1b433387ef3dabc c4ff91ddb350acfbc64fa31d548b4139081720f0 e9797fd097b3ed6c7f4a2a27598ee5fdc507359c f7e2e818ff82179e8c7b474cd01985054a119028 ba76028a389d30e2fe72b9db9655b1db6383a4eb 2d506329 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [df:32:51:1a:e4:4b:84:bd:d4:83:73:fb:34:22:c8:47:bc:8f:59:09] modulus: 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 public exponent: 10001 ] 2022-06-14 18:28:27.076  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-14 18:28:27.078 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-14 18:28:27.081 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-14 18:28:27.082 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-14 18:28:27.083  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-14 18:28:27.083  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-14 18:28:27.084  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-14 18:28:27.085 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-14 18:28:27.085 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-14 18:28:27.086 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-14 18:28:27.092 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-14 18:28:27.093 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-14 18:28:27.093 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-14 18:28:27.094 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-14 18:28:27.366  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-14 18:28:27.367  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-14 18:28:27.367 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-14 18:28:27.367 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-14 18:28:27.369  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-14 18:28:27.370  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-14 18:28:27.370 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 18:28:27.370 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-14 18:28:27.371 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-14 18:28:27.372 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 18:28:27.372 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-14 18:28:27.372 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-14 18:28:27.373 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 18:28:27.373 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-14 18:28:27.374 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-14 18:28:27.374 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-14 18:28:27.381 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 259108171616435258817452829551237291149513660580 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 14 16:26:08 UTC 2022 Final Date: Sun Jun 13 16:26:07 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ea:a7:ef:05:a4:f4:3b:7d:01:f0:92:2b:fb:bf:a2:3b:1e:95:16:f6] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4929be667cb66902315ac84c7740f43af7efda9d 742c7f5a207dd43bdfe6f03152fc7203d48bbb2a 2b1229a1358c22ee94aa5e5d835fd42f14f41030 deeef27c2c61449ca900844072e8280093e726e4 2d01d09ae80bf4b9ce4eb7a36b3aca0364022d14 76f48b9c7a3c5e526f28755706364fe7a295ada5 f4cba41a58db2a4fb8773c2d3371fbfb5bc7319b 4260961e2b0d8da049638fdb56e5d01bd621c914 7b17640aca5991e166f11ef93ce9717171772723 7ce13ddfe360dd7cfe8edbd6838a1c3ef39f0233 4abb8f82c102b149387735f304a54928d2750a83 f9d62268954f55e1346f858f93af6a2797330450 dc384a7ee46b59df88ba5090804c458c0be34840 6459e13fe2941a02f328e8340f498f23099b4c82 2913fa983af62c13abc7b992f1b433387ef3dabc c4ff91ddb350acfbc64fa31d548b4139081720f0 e9797fd097b3ed6c7f4a2a27598ee5fdc507359c f7e2e818ff82179e8c7b474cd01985054a119028 ba76028a389d30e2fe72b9db9655b1db6383a4eb 2d506329 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [53:40:9f:f0:97:d6:a4:65:c2:f7:1c:21:c4:f2:98:c9:99:1b:f2:91] modulus: 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 public exponent: 10001 ] 2022-06-14 18:34:41.317  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-14 18:34:41.323 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-14 18:34:41.327 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-14 18:34:41.329 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-14 18:34:41.330  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-14 18:34:41.331  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-14 18:34:41.331  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-14 18:34:41.331 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-14 18:34:41.332 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-14 18:34:41.333 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-14 18:34:41.339 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-14 18:34:41.340 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-14 18:34:41.340 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-14 18:34:41.341 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-14 18:34:41.622  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-14 18:34:41.623  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-14 18:34:41.624 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-14 18:34:41.624 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-14 18:34:41.625  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-14 18:34:41.626  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-14 18:34:41.626 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 18:34:41.627 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-14 18:34:41.627 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-14 18:34:41.628 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 18:34:41.628 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-14 18:34:41.628 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-14 18:34:41.629 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-14 18:34:41.630 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-14 18:34:41.630 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-14 18:34:41.631 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-14 18:34:41.637 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 259108171616435258817452829551237291149513660580 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jun 14 16:26:08 UTC 2022 Final Date: Sun Jun 13 16:26:07 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ea:a7:ef:05:a4:f4:3b:7d:01:f0:92:2b:fb:bf:a2:3b:1e:95:16:f6] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4929be667cb66902315ac84c7740f43af7efda9d 742c7f5a207dd43bdfe6f03152fc7203d48bbb2a 2b1229a1358c22ee94aa5e5d835fd42f14f41030 deeef27c2c61449ca900844072e8280093e726e4 2d01d09ae80bf4b9ce4eb7a36b3aca0364022d14 76f48b9c7a3c5e526f28755706364fe7a295ada5 f4cba41a58db2a4fb8773c2d3371fbfb5bc7319b 4260961e2b0d8da049638fdb56e5d01bd621c914 7b17640aca5991e166f11ef93ce9717171772723 7ce13ddfe360dd7cfe8edbd6838a1c3ef39f0233 4abb8f82c102b149387735f304a54928d2750a83 f9d62268954f55e1346f858f93af6a2797330450 dc384a7ee46b59df88ba5090804c458c0be34840 6459e13fe2941a02f328e8340f498f23099b4c82 2913fa983af62c13abc7b992f1b433387ef3dabc c4ff91ddb350acfbc64fa31d548b4139081720f0 e9797fd097b3ed6c7f4a2a27598ee5fdc507359c f7e2e818ff82179e8c7b474cd01985054a119028 ba76028a389d30e2fe72b9db9655b1db6383a4eb 2d506329 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [74:16:01:44:b7:2d:b8:f0:d4:ca:01:60:6c:02:09:0e:21:b7:73:43] modulus: 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 public exponent: 10001 ]