2022-07-06 03:23:39,090 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-07-06 03:23:40,545 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-07-06 03:23:41.478  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Jul 06, 2022 3:23:44 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jul 06, 2022 3:23:44 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jul 06, 2022 3:23:44 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jul 06, 2022 3:23:44 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-07-06 03:23:45.043 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-07-06 03:23:45.572  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-07-06 03:23:45.816  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-07-06 03:23:46.762 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-07-06 03:23:46.766 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-07-06 03:23:46.768 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-07-06 03:23:46.773 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-07-06 03:23:46.826 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) 2022-07-06 03:23:46.833 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-07-06 03:23:47.012 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-07-06 03:23:47.828 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jul 06, 2022 3:23:48 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-07-06 03:23:49.164  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 11.315 seconds (JVM running for 13.999) Jul 06, 2022 3:24:13 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-07-06 03:24:24.013  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-06 03:24:24.024 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-06 03:24:24.068 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-07-06 03:24:24.073 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-06 03:24:24.101  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-07-06 03:24:24.104  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-06 03:24:24.106  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-06 03:24:24.107 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-06 03:24:24.108 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-06 03:24:24.113 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-06 03:24:24.120 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-06 03:24:24.123 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-06 03:24:24.177 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-06 03:24:24.182 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-06 03:24:24.183 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-06 03:24:24.187 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-06 03:24:25.070  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-06 03:24:25.073  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-06 03:24:25.074 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-06 03:24:25.076 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-06 03:24:25.087  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-06 03:24:25.088  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-06 03:24:25.089 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 03:24:25.090 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 03:24:25.090 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 03:24:25.103 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 03:24:25.104 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 03:24:25.104 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 03:24:25.111 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 03:24:25.112 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 03:24:25.112 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 03:24:25.114 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-06 03:24:25.156 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 166728562549757016066061585686391873741584172858 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jul 06 03:21:12 UTC 2022 Final Date: Mon Jul 05 03:21:11 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a0:03:54:75:22:7f:3d:f1:4f:84:35:a5:bc:79:e4:7f:b1:34:84:3f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1be451a07dbd5d110a2f3de02d6463af84723665 42de7623aa53eb02d8d4a3a801c24ce3aacbc49a 434c2b468fcaa9fa6db7238804e9d897d07a3e9b 46efdbd04848cdba691b9f83f54e9215a50456df 1a69e0fc59f33152439f6c67bf8cf8e9e1a3694e 20944c4af3ca88b14e8a9d029a18834e82fae6f7 c892b5870b291bcf96cb3ea75762fab2a46e7574 bd4fb7451db90d8cd6003bdd2a7a138b28821467 6012e7974bd300a448a7bca1904c16005555d37e 5f052acb8fa740cb4509e855cd930606876c4d78 cdae5d32ae0d8e10bf63222014790cd34ee28c43 0f5ce10bc7f1c8a9a62803502f9db5cc26804353 617561854f135b56ef8e3fc6c66fa215563f3983 0b0291f6717af1dbf3f92bdfb740500f7930216f 8be2f088bd4aa1d7c73f0d6d1411b6eab67f7d8c 1e8a5321c8b62902877a130126f18d9f1d8ea2e5 bf76c43ffd869521f0e48463a069792c4318fb6b b56b12d4e3fb0ecbbd22e69ef22ccf0696f948d5 fa86c8b70f13417cef8ed4620d1aef5d584df1af 2a9ca010 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [12:23:5d:52:ea:58:eb:b2:20:d8:e2:c9:f5:a6:ae:29:1e:c1:1a:aa] modulus: cc7e347fb2998115eae4d05883d94d8153303ff4d71ccf75601d9ab98227bacde7809642a3e04a6566935cf0ac79fb0f520e5a5a1d90c22bb0d1372d6fe6d69022a8a091314955a7ea6ba0557003c67fb94f55881d710956fb190fb48bedc0d6ced4f06f3be6682de0fec51145becd3fd44463c12ce39a8782c1d95e9bd40d346a6cd9f773445e023ed7ae7530f3b5015680b76e9e202cd4cea2831fe465dd9dd4a8fd2a999038a6b2ab494fcf39294cc96194ce9bbde97caeb16fda3f8b0bcdd2507569fce9a68bec46801bb73f1fca9afaef2536a3cb51e42cc0a20cb6557c18b7b7e8e175d710706a26d83efc65859c287d63dd1bbbe113b1aa8f0f21cce7 public exponent: 10001 ] 2022-07-06 04:55:28.525  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-06 04:55:28.528 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-06 04:55:28.537 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-06 04:55:28.539 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-06 04:55:28.539  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-06 04:55:28.540  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-06 04:55:28.541  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-06 04:55:28.541 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-06 04:55:28.542 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-06 04:55:28.543 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-06 04:55:28.554 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-06 04:55:28.556 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-06 04:55:28.556 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-06 04:55:28.557 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-06 04:55:28.791  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-06 04:55:28.792  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-06 04:55:28.793 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-06 04:55:28.793 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-06 04:55:28.798  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-06 04:55:28.799  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-06 04:55:28.800 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 04:55:28.803 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 04:55:28.804 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 04:55:28.808 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 04:55:28.809 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 04:55:28.809 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 04:55:28.810 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 04:55:28.811 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 04:55:28.811 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 04:55:28.813 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-06 04:55:28.819 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 166728562549757016066061585686391873741584172858 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jul 06 03:21:12 UTC 2022 Final Date: Mon Jul 05 03:21:11 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a0:03:54:75:22:7f:3d:f1:4f:84:35:a5:bc:79:e4:7f:b1:34:84:3f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1be451a07dbd5d110a2f3de02d6463af84723665 42de7623aa53eb02d8d4a3a801c24ce3aacbc49a 434c2b468fcaa9fa6db7238804e9d897d07a3e9b 46efdbd04848cdba691b9f83f54e9215a50456df 1a69e0fc59f33152439f6c67bf8cf8e9e1a3694e 20944c4af3ca88b14e8a9d029a18834e82fae6f7 c892b5870b291bcf96cb3ea75762fab2a46e7574 bd4fb7451db90d8cd6003bdd2a7a138b28821467 6012e7974bd300a448a7bca1904c16005555d37e 5f052acb8fa740cb4509e855cd930606876c4d78 cdae5d32ae0d8e10bf63222014790cd34ee28c43 0f5ce10bc7f1c8a9a62803502f9db5cc26804353 617561854f135b56ef8e3fc6c66fa215563f3983 0b0291f6717af1dbf3f92bdfb740500f7930216f 8be2f088bd4aa1d7c73f0d6d1411b6eab67f7d8c 1e8a5321c8b62902877a130126f18d9f1d8ea2e5 bf76c43ffd869521f0e48463a069792c4318fb6b b56b12d4e3fb0ecbbd22e69ef22ccf0696f948d5 fa86c8b70f13417cef8ed4620d1aef5d584df1af 2a9ca010 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4b:f5:fe:95:45:a4:d4:7b:5a:af:d7:77:f6:f7:ca:98:8f:50:25:f3] modulus: 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 public exponent: 10001 ] 2022-07-06 04:57:30.505  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-06 04:57:30.507 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-06 04:57:30.509 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-07-06 04:57:30.511 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-06 04:57:30.515  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-07-06 04:57:30.517  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-06 04:57:30.517  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-06 04:57:30.518 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-06 04:57:30.519 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-06 04:57:30.520 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-06 04:57:30.532 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-06 04:57:30.533 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-06 04:57:30.534 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-06 04:57:30.535 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-06 04:57:30.713  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-06 04:57:30.714  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-06 04:57:30.715 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-06 04:57:30.715 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-06 04:57:30.720  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-06 04:57:30.720  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-06 04:57:30.721 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 04:57:30.721 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 04:57:30.722 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 04:57:30.723 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 04:57:30.724 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 04:57:30.724 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 04:57:30.725 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 04:57:30.726 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 04:57:30.726 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 04:57:30.733 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-06 04:57:30.752 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 166728562549757016066061585686391873741584172858 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jul 06 03:21:12 UTC 2022 Final Date: Mon Jul 05 03:21:11 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a0:03:54:75:22:7f:3d:f1:4f:84:35:a5:bc:79:e4:7f:b1:34:84:3f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1be451a07dbd5d110a2f3de02d6463af84723665 42de7623aa53eb02d8d4a3a801c24ce3aacbc49a 434c2b468fcaa9fa6db7238804e9d897d07a3e9b 46efdbd04848cdba691b9f83f54e9215a50456df 1a69e0fc59f33152439f6c67bf8cf8e9e1a3694e 20944c4af3ca88b14e8a9d029a18834e82fae6f7 c892b5870b291bcf96cb3ea75762fab2a46e7574 bd4fb7451db90d8cd6003bdd2a7a138b28821467 6012e7974bd300a448a7bca1904c16005555d37e 5f052acb8fa740cb4509e855cd930606876c4d78 cdae5d32ae0d8e10bf63222014790cd34ee28c43 0f5ce10bc7f1c8a9a62803502f9db5cc26804353 617561854f135b56ef8e3fc6c66fa215563f3983 0b0291f6717af1dbf3f92bdfb740500f7930216f 8be2f088bd4aa1d7c73f0d6d1411b6eab67f7d8c 1e8a5321c8b62902877a130126f18d9f1d8ea2e5 bf76c43ffd869521f0e48463a069792c4318fb6b b56b12d4e3fb0ecbbd22e69ef22ccf0696f948d5 fa86c8b70f13417cef8ed4620d1aef5d584df1af 2a9ca010 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [39:34:0f:68:6b:b8:09:42:51:d0:28:38:cb:6e:ba:a2:8d:aa:b6:7e] modulus: 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 public exponent: 10001 ] 2022-07-06 04:58:40.569  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-06 04:58:40.570 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-06 04:58:40.573 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-07-06 04:58:40.574 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-06 04:58:40.576  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-07-06 04:58:40.578  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-06 04:58:40.578  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-06 04:58:40.579 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-06 04:58:40.579 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-06 04:58:40.580 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-06 04:58:40.587 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-06 04:58:40.588 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-06 04:58:40.589 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-06 04:58:40.590 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-06 04:58:40.749  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-06 04:58:40.749  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-06 04:58:40.750 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-06 04:58:40.750 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-06 04:58:40.753  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-06 04:58:40.754  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-06 04:58:40.755 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 04:58:40.755 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 04:58:40.756 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 04:58:40.757 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 04:58:40.757 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 04:58:40.758 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 04:58:40.759 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 04:58:40.759 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 04:58:40.760 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 04:58:40.761 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-06 04:58:40.767 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 166728562549757016066061585686391873741584172858 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jul 06 03:21:12 UTC 2022 Final Date: Mon Jul 05 03:21:11 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a0:03:54:75:22:7f:3d:f1:4f:84:35:a5:bc:79:e4:7f:b1:34:84:3f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1be451a07dbd5d110a2f3de02d6463af84723665 42de7623aa53eb02d8d4a3a801c24ce3aacbc49a 434c2b468fcaa9fa6db7238804e9d897d07a3e9b 46efdbd04848cdba691b9f83f54e9215a50456df 1a69e0fc59f33152439f6c67bf8cf8e9e1a3694e 20944c4af3ca88b14e8a9d029a18834e82fae6f7 c892b5870b291bcf96cb3ea75762fab2a46e7574 bd4fb7451db90d8cd6003bdd2a7a138b28821467 6012e7974bd300a448a7bca1904c16005555d37e 5f052acb8fa740cb4509e855cd930606876c4d78 cdae5d32ae0d8e10bf63222014790cd34ee28c43 0f5ce10bc7f1c8a9a62803502f9db5cc26804353 617561854f135b56ef8e3fc6c66fa215563f3983 0b0291f6717af1dbf3f92bdfb740500f7930216f 8be2f088bd4aa1d7c73f0d6d1411b6eab67f7d8c 1e8a5321c8b62902877a130126f18d9f1d8ea2e5 bf76c43ffd869521f0e48463a069792c4318fb6b b56b12d4e3fb0ecbbd22e69ef22ccf0696f948d5 fa86c8b70f13417cef8ed4620d1aef5d584df1af 2a9ca010 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [14:25:58:0e:e3:f3:24:d8:db:0b:69:7c:7e:61:8a:31:f1:85:fd:5f] modulus: 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 public exponent: 10001 ] 2022-07-06 05:00:35.222  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-06 05:00:35.224 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-06 05:00:35.226 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-06 05:00:35.227 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-06 05:00:35.227  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-06 05:00:35.228  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-06 05:00:35.231  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-06 05:00:35.231 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-06 05:00:35.232 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-06 05:00:35.232 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-06 05:00:35.240 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-06 05:00:35.241 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-06 05:00:35.242 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-06 05:00:35.242 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-06 05:00:35.423  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-06 05:00:35.424  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-06 05:00:35.425 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-06 05:00:35.425 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-06 05:00:35.430  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-06 05:00:35.431  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-06 05:00:35.431 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 05:00:35.432 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 05:00:35.432 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 05:00:35.433 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 05:00:35.433 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 05:00:35.433 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 05:00:35.434 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 05:00:35.434 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 05:00:35.435 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 05:00:35.435 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-06 05:00:35.440 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 166728562549757016066061585686391873741584172858 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jul 06 03:21:12 UTC 2022 Final Date: Mon Jul 05 03:21:11 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a0:03:54:75:22:7f:3d:f1:4f:84:35:a5:bc:79:e4:7f:b1:34:84:3f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1be451a07dbd5d110a2f3de02d6463af84723665 42de7623aa53eb02d8d4a3a801c24ce3aacbc49a 434c2b468fcaa9fa6db7238804e9d897d07a3e9b 46efdbd04848cdba691b9f83f54e9215a50456df 1a69e0fc59f33152439f6c67bf8cf8e9e1a3694e 20944c4af3ca88b14e8a9d029a18834e82fae6f7 c892b5870b291bcf96cb3ea75762fab2a46e7574 bd4fb7451db90d8cd6003bdd2a7a138b28821467 6012e7974bd300a448a7bca1904c16005555d37e 5f052acb8fa740cb4509e855cd930606876c4d78 cdae5d32ae0d8e10bf63222014790cd34ee28c43 0f5ce10bc7f1c8a9a62803502f9db5cc26804353 617561854f135b56ef8e3fc6c66fa215563f3983 0b0291f6717af1dbf3f92bdfb740500f7930216f 8be2f088bd4aa1d7c73f0d6d1411b6eab67f7d8c 1e8a5321c8b62902877a130126f18d9f1d8ea2e5 bf76c43ffd869521f0e48463a069792c4318fb6b b56b12d4e3fb0ecbbd22e69ef22ccf0696f948d5 fa86c8b70f13417cef8ed4620d1aef5d584df1af 2a9ca010 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [72:92:1b:2e:56:fe:59:e0:58:ef:72:34:4a:11:39:45:d5:02:9f:e7] modulus: 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 public exponent: 10001 ] 2022-07-06 05:03:47.635  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-06 05:03:47.637 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-06 05:03:47.640 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-06 05:03:47.641 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-06 05:03:47.642  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-06 05:03:47.642  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-06 05:03:47.643  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-06 05:03:47.643 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-06 05:03:47.644 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-06 05:03:47.644 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-06 05:03:47.654 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-06 05:03:47.655 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-06 05:03:47.656 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-06 05:03:47.656 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-06 05:03:47.846  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-06 05:03:47.847  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-06 05:03:47.848 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-06 05:03:47.848 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-06 05:03:47.850  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-06 05:03:47.851  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-06 05:03:47.851 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 05:03:47.858 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 05:03:47.859 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 05:03:47.860 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 05:03:47.860 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 05:03:47.861 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 05:03:47.862 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 05:03:47.862 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 05:03:47.862 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 05:03:47.863 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-06 05:03:47.869 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 166728562549757016066061585686391873741584172858 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jul 06 03:21:12 UTC 2022 Final Date: Mon Jul 05 03:21:11 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a0:03:54:75:22:7f:3d:f1:4f:84:35:a5:bc:79:e4:7f:b1:34:84:3f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1be451a07dbd5d110a2f3de02d6463af84723665 42de7623aa53eb02d8d4a3a801c24ce3aacbc49a 434c2b468fcaa9fa6db7238804e9d897d07a3e9b 46efdbd04848cdba691b9f83f54e9215a50456df 1a69e0fc59f33152439f6c67bf8cf8e9e1a3694e 20944c4af3ca88b14e8a9d029a18834e82fae6f7 c892b5870b291bcf96cb3ea75762fab2a46e7574 bd4fb7451db90d8cd6003bdd2a7a138b28821467 6012e7974bd300a448a7bca1904c16005555d37e 5f052acb8fa740cb4509e855cd930606876c4d78 cdae5d32ae0d8e10bf63222014790cd34ee28c43 0f5ce10bc7f1c8a9a62803502f9db5cc26804353 617561854f135b56ef8e3fc6c66fa215563f3983 0b0291f6717af1dbf3f92bdfb740500f7930216f 8be2f088bd4aa1d7c73f0d6d1411b6eab67f7d8c 1e8a5321c8b62902877a130126f18d9f1d8ea2e5 bf76c43ffd869521f0e48463a069792c4318fb6b b56b12d4e3fb0ecbbd22e69ef22ccf0696f948d5 fa86c8b70f13417cef8ed4620d1aef5d584df1af 2a9ca010 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2a:b4:cb:84:3a:da:3f:d4:31:13:1d:87:3d:84:da:02:84:a3:51:83] modulus: bc14a2a85cc9ef60400d471f13629fc93b14b173fdd1757f80ca2c6a76a8c0832e803a17c46181c79beb2b64417e50b7995f369921f6f61d539400dc928d0d2cb0d16ec52303bafaa90eb1f0e85bd0dfef604c71343711128b2fd06df32934502ebb027bd2ad1c7caaaacdad9a3601aa1153278c6016e29fecec2d2a0819ce0a39c72c85bf967dcac7ad1db4cfbcf4c9071c33e91f1a435d8ebe496cbd31c1622e69c3395658448b03b88d540b1fcc1b2d5e79d39f3d9871725f9d787feb142b66fb042ae4344570c8cedc5b7c8db7c061fe72278b91f3725d279da2b5357e99c1007e638ba37b45b69ff844afb663aa3ef766778e6e8e08de688ba11bf9ff0b public exponent: 10001 ] 2022-07-06 05:07:35.401  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-06 05:07:35.402 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-06 05:07:35.405 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-06 05:07:35.405 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-06 05:07:35.406  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-06 05:07:35.407  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-06 05:07:35.407  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-06 05:07:35.408 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-06 05:07:35.408 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-06 05:07:35.409 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-06 05:07:35.415 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-06 05:07:35.415 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-06 05:07:35.416 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-06 05:07:35.416 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-06 05:07:35.588  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-06 05:07:35.589  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-06 05:07:35.590 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-06 05:07:35.590 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-06 05:07:35.592  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-06 05:07:35.593  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-06 05:07:35.593 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 05:07:35.594 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 05:07:35.594 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 05:07:35.595 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 05:07:35.596 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 05:07:35.597 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 05:07:35.598 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 05:07:35.598 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 05:07:35.598 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 05:07:35.600 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-06 05:07:35.626 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 166728562549757016066061585686391873741584172858 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jul 06 03:21:12 UTC 2022 Final Date: Mon Jul 05 03:21:11 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a0:03:54:75:22:7f:3d:f1:4f:84:35:a5:bc:79:e4:7f:b1:34:84:3f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1be451a07dbd5d110a2f3de02d6463af84723665 42de7623aa53eb02d8d4a3a801c24ce3aacbc49a 434c2b468fcaa9fa6db7238804e9d897d07a3e9b 46efdbd04848cdba691b9f83f54e9215a50456df 1a69e0fc59f33152439f6c67bf8cf8e9e1a3694e 20944c4af3ca88b14e8a9d029a18834e82fae6f7 c892b5870b291bcf96cb3ea75762fab2a46e7574 bd4fb7451db90d8cd6003bdd2a7a138b28821467 6012e7974bd300a448a7bca1904c16005555d37e 5f052acb8fa740cb4509e855cd930606876c4d78 cdae5d32ae0d8e10bf63222014790cd34ee28c43 0f5ce10bc7f1c8a9a62803502f9db5cc26804353 617561854f135b56ef8e3fc6c66fa215563f3983 0b0291f6717af1dbf3f92bdfb740500f7930216f 8be2f088bd4aa1d7c73f0d6d1411b6eab67f7d8c 1e8a5321c8b62902877a130126f18d9f1d8ea2e5 bf76c43ffd869521f0e48463a069792c4318fb6b b56b12d4e3fb0ecbbd22e69ef22ccf0696f948d5 fa86c8b70f13417cef8ed4620d1aef5d584df1af 2a9ca010 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0e:4a:2e:de:94:93:80:d9:b6:e3:39:db:25:0b:eb:a6:ca:67:16:da] modulus: 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 public exponent: 10001 ] 2022-07-06 05:09:16.207  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-06 05:09:16.208 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-06 05:09:16.210 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-06 05:09:16.210 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-06 05:09:16.211  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-06 05:09:16.212  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-06 05:09:16.212  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-06 05:09:16.213 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-06 05:09:16.213 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-06 05:09:16.213 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-06 05:09:16.219 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-06 05:09:16.221 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-06 05:09:16.221 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-06 05:09:16.222 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-06 05:09:16.390  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-06 05:09:16.391  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-06 05:09:16.391 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-06 05:09:16.392 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-06 05:09:16.393  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-06 05:09:16.394  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-06 05:09:16.395 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 05:09:16.395 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 05:09:16.396 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 05:09:16.397 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 05:09:16.398 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 05:09:16.398 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 05:09:16.399 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 05:09:16.399 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 05:09:16.400 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 05:09:16.401 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-06 05:09:16.405 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 166728562549757016066061585686391873741584172858 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jul 06 03:21:12 UTC 2022 Final Date: Mon Jul 05 03:21:11 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a0:03:54:75:22:7f:3d:f1:4f:84:35:a5:bc:79:e4:7f:b1:34:84:3f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1be451a07dbd5d110a2f3de02d6463af84723665 42de7623aa53eb02d8d4a3a801c24ce3aacbc49a 434c2b468fcaa9fa6db7238804e9d897d07a3e9b 46efdbd04848cdba691b9f83f54e9215a50456df 1a69e0fc59f33152439f6c67bf8cf8e9e1a3694e 20944c4af3ca88b14e8a9d029a18834e82fae6f7 c892b5870b291bcf96cb3ea75762fab2a46e7574 bd4fb7451db90d8cd6003bdd2a7a138b28821467 6012e7974bd300a448a7bca1904c16005555d37e 5f052acb8fa740cb4509e855cd930606876c4d78 cdae5d32ae0d8e10bf63222014790cd34ee28c43 0f5ce10bc7f1c8a9a62803502f9db5cc26804353 617561854f135b56ef8e3fc6c66fa215563f3983 0b0291f6717af1dbf3f92bdfb740500f7930216f 8be2f088bd4aa1d7c73f0d6d1411b6eab67f7d8c 1e8a5321c8b62902877a130126f18d9f1d8ea2e5 bf76c43ffd869521f0e48463a069792c4318fb6b b56b12d4e3fb0ecbbd22e69ef22ccf0696f948d5 fa86c8b70f13417cef8ed4620d1aef5d584df1af 2a9ca010 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [21:09:07:ca:f8:4d:0c:14:9e:be:a0:e3:77:98:0b:4f:08:b4:40:07] modulus: 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 public exponent: 10001 ] 2022-07-06 05:13:01.633  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-06 05:13:01.635 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-06 05:13:01.637 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-07-06 05:13:01.638 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-06 05:13:01.639  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-07-06 05:13:01.639  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-06 05:13:01.640  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-06 05:13:01.640 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-06 05:13:01.641 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-06 05:13:01.641 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-06 05:13:01.649 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-06 05:13:01.651 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-06 05:13:01.652 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-06 05:13:01.653 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-06 05:13:01.841  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-06 05:13:01.842  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-06 05:13:01.842 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-06 05:13:01.842 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-06 05:13:01.844  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-06 05:13:01.844  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-06 05:13:01.845 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 05:13:01.845 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 05:13:01.845 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 05:13:01.846 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 05:13:01.846 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 05:13:01.847 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 05:13:01.847 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 05:13:01.848 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 05:13:01.848 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 05:13:01.849 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-06 05:13:01.853 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 166728562549757016066061585686391873741584172858 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jul 06 03:21:12 UTC 2022 Final Date: Mon Jul 05 03:21:11 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a0:03:54:75:22:7f:3d:f1:4f:84:35:a5:bc:79:e4:7f:b1:34:84:3f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1be451a07dbd5d110a2f3de02d6463af84723665 42de7623aa53eb02d8d4a3a801c24ce3aacbc49a 434c2b468fcaa9fa6db7238804e9d897d07a3e9b 46efdbd04848cdba691b9f83f54e9215a50456df 1a69e0fc59f33152439f6c67bf8cf8e9e1a3694e 20944c4af3ca88b14e8a9d029a18834e82fae6f7 c892b5870b291bcf96cb3ea75762fab2a46e7574 bd4fb7451db90d8cd6003bdd2a7a138b28821467 6012e7974bd300a448a7bca1904c16005555d37e 5f052acb8fa740cb4509e855cd930606876c4d78 cdae5d32ae0d8e10bf63222014790cd34ee28c43 0f5ce10bc7f1c8a9a62803502f9db5cc26804353 617561854f135b56ef8e3fc6c66fa215563f3983 0b0291f6717af1dbf3f92bdfb740500f7930216f 8be2f088bd4aa1d7c73f0d6d1411b6eab67f7d8c 1e8a5321c8b62902877a130126f18d9f1d8ea2e5 bf76c43ffd869521f0e48463a069792c4318fb6b b56b12d4e3fb0ecbbd22e69ef22ccf0696f948d5 fa86c8b70f13417cef8ed4620d1aef5d584df1af 2a9ca010 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9f:1b:90:dd:f0:a4:25:03:41:1b:e8:1f:d5:d0:5d:fa:c6:7a:d2:0a] modulus: a871db21e1a828aefaad5fcede6064f9c8e538c05d4b4f2c320307ed42d63f725fd1251dd5b0476f2cf1426ef417de2fdc9f420c7b4b85f428429daf35bcab74d5491c3cbc759829807a36f7c583c2eb4509ab86b8784a41c0478945e98678e61aca9d75f0927f1553c7dcd8a48e24e6bad0070960b964485adb08bd113ac875d52b9b67605c2a413756e9075bffefb9f22e66e95d0b945e07bb5da5239ef7332c691096ee87276edceb645fec42ea51bd2be015a2833f46db90cd8761962680f28315ce37091d3d6a0da93370b57aa852c51975cd8fb9a08e3461ccb310b52900f1d28273a200930bbd450b0e22d074a3cf9d4057db3f7804c4dcb3b4b947b9 public exponent: 10001 ] 2022-07-06 05:13:02.781  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-06 05:13:02.782 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-06 05:13:02.783 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-06 05:13:02.784 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-06 05:13:02.785  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-06 05:13:02.785  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-06 05:13:02.785  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-06 05:13:02.786 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-06 05:13:02.786 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-06 05:13:02.786 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-06 05:13:02.792 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-06 05:13:02.793 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-06 05:13:02.793 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-06 05:13:02.793 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-06 05:13:02.937  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-06 05:13:02.938  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-06 05:13:02.938 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-06 05:13:02.938 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-06 05:13:02.940  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-06 05:13:02.941  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-06 05:13:02.941 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 05:13:02.942 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 05:13:02.942 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 05:13:02.943 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 05:13:02.943 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 05:13:02.943 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 05:13:02.944 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 05:13:02.945 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 05:13:02.945 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 05:13:02.946 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-06 05:13:02.953 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 166728562549757016066061585686391873741584172858 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jul 06 03:21:12 UTC 2022 Final Date: Mon Jul 05 03:21:11 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a0:03:54:75:22:7f:3d:f1:4f:84:35:a5:bc:79:e4:7f:b1:34:84:3f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1be451a07dbd5d110a2f3de02d6463af84723665 42de7623aa53eb02d8d4a3a801c24ce3aacbc49a 434c2b468fcaa9fa6db7238804e9d897d07a3e9b 46efdbd04848cdba691b9f83f54e9215a50456df 1a69e0fc59f33152439f6c67bf8cf8e9e1a3694e 20944c4af3ca88b14e8a9d029a18834e82fae6f7 c892b5870b291bcf96cb3ea75762fab2a46e7574 bd4fb7451db90d8cd6003bdd2a7a138b28821467 6012e7974bd300a448a7bca1904c16005555d37e 5f052acb8fa740cb4509e855cd930606876c4d78 cdae5d32ae0d8e10bf63222014790cd34ee28c43 0f5ce10bc7f1c8a9a62803502f9db5cc26804353 617561854f135b56ef8e3fc6c66fa215563f3983 0b0291f6717af1dbf3f92bdfb740500f7930216f 8be2f088bd4aa1d7c73f0d6d1411b6eab67f7d8c 1e8a5321c8b62902877a130126f18d9f1d8ea2e5 bf76c43ffd869521f0e48463a069792c4318fb6b b56b12d4e3fb0ecbbd22e69ef22ccf0696f948d5 fa86c8b70f13417cef8ed4620d1aef5d584df1af 2a9ca010 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [73:98:b5:28:d7:a7:2d:4d:03:79:d6:07:54:69:07:74:02:a7:5a:cc] modulus: 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 public exponent: 10001 ] 2022-07-06 05:16:44.556  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-06 05:16:44.559 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-06 05:16:44.561 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-06 05:16:44.562 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-06 05:16:44.563  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-06 05:16:44.565  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-06 05:16:44.566  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-06 05:16:44.567 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-06 05:16:44.568 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-06 05:16:44.569 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-06 05:16:44.576 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-06 05:16:44.578 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-06 05:16:44.578 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-06 05:16:44.578 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-06 05:16:44.833  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-06 05:16:44.834  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-06 05:16:44.834 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-06 05:16:44.835 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-06 05:16:44.836  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-06 05:16:44.837  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-06 05:16:44.838 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 05:16:44.838 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 05:16:44.838 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 05:16:44.840 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 05:16:44.840 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 05:16:44.841 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 05:16:44.842 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 05:16:44.842 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 05:16:44.842 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 05:16:44.843 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-06 05:16:44.847 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 166728562549757016066061585686391873741584172858 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jul 06 03:21:12 UTC 2022 Final Date: Mon Jul 05 03:21:11 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a0:03:54:75:22:7f:3d:f1:4f:84:35:a5:bc:79:e4:7f:b1:34:84:3f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1be451a07dbd5d110a2f3de02d6463af84723665 42de7623aa53eb02d8d4a3a801c24ce3aacbc49a 434c2b468fcaa9fa6db7238804e9d897d07a3e9b 46efdbd04848cdba691b9f83f54e9215a50456df 1a69e0fc59f33152439f6c67bf8cf8e9e1a3694e 20944c4af3ca88b14e8a9d029a18834e82fae6f7 c892b5870b291bcf96cb3ea75762fab2a46e7574 bd4fb7451db90d8cd6003bdd2a7a138b28821467 6012e7974bd300a448a7bca1904c16005555d37e 5f052acb8fa740cb4509e855cd930606876c4d78 cdae5d32ae0d8e10bf63222014790cd34ee28c43 0f5ce10bc7f1c8a9a62803502f9db5cc26804353 617561854f135b56ef8e3fc6c66fa215563f3983 0b0291f6717af1dbf3f92bdfb740500f7930216f 8be2f088bd4aa1d7c73f0d6d1411b6eab67f7d8c 1e8a5321c8b62902877a130126f18d9f1d8ea2e5 bf76c43ffd869521f0e48463a069792c4318fb6b b56b12d4e3fb0ecbbd22e69ef22ccf0696f948d5 fa86c8b70f13417cef8ed4620d1aef5d584df1af 2a9ca010 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a6:3e:00:8b:84:e4:e1:86:bf:3e:38:a9:33:75:09:85:14:d0:98:51] modulus: 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 public exponent: 10001 ] 2022-07-06 05:17:46.326  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-06 05:17:46.327 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-06 05:17:46.330 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-07-06 05:17:46.331 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-06 05:17:46.331  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-07-06 05:17:46.332  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-06 05:17:46.332  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-06 05:17:46.333 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-06 05:17:46.333 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-06 05:17:46.334 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-06 05:17:46.341 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-06 05:17:46.342 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-06 05:17:46.342 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-06 05:17:46.342 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-06 05:17:46.475  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-06 05:17:46.475  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-06 05:17:46.476 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-06 05:17:46.476 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-06 05:17:46.477  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-06 05:17:46.477  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-06 05:17:46.478 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 05:17:46.478 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 05:17:46.478 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 05:17:46.479 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 05:17:46.479 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 05:17:46.480 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 05:17:46.481 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 05:17:46.482 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 05:17:46.482 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 05:17:46.484 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-06 05:17:46.490 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 166728562549757016066061585686391873741584172858 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jul 06 03:21:12 UTC 2022 Final Date: Mon Jul 05 03:21:11 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a0:03:54:75:22:7f:3d:f1:4f:84:35:a5:bc:79:e4:7f:b1:34:84:3f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1be451a07dbd5d110a2f3de02d6463af84723665 42de7623aa53eb02d8d4a3a801c24ce3aacbc49a 434c2b468fcaa9fa6db7238804e9d897d07a3e9b 46efdbd04848cdba691b9f83f54e9215a50456df 1a69e0fc59f33152439f6c67bf8cf8e9e1a3694e 20944c4af3ca88b14e8a9d029a18834e82fae6f7 c892b5870b291bcf96cb3ea75762fab2a46e7574 bd4fb7451db90d8cd6003bdd2a7a138b28821467 6012e7974bd300a448a7bca1904c16005555d37e 5f052acb8fa740cb4509e855cd930606876c4d78 cdae5d32ae0d8e10bf63222014790cd34ee28c43 0f5ce10bc7f1c8a9a62803502f9db5cc26804353 617561854f135b56ef8e3fc6c66fa215563f3983 0b0291f6717af1dbf3f92bdfb740500f7930216f 8be2f088bd4aa1d7c73f0d6d1411b6eab67f7d8c 1e8a5321c8b62902877a130126f18d9f1d8ea2e5 bf76c43ffd869521f0e48463a069792c4318fb6b b56b12d4e3fb0ecbbd22e69ef22ccf0696f948d5 fa86c8b70f13417cef8ed4620d1aef5d584df1af 2a9ca010 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [07:d0:4e:78:05:47:cc:3d:7b:1b:fc:50:9a:fa:6b:5e:1b:38:78:5f] modulus: bd5106dfe8d7d47a2ffe9304217b9d19d5ebbe66812737bf65c17572acfa6daa29ba29edf72054dce1d600ee987f15ad005a25648c712a574213874356ee11c237106d545d358457394c2062bde196bd63e2cf52d1632428669504ce5bed21fbc1939e5e3c0a373c0150426e2e13315e795a9d8cfec2b59f7773e1f4c9bbb08e8652344b618a281951d37a074740594639943ae331316185fff502249c6efec8f520daf89b5d8f0b76ab66d3ae075a9f06507c900f2f934c5874f4a53afdd710d45391b49da2afb02693b17325f2b951413f75bcfda24f412d6c170ba2010f99659520a73d6c97c8dca64ea83c99c72217079377994620c9153983d3db5641c7 public exponent: 10001 ] 2022-07-06 05:18:03.796  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-06 05:18:03.798 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-06 05:18:03.799 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-07-06 05:18:03.800 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-06 05:18:03.800  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-07-06 05:18:03.801  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-06 05:18:03.802  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-06 05:18:03.802 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-06 05:18:03.803 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-06 05:18:03.803 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-06 05:18:03.809 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-06 05:18:03.810 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-06 05:18:03.810 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-06 05:18:03.811 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-06 05:18:04.042  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-06 05:18:04.043  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-06 05:18:04.044 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-06 05:18:04.045 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-06 05:18:04.047  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-06 05:18:04.048  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-06 05:18:04.049 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 05:18:04.049 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 05:18:04.050 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 05:18:04.051 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 05:18:04.051 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 05:18:04.051 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 05:18:04.052 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 05:18:04.053 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 05:18:04.054 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 05:18:04.055 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-06 05:18:04.061 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 166728562549757016066061585686391873741584172858 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jul 06 03:21:12 UTC 2022 Final Date: Mon Jul 05 03:21:11 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a0:03:54:75:22:7f:3d:f1:4f:84:35:a5:bc:79:e4:7f:b1:34:84:3f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1be451a07dbd5d110a2f3de02d6463af84723665 42de7623aa53eb02d8d4a3a801c24ce3aacbc49a 434c2b468fcaa9fa6db7238804e9d897d07a3e9b 46efdbd04848cdba691b9f83f54e9215a50456df 1a69e0fc59f33152439f6c67bf8cf8e9e1a3694e 20944c4af3ca88b14e8a9d029a18834e82fae6f7 c892b5870b291bcf96cb3ea75762fab2a46e7574 bd4fb7451db90d8cd6003bdd2a7a138b28821467 6012e7974bd300a448a7bca1904c16005555d37e 5f052acb8fa740cb4509e855cd930606876c4d78 cdae5d32ae0d8e10bf63222014790cd34ee28c43 0f5ce10bc7f1c8a9a62803502f9db5cc26804353 617561854f135b56ef8e3fc6c66fa215563f3983 0b0291f6717af1dbf3f92bdfb740500f7930216f 8be2f088bd4aa1d7c73f0d6d1411b6eab67f7d8c 1e8a5321c8b62902877a130126f18d9f1d8ea2e5 bf76c43ffd869521f0e48463a069792c4318fb6b b56b12d4e3fb0ecbbd22e69ef22ccf0696f948d5 fa86c8b70f13417cef8ed4620d1aef5d584df1af 2a9ca010 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [52:3f:e3:dd:37:d1:6a:58:b5:67:59:8f:36:77:7a:2a:18:ca:db:c5] modulus: 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 public exponent: 10001 ] 2022-07-06 05:20:35.191  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-06 05:20:35.197 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-06 05:20:35.199 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-06 05:20:35.200 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-06 05:20:35.203  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-06 05:20:35.204  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-06 05:20:35.204  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-06 05:20:35.205 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-06 05:20:35.205 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-06 05:20:35.206 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-06 05:20:35.217 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-06 05:20:35.219 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-06 05:20:35.219 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-06 05:20:35.219 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-06 05:20:35.381  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-06 05:20:35.382  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-06 05:20:35.382 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-06 05:20:35.393 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-06 05:20:35.394  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-06 05:20:35.395  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-06 05:20:35.395 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 05:20:35.397 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 05:20:35.397 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 05:20:35.398 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 05:20:35.399 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 05:20:35.399 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 05:20:35.400 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 05:20:35.400 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 05:20:35.401 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 05:20:35.402 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-06 05:20:35.415 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 166728562549757016066061585686391873741584172858 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jul 06 03:21:12 UTC 2022 Final Date: Mon Jul 05 03:21:11 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a0:03:54:75:22:7f:3d:f1:4f:84:35:a5:bc:79:e4:7f:b1:34:84:3f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1be451a07dbd5d110a2f3de02d6463af84723665 42de7623aa53eb02d8d4a3a801c24ce3aacbc49a 434c2b468fcaa9fa6db7238804e9d897d07a3e9b 46efdbd04848cdba691b9f83f54e9215a50456df 1a69e0fc59f33152439f6c67bf8cf8e9e1a3694e 20944c4af3ca88b14e8a9d029a18834e82fae6f7 c892b5870b291bcf96cb3ea75762fab2a46e7574 bd4fb7451db90d8cd6003bdd2a7a138b28821467 6012e7974bd300a448a7bca1904c16005555d37e 5f052acb8fa740cb4509e855cd930606876c4d78 cdae5d32ae0d8e10bf63222014790cd34ee28c43 0f5ce10bc7f1c8a9a62803502f9db5cc26804353 617561854f135b56ef8e3fc6c66fa215563f3983 0b0291f6717af1dbf3f92bdfb740500f7930216f 8be2f088bd4aa1d7c73f0d6d1411b6eab67f7d8c 1e8a5321c8b62902877a130126f18d9f1d8ea2e5 bf76c43ffd869521f0e48463a069792c4318fb6b b56b12d4e3fb0ecbbd22e69ef22ccf0696f948d5 fa86c8b70f13417cef8ed4620d1aef5d584df1af 2a9ca010 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [bc:5a:39:f4:5d:41:cf:c2:98:60:18:ec:70:dc:d3:4d:bb:d6:79:e9] modulus: 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 public exponent: 10001 ] 2022-07-06 05:24:25.570  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-06 05:24:25.573 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-06 05:24:25.576 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-06 05:24:25.584 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-06 05:24:25.585  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-06 05:24:25.587  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-06 05:24:25.588  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-06 05:24:25.588 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-06 05:24:25.588 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-06 05:24:25.589 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-06 05:24:25.594 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-06 05:24:25.594 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-06 05:24:25.595 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-06 05:24:25.595 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-06 05:24:25.791  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-06 05:24:25.793  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-06 05:24:25.793 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-06 05:24:25.793 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-06 05:24:25.795  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-06 05:24:25.796  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-06 05:24:25.796 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 05:24:25.797 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 05:24:25.797 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 05:24:25.798 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 05:24:25.798 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 05:24:25.798 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 05:24:25.801 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 05:24:25.802 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 05:24:25.802 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 05:24:25.803 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-06 05:24:25.807 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 166728562549757016066061585686391873741584172858 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jul 06 03:21:12 UTC 2022 Final Date: Mon Jul 05 03:21:11 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a0:03:54:75:22:7f:3d:f1:4f:84:35:a5:bc:79:e4:7f:b1:34:84:3f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1be451a07dbd5d110a2f3de02d6463af84723665 42de7623aa53eb02d8d4a3a801c24ce3aacbc49a 434c2b468fcaa9fa6db7238804e9d897d07a3e9b 46efdbd04848cdba691b9f83f54e9215a50456df 1a69e0fc59f33152439f6c67bf8cf8e9e1a3694e 20944c4af3ca88b14e8a9d029a18834e82fae6f7 c892b5870b291bcf96cb3ea75762fab2a46e7574 bd4fb7451db90d8cd6003bdd2a7a138b28821467 6012e7974bd300a448a7bca1904c16005555d37e 5f052acb8fa740cb4509e855cd930606876c4d78 cdae5d32ae0d8e10bf63222014790cd34ee28c43 0f5ce10bc7f1c8a9a62803502f9db5cc26804353 617561854f135b56ef8e3fc6c66fa215563f3983 0b0291f6717af1dbf3f92bdfb740500f7930216f 8be2f088bd4aa1d7c73f0d6d1411b6eab67f7d8c 1e8a5321c8b62902877a130126f18d9f1d8ea2e5 bf76c43ffd869521f0e48463a069792c4318fb6b b56b12d4e3fb0ecbbd22e69ef22ccf0696f948d5 fa86c8b70f13417cef8ed4620d1aef5d584df1af 2a9ca010 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f6:83:98:d5:00:9d:b5:9f:c8:01:a5:0b:da:76:1c:e3:0c:20:12:c3] modulus: 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 public exponent: 10001 ] 2022-07-06 05:28:35.137  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-06 05:28:35.140 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-06 05:28:35.142 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-06 05:28:35.142 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-06 05:28:35.143  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-06 05:28:35.143  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-06 05:28:35.144  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-06 05:28:35.144 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-06 05:28:35.145 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-06 05:28:35.146 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-06 05:28:35.152 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-06 05:28:35.153 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-06 05:28:35.153 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-06 05:28:35.153 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-06 05:28:35.394  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-06 05:28:35.395  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-06 05:28:35.395 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-06 05:28:35.395 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-06 05:28:35.397  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-06 05:28:35.397  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-06 05:28:35.397 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 05:28:35.398 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 05:28:35.398 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 05:28:35.399 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 05:28:35.399 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 05:28:35.399 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 05:28:35.400 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 05:28:35.400 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 05:28:35.400 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 05:28:35.401 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-06 05:28:35.406 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 166728562549757016066061585686391873741584172858 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jul 06 03:21:12 UTC 2022 Final Date: Mon Jul 05 03:21:11 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a0:03:54:75:22:7f:3d:f1:4f:84:35:a5:bc:79:e4:7f:b1:34:84:3f] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1be451a07dbd5d110a2f3de02d6463af84723665 42de7623aa53eb02d8d4a3a801c24ce3aacbc49a 434c2b468fcaa9fa6db7238804e9d897d07a3e9b 46efdbd04848cdba691b9f83f54e9215a50456df 1a69e0fc59f33152439f6c67bf8cf8e9e1a3694e 20944c4af3ca88b14e8a9d029a18834e82fae6f7 c892b5870b291bcf96cb3ea75762fab2a46e7574 bd4fb7451db90d8cd6003bdd2a7a138b28821467 6012e7974bd300a448a7bca1904c16005555d37e 5f052acb8fa740cb4509e855cd930606876c4d78 cdae5d32ae0d8e10bf63222014790cd34ee28c43 0f5ce10bc7f1c8a9a62803502f9db5cc26804353 617561854f135b56ef8e3fc6c66fa215563f3983 0b0291f6717af1dbf3f92bdfb740500f7930216f 8be2f088bd4aa1d7c73f0d6d1411b6eab67f7d8c 1e8a5321c8b62902877a130126f18d9f1d8ea2e5 bf76c43ffd869521f0e48463a069792c4318fb6b b56b12d4e3fb0ecbbd22e69ef22ccf0696f948d5 fa86c8b70f13417cef8ed4620d1aef5d584df1af 2a9ca010 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [cb:5f:54:1d:e0:05:ea:54:d1:cd:30:c0:dd:a5:f2:c2:3a:3e:b6:60] modulus: aef043130e8ae9524c50320d4694b5e05b4c3e00dde15423f296b150ef833938911c4d5dbe1de3dc205c5ed327a49b0bca2184c14d61d11626b65c257d349b80cc995b52325ed803e8b437b7207295b155a0352d76af1625f0c90c45b820cae4686721b37b14aeb8f8f9fec0d940944869ab577f03e4b2f03f5e5a97fa633bfec32b05c9f46d7bbef8c126f2f2201bbf93c620c8c20d2bd1e1a567dc7ee6396a7eb1ba692e7b853461904ccf804e351c13143b392c67416fb2dbd3a262c7ae1985108638f20059db996db08ac964276c7ef112ef2680abb60fca3b7409051743175c6cfbe52198edea85bded17168a9185d919dfc5b1ed70e7d1e104ce304e9b public exponent: 10001 ]