2022-07-09 03:29:06,041 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-07-09 03:29:07,669 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-07-09 03:29:08.577  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Jul 09, 2022 3:29:11 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jul 09, 2022 3:29:11 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jul 09, 2022 3:29:11 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jul 09, 2022 3:29:11 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-07-09 03:29:12.423 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-07-09 03:29:12.795  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-07-09 03:29:13.035  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-07-09 03:29:13.995 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-07-09 03:29:13.999 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-07-09 03:29:14.001 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-07-09 03:29:14.005 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-07-09 03:29:14.062 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-07-09 03:29:14.069 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-07-09 03:29:14.255 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-07-09 03:29:14.906 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jul 09, 2022 3:29:15 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-07-09 03:29:16.164  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 11.116 seconds (JVM running for 13.705) Jul 09, 2022 3:29:35 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-07-09 03:30:03.369  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-09 03:30:03.401 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-09 03:30:03.473 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-07-09 03:30:03.480 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-09 03:30:03.504  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-07-09 03:30:03.508  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-09 03:30:03.509  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-09 03:30:03.511 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-09 03:30:03.512 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-09 03:30:03.521 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-09 03:30:03.530 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-09 03:30:03.534 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-09 03:30:03.605 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-09 03:30:03.613 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-09 03:30:03.614 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-09 03:30:03.620 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 03:30:04.722  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-09 03:30:04.727  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-09 03:30:04.729 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-09 03:30:04.732 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 03:30:04.750  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-09 03:30:04.753  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-09 03:30:04.756 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 03:30:04.757 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-09 03:30:04.758 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-09 03:30:04.785 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 03:30:04.785 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-09 03:30:04.786 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-09 03:30:04.794 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 03:30:04.794 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-09 03:30:04.795 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-09 03:30:04.797 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-09 03:30:04.837 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 120618192430549738502055112679905894490987562962 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jul 09 03:25:17 UTC 2022 Final Date: Thu Jul 08 03:25:16 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a0:ce:ca:d8:36:ee:51:ce:0c:b2:18:c0:6e:c0:ec:8d:c6:3b:b9:f4] modulus: a191aa7e5a02798ac41814e6086d16cec54e984f3c50ec66766267173e6a71f444637e018bfcae9286d030512025c1a6cbe493b257fda513318c0a68f4a6ad297a36d48ada2a30ad4bc6c846c630a262f2b134555beba8a8ea253a4cfc57254a841d1b283439cac81cdd9ff03586d08e4af4403fb2cb0410371287dc0b7d7df4e3b7f780ed01dddd5e5f248b69a04f413714a04078dee0cf3530b488f9de674f8d87aa539b3ab1fa51dd4c6a01b3237dbffa7dfe2b05c5326daa424928fefad889999b0c053d1d7fdb3bba5455d7dab9e09b178b2b6ed593490c44b256fbc9411130433ada0159e7b2a06998e1334c90f550c0a69526b847698598a1ec5f301775bb2f9304245ff0c9881ec1cbc3bc3fbdade580b68988f18769668b291a71409486d0783d6c2aa45735561a58de5adac9ed8c87b8372310c177f507822a4ff382abd47d3980d80e6ffc28ff856650b9a0596be776e1cbf1d4be6eba10b9d97fd571196df1dcd086d908d3f0174981a5afc3391daa83ff35a846697fe39c14d1 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 79b4da20f3266e8d81e92eb5ff84cc9d79251aba c4f536fe13665ad2d0c2d71e44a6bb628c094686 65afd5a5f5f2fb84f8ffa77197373e4a5da4f294 998a895ec581b387482497a1aca5cb6de53448fc dc76e716f4a60654b6c4e628056c6f4754ca1064 e314431ff824c67a4efed3941916f5d386985660 a8faad9645e98e8be8cddaa956d35d9d7abfe4b0 aed388f4cc6e44bce809adbc72cbce5d5a8039a4 0bc75639fd6f273ad71730774cb6a17127bf1105 57f09ffc067d7f992fdfa6d76a5fce7eb610e8c2 dc64b3436e9eac2d6234e45cd695182d4f89c126 c94b692ddfbc6356e12e63f837f223ba6f1e1aab 119412cba3a412f3a0619af4427f795e611b7c48 121688a4e867e9a64bbfe8b0e6dcb884d71e68fb 74d2f5f1db24f9d5a7f0e932b8800953ac4781ad 4178844227c36b77d7f740bb189c7014ee7a60d0 30f67efac2171aa5942f05b9241a7f26afde0ec7 09023f2c3eadb6b9c837b52a5180d51d88617c90 2fa8529707c49c92a3ece1f875e39f5e12a2a97a 14d3dafd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2f:72:ce:26:15:f6:bf:4e:b5:b3:e9:8b:30:6b:c1:fd:c6:a8:02:fd] modulus: dc821234ae0c562308bde9ebdff58ab46b2ed0ccb68ec64964654136c85f0e839bff5c406433af6c143953a600a5fe2513603282389d9e8ebeb947d39e7bde3ddab41231226e98aef71fd609ec5aa72cf0c405fde8813346dfd1a8778e6b2294da1bb5e7c7c74f851e74727b8dc8b80746d04c4c1e9891bade4fbfff2708c13bda890c07dcdc1e8f28eaac215f283ffa5c150a59419340ad3e308c7a763a3155d8c05cd6e216fdc6dd97afab38d569bad9e08dda54a52e5c918203137b154fd9653455e22ed8faa48856cc78070b9ffb4609448c686626daa786c30f5b7fb9fa3d35450dc85ffe756b79c8c37de31f45db809501f965feeb76ef477c12617377 public exponent: 10001 ] 2022-07-09 05:53:14.879  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-09 05:53:14.884 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-09 05:53:14.887 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-09 05:53:14.888 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-09 05:53:14.889  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-09 05:53:14.891  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-09 05:53:14.892  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-09 05:53:14.893 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-09 05:53:14.894 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-09 05:53:14.894 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-09 05:53:14.906 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-09 05:53:14.908 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-09 05:53:14.909 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-09 05:53:14.910 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 05:53:15.290  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-09 05:53:15.292  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-09 05:53:15.293 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-09 05:53:15.293 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 05:53:15.298  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-09 05:53:15.299  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-09 05:53:15.301 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 05:53:15.301 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-09 05:53:15.302 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-09 05:53:15.304 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 05:53:15.305 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-09 05:53:15.306 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-09 05:53:15.307 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 05:53:15.308 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-09 05:53:15.308 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-09 05:53:15.310 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-09 05:53:15.317 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 120618192430549738502055112679905894490987562962 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jul 09 03:25:17 UTC 2022 Final Date: Thu Jul 08 03:25:16 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a0:ce:ca:d8:36:ee:51:ce:0c:b2:18:c0:6e:c0:ec:8d:c6:3b:b9:f4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 79b4da20f3266e8d81e92eb5ff84cc9d79251aba c4f536fe13665ad2d0c2d71e44a6bb628c094686 65afd5a5f5f2fb84f8ffa77197373e4a5da4f294 998a895ec581b387482497a1aca5cb6de53448fc dc76e716f4a60654b6c4e628056c6f4754ca1064 e314431ff824c67a4efed3941916f5d386985660 a8faad9645e98e8be8cddaa956d35d9d7abfe4b0 aed388f4cc6e44bce809adbc72cbce5d5a8039a4 0bc75639fd6f273ad71730774cb6a17127bf1105 57f09ffc067d7f992fdfa6d76a5fce7eb610e8c2 dc64b3436e9eac2d6234e45cd695182d4f89c126 c94b692ddfbc6356e12e63f837f223ba6f1e1aab 119412cba3a412f3a0619af4427f795e611b7c48 121688a4e867e9a64bbfe8b0e6dcb884d71e68fb 74d2f5f1db24f9d5a7f0e932b8800953ac4781ad 4178844227c36b77d7f740bb189c7014ee7a60d0 30f67efac2171aa5942f05b9241a7f26afde0ec7 09023f2c3eadb6b9c837b52a5180d51d88617c90 2fa8529707c49c92a3ece1f875e39f5e12a2a97a 14d3dafd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [bd:42:f4:9f:f4:9a:f1:9a:18:4c:8c:dd:1e:e1:7c:0f:6f:94:d8:03] modulus: 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 public exponent: 10001 ] 2022-07-09 05:55:03.901  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-09 05:55:03.903 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-09 05:55:03.906 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-07-09 05:55:03.907 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-09 05:55:03.908  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-07-09 05:55:03.909  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-09 05:55:03.910  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-09 05:55:03.910 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-09 05:55:03.911 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-09 05:55:03.913 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-09 05:55:03.921 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-09 05:55:03.922 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-09 05:55:03.923 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-09 05:55:03.924 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 05:55:04.277  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-09 05:55:04.280  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-09 05:55:04.281 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-09 05:55:04.281 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 05:55:04.285  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-09 05:55:04.286  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-09 05:55:04.286 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 05:55:04.287 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-09 05:55:04.288 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-09 05:55:04.289 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 05:55:04.290 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-09 05:55:04.290 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-09 05:55:04.292 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 05:55:04.292 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-09 05:55:04.293 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-09 05:55:04.294 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-09 05:55:04.301 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 120618192430549738502055112679905894490987562962 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jul 09 03:25:17 UTC 2022 Final Date: Thu Jul 08 03:25:16 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a0:ce:ca:d8:36:ee:51:ce:0c:b2:18:c0:6e:c0:ec:8d:c6:3b:b9:f4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 79b4da20f3266e8d81e92eb5ff84cc9d79251aba c4f536fe13665ad2d0c2d71e44a6bb628c094686 65afd5a5f5f2fb84f8ffa77197373e4a5da4f294 998a895ec581b387482497a1aca5cb6de53448fc dc76e716f4a60654b6c4e628056c6f4754ca1064 e314431ff824c67a4efed3941916f5d386985660 a8faad9645e98e8be8cddaa956d35d9d7abfe4b0 aed388f4cc6e44bce809adbc72cbce5d5a8039a4 0bc75639fd6f273ad71730774cb6a17127bf1105 57f09ffc067d7f992fdfa6d76a5fce7eb610e8c2 dc64b3436e9eac2d6234e45cd695182d4f89c126 c94b692ddfbc6356e12e63f837f223ba6f1e1aab 119412cba3a412f3a0619af4427f795e611b7c48 121688a4e867e9a64bbfe8b0e6dcb884d71e68fb 74d2f5f1db24f9d5a7f0e932b8800953ac4781ad 4178844227c36b77d7f740bb189c7014ee7a60d0 30f67efac2171aa5942f05b9241a7f26afde0ec7 09023f2c3eadb6b9c837b52a5180d51d88617c90 2fa8529707c49c92a3ece1f875e39f5e12a2a97a 14d3dafd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [77:52:7c:38:be:bc:cf:79:2f:12:59:51:5d:c4:6f:95:fc:6b:99:68] modulus: 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 public exponent: 10001 ] 2022-07-09 05:56:14.200  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-09 05:56:14.202 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-09 05:56:14.204 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-07-09 05:56:14.205 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-09 05:56:14.206  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-07-09 05:56:14.206  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-09 05:56:14.207  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-09 05:56:14.208 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-09 05:56:14.208 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-09 05:56:14.209 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-09 05:56:14.214 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-09 05:56:14.214 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-09 05:56:14.215 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-09 05:56:14.216 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 05:56:14.542  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-09 05:56:14.543  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-09 05:56:14.544 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-09 05:56:14.545 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 05:56:14.549  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-09 05:56:14.550  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-09 05:56:14.551 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 05:56:14.552 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-09 05:56:14.552 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-09 05:56:14.553 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 05:56:14.554 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-09 05:56:14.554 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-09 05:56:14.555 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 05:56:14.556 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-09 05:56:14.556 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-09 05:56:14.558 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-09 05:56:14.565 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 120618192430549738502055112679905894490987562962 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jul 09 03:25:17 UTC 2022 Final Date: Thu Jul 08 03:25:16 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a0:ce:ca:d8:36:ee:51:ce:0c:b2:18:c0:6e:c0:ec:8d:c6:3b:b9:f4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 79b4da20f3266e8d81e92eb5ff84cc9d79251aba c4f536fe13665ad2d0c2d71e44a6bb628c094686 65afd5a5f5f2fb84f8ffa77197373e4a5da4f294 998a895ec581b387482497a1aca5cb6de53448fc dc76e716f4a60654b6c4e628056c6f4754ca1064 e314431ff824c67a4efed3941916f5d386985660 a8faad9645e98e8be8cddaa956d35d9d7abfe4b0 aed388f4cc6e44bce809adbc72cbce5d5a8039a4 0bc75639fd6f273ad71730774cb6a17127bf1105 57f09ffc067d7f992fdfa6d76a5fce7eb610e8c2 dc64b3436e9eac2d6234e45cd695182d4f89c126 c94b692ddfbc6356e12e63f837f223ba6f1e1aab 119412cba3a412f3a0619af4427f795e611b7c48 121688a4e867e9a64bbfe8b0e6dcb884d71e68fb 74d2f5f1db24f9d5a7f0e932b8800953ac4781ad 4178844227c36b77d7f740bb189c7014ee7a60d0 30f67efac2171aa5942f05b9241a7f26afde0ec7 09023f2c3eadb6b9c837b52a5180d51d88617c90 2fa8529707c49c92a3ece1f875e39f5e12a2a97a 14d3dafd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a7:ab:75:17:d1:71:16:83:d0:d4:fc:d8:85:ef:ba:30:fb:c3:a2:dd] modulus: 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 public exponent: 10001 ] 2022-07-09 05:58:34.097  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-09 05:58:34.099 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-09 05:58:34.101 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-09 05:58:34.102 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-09 05:58:34.103  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-09 05:58:34.104  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-09 05:58:34.104  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-09 05:58:34.105 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-09 05:58:34.105 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-09 05:58:34.106 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-09 05:58:34.111 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-09 05:58:34.112 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-09 05:58:34.113 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-09 05:58:34.113 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 05:58:34.413  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-09 05:58:34.414  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-09 05:58:34.415 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-09 05:58:34.415 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 05:58:34.418  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-09 05:58:34.419  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-09 05:58:34.420 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 05:58:34.421 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-09 05:58:34.422 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-09 05:58:34.424 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 05:58:34.425 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-09 05:58:34.426 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-09 05:58:34.427 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 05:58:34.428 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-09 05:58:34.428 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-09 05:58:34.429 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-09 05:58:34.433 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 120618192430549738502055112679905894490987562962 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jul 09 03:25:17 UTC 2022 Final Date: Thu Jul 08 03:25:16 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a0:ce:ca:d8:36:ee:51:ce:0c:b2:18:c0:6e:c0:ec:8d:c6:3b:b9:f4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 79b4da20f3266e8d81e92eb5ff84cc9d79251aba c4f536fe13665ad2d0c2d71e44a6bb628c094686 65afd5a5f5f2fb84f8ffa77197373e4a5da4f294 998a895ec581b387482497a1aca5cb6de53448fc dc76e716f4a60654b6c4e628056c6f4754ca1064 e314431ff824c67a4efed3941916f5d386985660 a8faad9645e98e8be8cddaa956d35d9d7abfe4b0 aed388f4cc6e44bce809adbc72cbce5d5a8039a4 0bc75639fd6f273ad71730774cb6a17127bf1105 57f09ffc067d7f992fdfa6d76a5fce7eb610e8c2 dc64b3436e9eac2d6234e45cd695182d4f89c126 c94b692ddfbc6356e12e63f837f223ba6f1e1aab 119412cba3a412f3a0619af4427f795e611b7c48 121688a4e867e9a64bbfe8b0e6dcb884d71e68fb 74d2f5f1db24f9d5a7f0e932b8800953ac4781ad 4178844227c36b77d7f740bb189c7014ee7a60d0 30f67efac2171aa5942f05b9241a7f26afde0ec7 09023f2c3eadb6b9c837b52a5180d51d88617c90 2fa8529707c49c92a3ece1f875e39f5e12a2a97a 14d3dafd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [55:cc:3a:b5:30:1b:bc:26:d5:34:1f:5b:9b:f7:ca:f5:c9:6a:59:db] modulus: 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 public exponent: 10001 ] 2022-07-09 06:02:39.452  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-09 06:02:39.455 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-09 06:02:39.459 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-09 06:02:39.462 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-09 06:02:39.463  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-09 06:02:39.472  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-09 06:02:39.473  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-09 06:02:39.474 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-09 06:02:39.475 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-09 06:02:39.475 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-09 06:02:39.494 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-09 06:02:39.497 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-09 06:02:39.498 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-09 06:02:39.499 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 06:02:39.914  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-09 06:02:39.915  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-09 06:02:39.916 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-09 06:02:39.916 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 06:02:39.918  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-09 06:02:39.919  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-09 06:02:39.920 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:02:39.921 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:02:39.923 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:02:39.925 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:02:39.925 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:02:39.925 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:02:39.926 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:02:39.927 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:02:39.927 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:02:39.928 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-09 06:02:39.934 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 120618192430549738502055112679905894490987562962 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jul 09 03:25:17 UTC 2022 Final Date: Thu Jul 08 03:25:16 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a0:ce:ca:d8:36:ee:51:ce:0c:b2:18:c0:6e:c0:ec:8d:c6:3b:b9:f4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 79b4da20f3266e8d81e92eb5ff84cc9d79251aba c4f536fe13665ad2d0c2d71e44a6bb628c094686 65afd5a5f5f2fb84f8ffa77197373e4a5da4f294 998a895ec581b387482497a1aca5cb6de53448fc dc76e716f4a60654b6c4e628056c6f4754ca1064 e314431ff824c67a4efed3941916f5d386985660 a8faad9645e98e8be8cddaa956d35d9d7abfe4b0 aed388f4cc6e44bce809adbc72cbce5d5a8039a4 0bc75639fd6f273ad71730774cb6a17127bf1105 57f09ffc067d7f992fdfa6d76a5fce7eb610e8c2 dc64b3436e9eac2d6234e45cd695182d4f89c126 c94b692ddfbc6356e12e63f837f223ba6f1e1aab 119412cba3a412f3a0619af4427f795e611b7c48 121688a4e867e9a64bbfe8b0e6dcb884d71e68fb 74d2f5f1db24f9d5a7f0e932b8800953ac4781ad 4178844227c36b77d7f740bb189c7014ee7a60d0 30f67efac2171aa5942f05b9241a7f26afde0ec7 09023f2c3eadb6b9c837b52a5180d51d88617c90 2fa8529707c49c92a3ece1f875e39f5e12a2a97a 14d3dafd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [95:d5:bc:6b:a5:01:b8:3f:59:9a:7a:6b:c6:11:fb:65:fa:11:fd:2f] modulus: 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 public exponent: 10001 ] 2022-07-09 06:06:21.224  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-09 06:06:21.227 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-09 06:06:21.232 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-09 06:06:21.233 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-09 06:06:21.234  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-09 06:06:21.235  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-09 06:06:21.235  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-09 06:06:21.235 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-09 06:06:21.236 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-09 06:06:21.237 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-09 06:06:21.244 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-09 06:06:21.246 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-09 06:06:21.246 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-09 06:06:21.247 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 06:06:21.729  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-09 06:06:21.729  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-09 06:06:21.730 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-09 06:06:21.730 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 06:06:21.733  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-09 06:06:21.733  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-09 06:06:21.734 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:06:21.734 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:06:21.734 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:06:21.735 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:06:21.735 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:06:21.735 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:06:21.736 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:06:21.736 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:06:21.737 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:06:21.738 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-09 06:06:21.742 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 120618192430549738502055112679905894490987562962 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jul 09 03:25:17 UTC 2022 Final Date: Thu Jul 08 03:25:16 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a0:ce:ca:d8:36:ee:51:ce:0c:b2:18:c0:6e:c0:ec:8d:c6:3b:b9:f4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 79b4da20f3266e8d81e92eb5ff84cc9d79251aba c4f536fe13665ad2d0c2d71e44a6bb628c094686 65afd5a5f5f2fb84f8ffa77197373e4a5da4f294 998a895ec581b387482497a1aca5cb6de53448fc dc76e716f4a60654b6c4e628056c6f4754ca1064 e314431ff824c67a4efed3941916f5d386985660 a8faad9645e98e8be8cddaa956d35d9d7abfe4b0 aed388f4cc6e44bce809adbc72cbce5d5a8039a4 0bc75639fd6f273ad71730774cb6a17127bf1105 57f09ffc067d7f992fdfa6d76a5fce7eb610e8c2 dc64b3436e9eac2d6234e45cd695182d4f89c126 c94b692ddfbc6356e12e63f837f223ba6f1e1aab 119412cba3a412f3a0619af4427f795e611b7c48 121688a4e867e9a64bbfe8b0e6dcb884d71e68fb 74d2f5f1db24f9d5a7f0e932b8800953ac4781ad 4178844227c36b77d7f740bb189c7014ee7a60d0 30f67efac2171aa5942f05b9241a7f26afde0ec7 09023f2c3eadb6b9c837b52a5180d51d88617c90 2fa8529707c49c92a3ece1f875e39f5e12a2a97a 14d3dafd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3b:28:d3:1f:83:ba:95:ea:d4:9e:f1:e6:4b:5d:63:09:e7:77:dd:e1] modulus: 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 public exponent: 10001 ] 2022-07-09 06:08:18.872  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-09 06:08:18.877 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-09 06:08:18.879 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-09 06:08:18.880 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-09 06:08:18.881  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-09 06:08:18.882  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-09 06:08:18.882  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-09 06:08:18.883 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-09 06:08:18.883 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-09 06:08:18.884 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-09 06:08:18.891 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-09 06:08:18.893 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-09 06:08:18.893 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-09 06:08:18.894 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 06:08:19.247  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-09 06:08:19.249  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-09 06:08:19.249 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-09 06:08:19.250 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 06:08:19.251  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-09 06:08:19.251  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-09 06:08:19.252 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:08:19.252 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:08:19.253 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:08:19.253 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:08:19.254 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:08:19.254 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:08:19.255 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:08:19.256 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:08:19.256 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:08:19.258 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-09 06:08:19.263 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 120618192430549738502055112679905894490987562962 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jul 09 03:25:17 UTC 2022 Final Date: Thu Jul 08 03:25:16 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a0:ce:ca:d8:36:ee:51:ce:0c:b2:18:c0:6e:c0:ec:8d:c6:3b:b9:f4] modulus: a191aa7e5a02798ac41814e6086d16cec54e984f3c50ec66766267173e6a71f444637e018bfcae9286d030512025c1a6cbe493b257fda513318c0a68f4a6ad297a36d48ada2a30ad4bc6c846c630a262f2b134555beba8a8ea253a4cfc57254a841d1b283439cac81cdd9ff03586d08e4af4403fb2cb0410371287dc0b7d7df4e3b7f780ed01dddd5e5f248b69a04f413714a04078dee0cf3530b488f9de674f8d87aa539b3ab1fa51dd4c6a01b3237dbffa7dfe2b05c5326daa424928fefad889999b0c053d1d7fdb3bba5455d7dab9e09b178b2b6ed593490c44b256fbc9411130433ada0159e7b2a06998e1334c90f550c0a69526b847698598a1ec5f301775bb2f9304245ff0c9881ec1cbc3bc3fbdade580b68988f18769668b291a71409486d0783d6c2aa45735561a58de5adac9ed8c87b8372310c177f507822a4ff382abd47d3980d80e6ffc28ff856650b9a0596be776e1cbf1d4be6eba10b9d97fd571196df1dcd086d908d3f0174981a5afc3391daa83ff35a846697fe39c14d1 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 79b4da20f3266e8d81e92eb5ff84cc9d79251aba c4f536fe13665ad2d0c2d71e44a6bb628c094686 65afd5a5f5f2fb84f8ffa77197373e4a5da4f294 998a895ec581b387482497a1aca5cb6de53448fc dc76e716f4a60654b6c4e628056c6f4754ca1064 e314431ff824c67a4efed3941916f5d386985660 a8faad9645e98e8be8cddaa956d35d9d7abfe4b0 aed388f4cc6e44bce809adbc72cbce5d5a8039a4 0bc75639fd6f273ad71730774cb6a17127bf1105 57f09ffc067d7f992fdfa6d76a5fce7eb610e8c2 dc64b3436e9eac2d6234e45cd695182d4f89c126 c94b692ddfbc6356e12e63f837f223ba6f1e1aab 119412cba3a412f3a0619af4427f795e611b7c48 121688a4e867e9a64bbfe8b0e6dcb884d71e68fb 74d2f5f1db24f9d5a7f0e932b8800953ac4781ad 4178844227c36b77d7f740bb189c7014ee7a60d0 30f67efac2171aa5942f05b9241a7f26afde0ec7 09023f2c3eadb6b9c837b52a5180d51d88617c90 2fa8529707c49c92a3ece1f875e39f5e12a2a97a 14d3dafd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [aa:25:cd:ff:06:6f:32:c3:93:d5:c4:7d:86:c9:43:a8:35:6a:23:b4] modulus: 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 public exponent: 10001 ] 2022-07-09 06:10:50.450  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-09 06:10:50.452 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-09 06:10:50.454 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-09 06:10:50.456 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-09 06:10:50.456  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-09 06:10:50.457  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-09 06:10:50.458  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-09 06:10:50.459 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-09 06:10:50.459 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-09 06:10:50.460 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-09 06:10:50.468 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-09 06:10:50.469 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-09 06:10:50.469 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-09 06:10:50.470 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 06:10:50.743  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-09 06:10:50.744  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-09 06:10:50.745 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-09 06:10:50.745 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 06:10:50.747  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-09 06:10:50.748  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-09 06:10:50.749 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:10:50.749 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:10:50.750 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:10:50.751 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:10:50.751 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:10:50.751 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:10:50.752 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:10:50.752 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:10:50.753 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:10:50.754 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-09 06:10:50.759 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 120618192430549738502055112679905894490987562962 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jul 09 03:25:17 UTC 2022 Final Date: Thu Jul 08 03:25:16 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a0:ce:ca:d8:36:ee:51:ce:0c:b2:18:c0:6e:c0:ec:8d:c6:3b:b9:f4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 79b4da20f3266e8d81e92eb5ff84cc9d79251aba c4f536fe13665ad2d0c2d71e44a6bb628c094686 65afd5a5f5f2fb84f8ffa77197373e4a5da4f294 998a895ec581b387482497a1aca5cb6de53448fc dc76e716f4a60654b6c4e628056c6f4754ca1064 e314431ff824c67a4efed3941916f5d386985660 a8faad9645e98e8be8cddaa956d35d9d7abfe4b0 aed388f4cc6e44bce809adbc72cbce5d5a8039a4 0bc75639fd6f273ad71730774cb6a17127bf1105 57f09ffc067d7f992fdfa6d76a5fce7eb610e8c2 dc64b3436e9eac2d6234e45cd695182d4f89c126 c94b692ddfbc6356e12e63f837f223ba6f1e1aab 119412cba3a412f3a0619af4427f795e611b7c48 121688a4e867e9a64bbfe8b0e6dcb884d71e68fb 74d2f5f1db24f9d5a7f0e932b8800953ac4781ad 4178844227c36b77d7f740bb189c7014ee7a60d0 30f67efac2171aa5942f05b9241a7f26afde0ec7 09023f2c3eadb6b9c837b52a5180d51d88617c90 2fa8529707c49c92a3ece1f875e39f5e12a2a97a 14d3dafd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [29:e4:e5:56:b3:e7:51:6d:05:26:df:5e:92:d3:fa:4e:3b:6c:c3:c2] modulus: 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 public exponent: 10001 ] 2022-07-09 06:13:21.994  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-09 06:13:21.997 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-09 06:13:22.000 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-07-09 06:13:22.001 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-09 06:13:22.001  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-07-09 06:13:22.002  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-09 06:13:22.002  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-09 06:13:22.003 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-09 06:13:22.003 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-09 06:13:22.004 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-09 06:13:22.018 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-09 06:13:22.019 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-09 06:13:22.020 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-09 06:13:22.020 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 06:13:22.315  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-09 06:13:22.316  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-09 06:13:22.317 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-09 06:13:22.317 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 06:13:22.319  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-09 06:13:22.320  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-09 06:13:22.321 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:13:22.321 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:13:22.322 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:13:22.323 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:13:22.323 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:13:22.324 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:13:22.325 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:13:22.325 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:13:22.326 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:13:22.327 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-09 06:13:22.332 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 120618192430549738502055112679905894490987562962 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jul 09 03:25:17 UTC 2022 Final Date: Thu Jul 08 03:25:16 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a0:ce:ca:d8:36:ee:51:ce:0c:b2:18:c0:6e:c0:ec:8d:c6:3b:b9:f4] modulus: a191aa7e5a02798ac41814e6086d16cec54e984f3c50ec66766267173e6a71f444637e018bfcae9286d030512025c1a6cbe493b257fda513318c0a68f4a6ad297a36d48ada2a30ad4bc6c846c630a262f2b134555beba8a8ea253a4cfc57254a841d1b283439cac81cdd9ff03586d08e4af4403fb2cb0410371287dc0b7d7df4e3b7f780ed01dddd5e5f248b69a04f413714a04078dee0cf3530b488f9de674f8d87aa539b3ab1fa51dd4c6a01b3237dbffa7dfe2b05c5326daa424928fefad889999b0c053d1d7fdb3bba5455d7dab9e09b178b2b6ed593490c44b256fbc9411130433ada0159e7b2a06998e1334c90f550c0a69526b847698598a1ec5f301775bb2f9304245ff0c9881ec1cbc3bc3fbdade580b68988f18769668b291a71409486d0783d6c2aa45735561a58de5adac9ed8c87b8372310c177f507822a4ff382abd47d3980d80e6ffc28ff856650b9a0596be776e1cbf1d4be6eba10b9d97fd571196df1dcd086d908d3f0174981a5afc3391daa83ff35a846697fe39c14d1 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 79b4da20f3266e8d81e92eb5ff84cc9d79251aba c4f536fe13665ad2d0c2d71e44a6bb628c094686 65afd5a5f5f2fb84f8ffa77197373e4a5da4f294 998a895ec581b387482497a1aca5cb6de53448fc dc76e716f4a60654b6c4e628056c6f4754ca1064 e314431ff824c67a4efed3941916f5d386985660 a8faad9645e98e8be8cddaa956d35d9d7abfe4b0 aed388f4cc6e44bce809adbc72cbce5d5a8039a4 0bc75639fd6f273ad71730774cb6a17127bf1105 57f09ffc067d7f992fdfa6d76a5fce7eb610e8c2 dc64b3436e9eac2d6234e45cd695182d4f89c126 c94b692ddfbc6356e12e63f837f223ba6f1e1aab 119412cba3a412f3a0619af4427f795e611b7c48 121688a4e867e9a64bbfe8b0e6dcb884d71e68fb 74d2f5f1db24f9d5a7f0e932b8800953ac4781ad 4178844227c36b77d7f740bb189c7014ee7a60d0 30f67efac2171aa5942f05b9241a7f26afde0ec7 09023f2c3eadb6b9c837b52a5180d51d88617c90 2fa8529707c49c92a3ece1f875e39f5e12a2a97a 14d3dafd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [13:b8:af:ca:df:7f:b0:d6:a7:2d:86:9d:1a:68:af:9e:e2:d3:43:08] modulus: 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 public exponent: 10001 ] 2022-07-09 06:15:18.413  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-09 06:15:18.414 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-09 06:15:18.417 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-09 06:15:18.417 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-09 06:15:18.418  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-09 06:15:18.419  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-09 06:15:18.419  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-09 06:15:18.419 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-09 06:15:18.420 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-09 06:15:18.420 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-09 06:15:18.427 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-09 06:15:18.428 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-09 06:15:18.429 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-09 06:15:18.429 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 06:15:18.789  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-09 06:15:18.794  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-09 06:15:18.794 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-09 06:15:18.795 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 06:15:18.799  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-09 06:15:18.800  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-09 06:15:18.801 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:15:18.802 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:15:18.803 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:15:18.805 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:15:18.806 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:15:18.807 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:15:18.808 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:15:18.810 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:15:18.811 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:15:18.814 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-09 06:15:18.823 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 120618192430549738502055112679905894490987562962 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jul 09 03:25:17 UTC 2022 Final Date: Thu Jul 08 03:25:16 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a0:ce:ca:d8:36:ee:51:ce:0c:b2:18:c0:6e:c0:ec:8d:c6:3b:b9:f4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 79b4da20f3266e8d81e92eb5ff84cc9d79251aba c4f536fe13665ad2d0c2d71e44a6bb628c094686 65afd5a5f5f2fb84f8ffa77197373e4a5da4f294 998a895ec581b387482497a1aca5cb6de53448fc dc76e716f4a60654b6c4e628056c6f4754ca1064 e314431ff824c67a4efed3941916f5d386985660 a8faad9645e98e8be8cddaa956d35d9d7abfe4b0 aed388f4cc6e44bce809adbc72cbce5d5a8039a4 0bc75639fd6f273ad71730774cb6a17127bf1105 57f09ffc067d7f992fdfa6d76a5fce7eb610e8c2 dc64b3436e9eac2d6234e45cd695182d4f89c126 c94b692ddfbc6356e12e63f837f223ba6f1e1aab 119412cba3a412f3a0619af4427f795e611b7c48 121688a4e867e9a64bbfe8b0e6dcb884d71e68fb 74d2f5f1db24f9d5a7f0e932b8800953ac4781ad 4178844227c36b77d7f740bb189c7014ee7a60d0 30f67efac2171aa5942f05b9241a7f26afde0ec7 09023f2c3eadb6b9c837b52a5180d51d88617c90 2fa8529707c49c92a3ece1f875e39f5e12a2a97a 14d3dafd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [80:44:74:30:7b:06:2a:4e:c3:81:da:b0:17:c2:16:31:d9:e5:62:fa] modulus: e2d9790864d23220db3a12a0365b7a8b4ba697e863a17146546ed15aadb5a851238fe5e6d26b4d758e853972002439b2705d7195ed41c5a310cc2531536e1b179041b4f00bc24c6fe264325fea3ea26fac65838b0bf11cafef02d94d003091dd2cff422f91346cd6c9e9889c2ab19b83a314f22a9f1673b728dd41db4f8711fa94766ae83563125f7764d0413f710ad99040a7c408ddc244d1b5b38e7c5bfa760e9d5ff4b9d8bb4a898783c87d4a780acd403119d8ecc2a137503a62773428dde657059a270cb9e4597f845fc2ae54bfcfd3fa9a5b16c07cd11e3f5e54ab30c70984c93314d0afe1bdff97baed2fc2199ff7cf41ea868d927905cabd13d3489f public exponent: 10001 ] 2022-07-09 06:19:49.499  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-09 06:19:49.503 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-09 06:19:49.508 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-09 06:19:49.510 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-09 06:19:49.511  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-09 06:19:49.512  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-09 06:19:49.513  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-09 06:19:49.513 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-09 06:19:49.514 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-09 06:19:49.515 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-09 06:19:49.524 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-09 06:19:49.526 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-09 06:19:49.527 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-09 06:19:49.528 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 06:19:49.887  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-09 06:19:49.889  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-09 06:19:49.889 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-09 06:19:49.890 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 06:19:49.893  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-09 06:19:49.893  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-09 06:19:49.894 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:19:49.895 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:19:49.895 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:19:49.897 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:19:49.897 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:19:49.898 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:19:49.900 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:19:49.900 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:19:49.901 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:19:49.903 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-09 06:19:49.910 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 120618192430549738502055112679905894490987562962 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jul 09 03:25:17 UTC 2022 Final Date: Thu Jul 08 03:25:16 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a0:ce:ca:d8:36:ee:51:ce:0c:b2:18:c0:6e:c0:ec:8d:c6:3b:b9:f4] modulus: a191aa7e5a02798ac41814e6086d16cec54e984f3c50ec66766267173e6a71f444637e018bfcae9286d030512025c1a6cbe493b257fda513318c0a68f4a6ad297a36d48ada2a30ad4bc6c846c630a262f2b134555beba8a8ea253a4cfc57254a841d1b283439cac81cdd9ff03586d08e4af4403fb2cb0410371287dc0b7d7df4e3b7f780ed01dddd5e5f248b69a04f413714a04078dee0cf3530b488f9de674f8d87aa539b3ab1fa51dd4c6a01b3237dbffa7dfe2b05c5326daa424928fefad889999b0c053d1d7fdb3bba5455d7dab9e09b178b2b6ed593490c44b256fbc9411130433ada0159e7b2a06998e1334c90f550c0a69526b847698598a1ec5f301775bb2f9304245ff0c9881ec1cbc3bc3fbdade580b68988f18769668b291a71409486d0783d6c2aa45735561a58de5adac9ed8c87b8372310c177f507822a4ff382abd47d3980d80e6ffc28ff856650b9a0596be776e1cbf1d4be6eba10b9d97fd571196df1dcd086d908d3f0174981a5afc3391daa83ff35a846697fe39c14d1 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 79b4da20f3266e8d81e92eb5ff84cc9d79251aba c4f536fe13665ad2d0c2d71e44a6bb628c094686 65afd5a5f5f2fb84f8ffa77197373e4a5da4f294 998a895ec581b387482497a1aca5cb6de53448fc dc76e716f4a60654b6c4e628056c6f4754ca1064 e314431ff824c67a4efed3941916f5d386985660 a8faad9645e98e8be8cddaa956d35d9d7abfe4b0 aed388f4cc6e44bce809adbc72cbce5d5a8039a4 0bc75639fd6f273ad71730774cb6a17127bf1105 57f09ffc067d7f992fdfa6d76a5fce7eb610e8c2 dc64b3436e9eac2d6234e45cd695182d4f89c126 c94b692ddfbc6356e12e63f837f223ba6f1e1aab 119412cba3a412f3a0619af4427f795e611b7c48 121688a4e867e9a64bbfe8b0e6dcb884d71e68fb 74d2f5f1db24f9d5a7f0e932b8800953ac4781ad 4178844227c36b77d7f740bb189c7014ee7a60d0 30f67efac2171aa5942f05b9241a7f26afde0ec7 09023f2c3eadb6b9c837b52a5180d51d88617c90 2fa8529707c49c92a3ece1f875e39f5e12a2a97a 14d3dafd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8d:45:d8:37:df:dc:36:45:f0:8e:c2:4e:e0:e5:0d:13:bd:4d:8d:b7] modulus: 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 public exponent: 10001 ] 2022-07-09 06:23:10.470  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-09 06:23:10.472 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-09 06:23:10.474 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-07-09 06:23:10.475 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-09 06:23:10.476  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-07-09 06:23:10.477  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-09 06:23:10.477  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-09 06:23:10.477 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-09 06:23:10.478 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-09 06:23:10.478 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-09 06:23:10.484 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-09 06:23:10.485 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-09 06:23:10.485 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-09 06:23:10.485 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 06:23:10.905  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-09 06:23:10.906  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-09 06:23:10.906 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-09 06:23:10.906 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 06:23:10.909  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-09 06:23:10.909  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-09 06:23:10.910 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:23:10.910 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:23:10.911 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:23:10.911 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:23:10.912 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:23:10.912 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:23:10.913 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:23:10.913 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:23:10.914 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:23:10.915 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-09 06:23:10.918 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 120618192430549738502055112679905894490987562962 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jul 09 03:25:17 UTC 2022 Final Date: Thu Jul 08 03:25:16 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a0:ce:ca:d8:36:ee:51:ce:0c:b2:18:c0:6e:c0:ec:8d:c6:3b:b9:f4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 79b4da20f3266e8d81e92eb5ff84cc9d79251aba c4f536fe13665ad2d0c2d71e44a6bb628c094686 65afd5a5f5f2fb84f8ffa77197373e4a5da4f294 998a895ec581b387482497a1aca5cb6de53448fc dc76e716f4a60654b6c4e628056c6f4754ca1064 e314431ff824c67a4efed3941916f5d386985660 a8faad9645e98e8be8cddaa956d35d9d7abfe4b0 aed388f4cc6e44bce809adbc72cbce5d5a8039a4 0bc75639fd6f273ad71730774cb6a17127bf1105 57f09ffc067d7f992fdfa6d76a5fce7eb610e8c2 dc64b3436e9eac2d6234e45cd695182d4f89c126 c94b692ddfbc6356e12e63f837f223ba6f1e1aab 119412cba3a412f3a0619af4427f795e611b7c48 121688a4e867e9a64bbfe8b0e6dcb884d71e68fb 74d2f5f1db24f9d5a7f0e932b8800953ac4781ad 4178844227c36b77d7f740bb189c7014ee7a60d0 30f67efac2171aa5942f05b9241a7f26afde0ec7 09023f2c3eadb6b9c837b52a5180d51d88617c90 2fa8529707c49c92a3ece1f875e39f5e12a2a97a 14d3dafd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [97:ac:56:6a:61:a3:20:83:a5:76:c2:14:ad:80:70:27:3e:dd:89:5d] modulus: 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 public exponent: 10001 ] 2022-07-09 06:23:30.241  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-09 06:23:30.243 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-09 06:23:30.244 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-07-09 06:23:30.245 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-09 06:23:30.245  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-07-09 06:23:30.246  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-09 06:23:30.247  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-09 06:23:30.247 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-09 06:23:30.248 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-09 06:23:30.248 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-09 06:23:30.253 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-09 06:23:30.254 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-09 06:23:30.254 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-09 06:23:30.254 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 06:23:30.572  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-09 06:23:30.573  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-09 06:23:30.574 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-09 06:23:30.574 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 06:23:30.575  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-09 06:23:30.575  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-09 06:23:30.576 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:23:30.576 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:23:30.576 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:23:30.577 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:23:30.577 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:23:30.578 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:23:30.578 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:23:30.578 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:23:30.579 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:23:30.580 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-09 06:23:30.586 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 120618192430549738502055112679905894490987562962 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jul 09 03:25:17 UTC 2022 Final Date: Thu Jul 08 03:25:16 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a0:ce:ca:d8:36:ee:51:ce:0c:b2:18:c0:6e:c0:ec:8d:c6:3b:b9:f4] modulus: a191aa7e5a02798ac41814e6086d16cec54e984f3c50ec66766267173e6a71f444637e018bfcae9286d030512025c1a6cbe493b257fda513318c0a68f4a6ad297a36d48ada2a30ad4bc6c846c630a262f2b134555beba8a8ea253a4cfc57254a841d1b283439cac81cdd9ff03586d08e4af4403fb2cb0410371287dc0b7d7df4e3b7f780ed01dddd5e5f248b69a04f413714a04078dee0cf3530b488f9de674f8d87aa539b3ab1fa51dd4c6a01b3237dbffa7dfe2b05c5326daa424928fefad889999b0c053d1d7fdb3bba5455d7dab9e09b178b2b6ed593490c44b256fbc9411130433ada0159e7b2a06998e1334c90f550c0a69526b847698598a1ec5f301775bb2f9304245ff0c9881ec1cbc3bc3fbdade580b68988f18769668b291a71409486d0783d6c2aa45735561a58de5adac9ed8c87b8372310c177f507822a4ff382abd47d3980d80e6ffc28ff856650b9a0596be776e1cbf1d4be6eba10b9d97fd571196df1dcd086d908d3f0174981a5afc3391daa83ff35a846697fe39c14d1 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 79b4da20f3266e8d81e92eb5ff84cc9d79251aba c4f536fe13665ad2d0c2d71e44a6bb628c094686 65afd5a5f5f2fb84f8ffa77197373e4a5da4f294 998a895ec581b387482497a1aca5cb6de53448fc dc76e716f4a60654b6c4e628056c6f4754ca1064 e314431ff824c67a4efed3941916f5d386985660 a8faad9645e98e8be8cddaa956d35d9d7abfe4b0 aed388f4cc6e44bce809adbc72cbce5d5a8039a4 0bc75639fd6f273ad71730774cb6a17127bf1105 57f09ffc067d7f992fdfa6d76a5fce7eb610e8c2 dc64b3436e9eac2d6234e45cd695182d4f89c126 c94b692ddfbc6356e12e63f837f223ba6f1e1aab 119412cba3a412f3a0619af4427f795e611b7c48 121688a4e867e9a64bbfe8b0e6dcb884d71e68fb 74d2f5f1db24f9d5a7f0e932b8800953ac4781ad 4178844227c36b77d7f740bb189c7014ee7a60d0 30f67efac2171aa5942f05b9241a7f26afde0ec7 09023f2c3eadb6b9c837b52a5180d51d88617c90 2fa8529707c49c92a3ece1f875e39f5e12a2a97a 14d3dafd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [97:4d:2d:d0:e3:50:b3:54:56:d5:0b:a2:a8:cd:0d:54:50:fa:2e:df] modulus: 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 public exponent: 10001 ] 2022-07-09 06:25:03.851  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-09 06:25:03.852 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-09 06:25:03.854 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-09 06:25:03.855 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-09 06:25:03.856  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-09 06:25:03.857  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-09 06:25:03.857  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-09 06:25:03.857 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-09 06:25:03.858 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-09 06:25:03.858 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-09 06:25:03.864 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-09 06:25:03.865 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-09 06:25:03.866 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-09 06:25:03.866 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 06:25:04.219  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-09 06:25:04.221  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-09 06:25:04.221 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-09 06:25:04.221 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 06:25:04.223  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-09 06:25:04.224  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-09 06:25:04.225 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:25:04.225 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:25:04.226 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:25:04.227 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:25:04.227 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:25:04.227 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:25:04.232 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:25:04.233 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:25:04.235 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:25:04.236 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-09 06:25:04.244 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 120618192430549738502055112679905894490987562962 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jul 09 03:25:17 UTC 2022 Final Date: Thu Jul 08 03:25:16 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a0:ce:ca:d8:36:ee:51:ce:0c:b2:18:c0:6e:c0:ec:8d:c6:3b:b9:f4] modulus: a191aa7e5a02798ac41814e6086d16cec54e984f3c50ec66766267173e6a71f444637e018bfcae9286d030512025c1a6cbe493b257fda513318c0a68f4a6ad297a36d48ada2a30ad4bc6c846c630a262f2b134555beba8a8ea253a4cfc57254a841d1b283439cac81cdd9ff03586d08e4af4403fb2cb0410371287dc0b7d7df4e3b7f780ed01dddd5e5f248b69a04f413714a04078dee0cf3530b488f9de674f8d87aa539b3ab1fa51dd4c6a01b3237dbffa7dfe2b05c5326daa424928fefad889999b0c053d1d7fdb3bba5455d7dab9e09b178b2b6ed593490c44b256fbc9411130433ada0159e7b2a06998e1334c90f550c0a69526b847698598a1ec5f301775bb2f9304245ff0c9881ec1cbc3bc3fbdade580b68988f18769668b291a71409486d0783d6c2aa45735561a58de5adac9ed8c87b8372310c177f507822a4ff382abd47d3980d80e6ffc28ff856650b9a0596be776e1cbf1d4be6eba10b9d97fd571196df1dcd086d908d3f0174981a5afc3391daa83ff35a846697fe39c14d1 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 79b4da20f3266e8d81e92eb5ff84cc9d79251aba c4f536fe13665ad2d0c2d71e44a6bb628c094686 65afd5a5f5f2fb84f8ffa77197373e4a5da4f294 998a895ec581b387482497a1aca5cb6de53448fc dc76e716f4a60654b6c4e628056c6f4754ca1064 e314431ff824c67a4efed3941916f5d386985660 a8faad9645e98e8be8cddaa956d35d9d7abfe4b0 aed388f4cc6e44bce809adbc72cbce5d5a8039a4 0bc75639fd6f273ad71730774cb6a17127bf1105 57f09ffc067d7f992fdfa6d76a5fce7eb610e8c2 dc64b3436e9eac2d6234e45cd695182d4f89c126 c94b692ddfbc6356e12e63f837f223ba6f1e1aab 119412cba3a412f3a0619af4427f795e611b7c48 121688a4e867e9a64bbfe8b0e6dcb884d71e68fb 74d2f5f1db24f9d5a7f0e932b8800953ac4781ad 4178844227c36b77d7f740bb189c7014ee7a60d0 30f67efac2171aa5942f05b9241a7f26afde0ec7 09023f2c3eadb6b9c837b52a5180d51d88617c90 2fa8529707c49c92a3ece1f875e39f5e12a2a97a 14d3dafd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [28:a5:7d:1b:70:8d:13:97:0b:59:6b:24:f7:17:4f:9d:1a:9e:22:b9] modulus: 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 public exponent: 10001 ] 2022-07-09 06:29:25.158  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-09 06:29:25.161 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-09 06:29:25.164 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-09 06:29:25.166 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-09 06:29:25.166  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-09 06:29:25.167  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-09 06:29:25.167  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-09 06:29:25.168 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-09 06:29:25.168 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-09 06:29:25.169 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-09 06:29:25.177 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-09 06:29:25.179 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-09 06:29:25.179 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-09 06:29:25.179 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 06:29:25.755  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-09 06:29:25.755  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-09 06:29:25.756 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-09 06:29:25.756 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 06:29:25.757  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-09 06:29:25.758  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-09 06:29:25.758 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:29:25.758 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:29:25.759 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:29:25.759 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:29:25.760 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:29:25.760 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:29:25.761 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:29:25.761 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:29:25.761 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:29:25.762 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-09 06:29:25.767 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 120618192430549738502055112679905894490987562962 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jul 09 03:25:17 UTC 2022 Final Date: Thu Jul 08 03:25:16 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a0:ce:ca:d8:36:ee:51:ce:0c:b2:18:c0:6e:c0:ec:8d:c6:3b:b9:f4] modulus: a191aa7e5a02798ac41814e6086d16cec54e984f3c50ec66766267173e6a71f444637e018bfcae9286d030512025c1a6cbe493b257fda513318c0a68f4a6ad297a36d48ada2a30ad4bc6c846c630a262f2b134555beba8a8ea253a4cfc57254a841d1b283439cac81cdd9ff03586d08e4af4403fb2cb0410371287dc0b7d7df4e3b7f780ed01dddd5e5f248b69a04f413714a04078dee0cf3530b488f9de674f8d87aa539b3ab1fa51dd4c6a01b3237dbffa7dfe2b05c5326daa424928fefad889999b0c053d1d7fdb3bba5455d7dab9e09b178b2b6ed593490c44b256fbc9411130433ada0159e7b2a06998e1334c90f550c0a69526b847698598a1ec5f301775bb2f9304245ff0c9881ec1cbc3bc3fbdade580b68988f18769668b291a71409486d0783d6c2aa45735561a58de5adac9ed8c87b8372310c177f507822a4ff382abd47d3980d80e6ffc28ff856650b9a0596be776e1cbf1d4be6eba10b9d97fd571196df1dcd086d908d3f0174981a5afc3391daa83ff35a846697fe39c14d1 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 79b4da20f3266e8d81e92eb5ff84cc9d79251aba c4f536fe13665ad2d0c2d71e44a6bb628c094686 65afd5a5f5f2fb84f8ffa77197373e4a5da4f294 998a895ec581b387482497a1aca5cb6de53448fc dc76e716f4a60654b6c4e628056c6f4754ca1064 e314431ff824c67a4efed3941916f5d386985660 a8faad9645e98e8be8cddaa956d35d9d7abfe4b0 aed388f4cc6e44bce809adbc72cbce5d5a8039a4 0bc75639fd6f273ad71730774cb6a17127bf1105 57f09ffc067d7f992fdfa6d76a5fce7eb610e8c2 dc64b3436e9eac2d6234e45cd695182d4f89c126 c94b692ddfbc6356e12e63f837f223ba6f1e1aab 119412cba3a412f3a0619af4427f795e611b7c48 121688a4e867e9a64bbfe8b0e6dcb884d71e68fb 74d2f5f1db24f9d5a7f0e932b8800953ac4781ad 4178844227c36b77d7f740bb189c7014ee7a60d0 30f67efac2171aa5942f05b9241a7f26afde0ec7 09023f2c3eadb6b9c837b52a5180d51d88617c90 2fa8529707c49c92a3ece1f875e39f5e12a2a97a 14d3dafd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2e:4c:75:06:4f:13:3a:f6:f2:63:ad:0f:9d:17:27:77:e4:5c:6c:35] modulus: cb18406cd7002c3c7540cfaefa62fe01a719c2dd807644954984e0c9c1894142bdb3e489603397be30839a96045fc0a314dc6c31eaa7ca9e2a06d64a1a7f371e83158c62ef9399e36ca5ace42577e3233bd6f0aefb086ab5b0d3dc04b281722cee32f41a6386be5372009f7790524ce7601ea0c182fcdbc329aaf8aada9801d374bce29ef68c15dab7ab1cac3024f2193d20b0218925eef73b56a34eb119abb70d8145407d4ed0be379f5f23a95e7a4ed88f1cad7791be7ca88ff0a88bc9878e55104f53d8c6190f69566330e20e3844b705d8f5502f3be519b9e141ce968e338212c3ca0ba448bd2ade89f50fdd01a9c8f5c24839e648086537399172a5dccd public exponent: 10001 ] 2022-07-09 06:33:43.161  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-09 06:33:43.164 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-09 06:33:43.169 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-09 06:33:43.170 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-09 06:33:43.170  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-09 06:33:43.171  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-09 06:33:43.172  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-09 06:33:43.172 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-09 06:33:43.173 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-09 06:33:43.173 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-09 06:33:43.183 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-09 06:33:43.184 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-09 06:33:43.185 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-09 06:33:43.186 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 06:33:43.805  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-09 06:33:43.806  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-09 06:33:43.807 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-09 06:33:43.807 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 06:33:43.809  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-09 06:33:43.810  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-09 06:33:43.810 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:33:43.811 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:33:43.811 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:33:43.812 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:33:43.812 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:33:43.812 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:33:43.813 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:33:43.813 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:33:43.814 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:33:43.815 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-09 06:33:43.820 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 120618192430549738502055112679905894490987562962 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jul 09 03:25:17 UTC 2022 Final Date: Thu Jul 08 03:25:16 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a0:ce:ca:d8:36:ee:51:ce:0c:b2:18:c0:6e:c0:ec:8d:c6:3b:b9:f4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 79b4da20f3266e8d81e92eb5ff84cc9d79251aba c4f536fe13665ad2d0c2d71e44a6bb628c094686 65afd5a5f5f2fb84f8ffa77197373e4a5da4f294 998a895ec581b387482497a1aca5cb6de53448fc dc76e716f4a60654b6c4e628056c6f4754ca1064 e314431ff824c67a4efed3941916f5d386985660 a8faad9645e98e8be8cddaa956d35d9d7abfe4b0 aed388f4cc6e44bce809adbc72cbce5d5a8039a4 0bc75639fd6f273ad71730774cb6a17127bf1105 57f09ffc067d7f992fdfa6d76a5fce7eb610e8c2 dc64b3436e9eac2d6234e45cd695182d4f89c126 c94b692ddfbc6356e12e63f837f223ba6f1e1aab 119412cba3a412f3a0619af4427f795e611b7c48 121688a4e867e9a64bbfe8b0e6dcb884d71e68fb 74d2f5f1db24f9d5a7f0e932b8800953ac4781ad 4178844227c36b77d7f740bb189c7014ee7a60d0 30f67efac2171aa5942f05b9241a7f26afde0ec7 09023f2c3eadb6b9c837b52a5180d51d88617c90 2fa8529707c49c92a3ece1f875e39f5e12a2a97a 14d3dafd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e9:ef:ce:eb:2b:32:87:bd:4a:2a:9c:21:0f:46:31:5b:30:59:8f:c1] modulus: 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 public exponent: 10001 ] 2022-07-09 06:38:43.226  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-09 06:38:43.229 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-09 06:38:43.231 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-09 06:38:43.232 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-09 06:38:43.233  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-09 06:38:43.234  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-09 06:38:43.234  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-09 06:38:43.235 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-09 06:38:43.235 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-09 06:38:43.236 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-09 06:38:43.244 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-09 06:38:43.246 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-09 06:38:43.246 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-09 06:38:43.247 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 06:38:43.694  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-09 06:38:43.695  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-09 06:38:43.696 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-09 06:38:43.696 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 06:38:43.698  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-09 06:38:43.699  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-09 06:38:43.699 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:38:43.699 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:38:43.700 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:38:43.701 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:38:43.701 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:38:43.701 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:38:43.704 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:38:43.704 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:38:43.707 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:38:43.708 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-09 06:38:43.714 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 120618192430549738502055112679905894490987562962 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jul 09 03:25:17 UTC 2022 Final Date: Thu Jul 08 03:25:16 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a0:ce:ca:d8:36:ee:51:ce:0c:b2:18:c0:6e:c0:ec:8d:c6:3b:b9:f4] modulus: a191aa7e5a02798ac41814e6086d16cec54e984f3c50ec66766267173e6a71f444637e018bfcae9286d030512025c1a6cbe493b257fda513318c0a68f4a6ad297a36d48ada2a30ad4bc6c846c630a262f2b134555beba8a8ea253a4cfc57254a841d1b283439cac81cdd9ff03586d08e4af4403fb2cb0410371287dc0b7d7df4e3b7f780ed01dddd5e5f248b69a04f413714a04078dee0cf3530b488f9de674f8d87aa539b3ab1fa51dd4c6a01b3237dbffa7dfe2b05c5326daa424928fefad889999b0c053d1d7fdb3bba5455d7dab9e09b178b2b6ed593490c44b256fbc9411130433ada0159e7b2a06998e1334c90f550c0a69526b847698598a1ec5f301775bb2f9304245ff0c9881ec1cbc3bc3fbdade580b68988f18769668b291a71409486d0783d6c2aa45735561a58de5adac9ed8c87b8372310c177f507822a4ff382abd47d3980d80e6ffc28ff856650b9a0596be776e1cbf1d4be6eba10b9d97fd571196df1dcd086d908d3f0174981a5afc3391daa83ff35a846697fe39c14d1 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 79b4da20f3266e8d81e92eb5ff84cc9d79251aba c4f536fe13665ad2d0c2d71e44a6bb628c094686 65afd5a5f5f2fb84f8ffa77197373e4a5da4f294 998a895ec581b387482497a1aca5cb6de53448fc dc76e716f4a60654b6c4e628056c6f4754ca1064 e314431ff824c67a4efed3941916f5d386985660 a8faad9645e98e8be8cddaa956d35d9d7abfe4b0 aed388f4cc6e44bce809adbc72cbce5d5a8039a4 0bc75639fd6f273ad71730774cb6a17127bf1105 57f09ffc067d7f992fdfa6d76a5fce7eb610e8c2 dc64b3436e9eac2d6234e45cd695182d4f89c126 c94b692ddfbc6356e12e63f837f223ba6f1e1aab 119412cba3a412f3a0619af4427f795e611b7c48 121688a4e867e9a64bbfe8b0e6dcb884d71e68fb 74d2f5f1db24f9d5a7f0e932b8800953ac4781ad 4178844227c36b77d7f740bb189c7014ee7a60d0 30f67efac2171aa5942f05b9241a7f26afde0ec7 09023f2c3eadb6b9c837b52a5180d51d88617c90 2fa8529707c49c92a3ece1f875e39f5e12a2a97a 14d3dafd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [65:40:c0:73:71:20:56:da:d1:9a:d8:15:fa:53:ef:5e:f7:0e:11:14] modulus: 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 public exponent: 10001 ] 2022-07-09 06:43:02.024  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-09 06:43:02.029 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-09 06:43:02.031 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-09 06:43:02.033 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-09 06:43:02.033  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-09 06:43:02.034  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-09 06:43:02.034  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-09 06:43:02.034 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-09 06:43:02.035 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-09 06:43:02.035 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-09 06:43:02.042 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-09 06:43:02.043 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-09 06:43:02.043 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-09 06:43:02.043 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 06:43:02.433  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-09 06:43:02.433  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-09 06:43:02.434 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-09 06:43:02.434 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 06:43:02.436  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-09 06:43:02.436  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-09 06:43:02.437 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:43:02.437 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:43:02.438 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:43:02.439 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:43:02.439 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:43:02.440 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:43:02.441 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:43:02.441 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:43:02.442 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:43:02.443 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-09 06:43:02.448 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 120618192430549738502055112679905894490987562962 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jul 09 03:25:17 UTC 2022 Final Date: Thu Jul 08 03:25:16 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a0:ce:ca:d8:36:ee:51:ce:0c:b2:18:c0:6e:c0:ec:8d:c6:3b:b9:f4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 79b4da20f3266e8d81e92eb5ff84cc9d79251aba c4f536fe13665ad2d0c2d71e44a6bb628c094686 65afd5a5f5f2fb84f8ffa77197373e4a5da4f294 998a895ec581b387482497a1aca5cb6de53448fc dc76e716f4a60654b6c4e628056c6f4754ca1064 e314431ff824c67a4efed3941916f5d386985660 a8faad9645e98e8be8cddaa956d35d9d7abfe4b0 aed388f4cc6e44bce809adbc72cbce5d5a8039a4 0bc75639fd6f273ad71730774cb6a17127bf1105 57f09ffc067d7f992fdfa6d76a5fce7eb610e8c2 dc64b3436e9eac2d6234e45cd695182d4f89c126 c94b692ddfbc6356e12e63f837f223ba6f1e1aab 119412cba3a412f3a0619af4427f795e611b7c48 121688a4e867e9a64bbfe8b0e6dcb884d71e68fb 74d2f5f1db24f9d5a7f0e932b8800953ac4781ad 4178844227c36b77d7f740bb189c7014ee7a60d0 30f67efac2171aa5942f05b9241a7f26afde0ec7 09023f2c3eadb6b9c837b52a5180d51d88617c90 2fa8529707c49c92a3ece1f875e39f5e12a2a97a 14d3dafd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [97:ca:5b:43:7c:41:f4:38:3d:e3:e2:33:4a:9b:f0:0a:ec:86:ef:35] modulus: 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 public exponent: 10001 ] 2022-07-09 06:49:20.199  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-09 06:49:20.202 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-09 06:49:20.203 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-09 06:49:20.204 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-09 06:49:20.204  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-09 06:49:20.205  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-09 06:49:20.205  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-09 06:49:20.206 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-09 06:49:20.206 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-09 06:49:20.207 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-09 06:49:20.213 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-09 06:49:20.214 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-09 06:49:20.215 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-09 06:49:20.215 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 06:49:21.042  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-09 06:49:21.043  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-09 06:49:21.043 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-09 06:49:21.043 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-09 06:49:21.044  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-09 06:49:21.045  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-09 06:49:21.045 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:49:21.045 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:49:21.046 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:49:21.046 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:49:21.046 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:49:21.047 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:49:21.047 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-09 06:49:21.048 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-09 06:49:21.048 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-09 06:49:21.050 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-09 06:49:21.054 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 120618192430549738502055112679905894490987562962 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Jul 09 03:25:17 UTC 2022 Final Date: Thu Jul 08 03:25:16 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a0:ce:ca:d8:36:ee:51:ce:0c:b2:18:c0:6e:c0:ec:8d:c6:3b:b9:f4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 79b4da20f3266e8d81e92eb5ff84cc9d79251aba c4f536fe13665ad2d0c2d71e44a6bb628c094686 65afd5a5f5f2fb84f8ffa77197373e4a5da4f294 998a895ec581b387482497a1aca5cb6de53448fc dc76e716f4a60654b6c4e628056c6f4754ca1064 e314431ff824c67a4efed3941916f5d386985660 a8faad9645e98e8be8cddaa956d35d9d7abfe4b0 aed388f4cc6e44bce809adbc72cbce5d5a8039a4 0bc75639fd6f273ad71730774cb6a17127bf1105 57f09ffc067d7f992fdfa6d76a5fce7eb610e8c2 dc64b3436e9eac2d6234e45cd695182d4f89c126 c94b692ddfbc6356e12e63f837f223ba6f1e1aab 119412cba3a412f3a0619af4427f795e611b7c48 121688a4e867e9a64bbfe8b0e6dcb884d71e68fb 74d2f5f1db24f9d5a7f0e932b8800953ac4781ad 4178844227c36b77d7f740bb189c7014ee7a60d0 30f67efac2171aa5942f05b9241a7f26afde0ec7 09023f2c3eadb6b9c837b52a5180d51d88617c90 2fa8529707c49c92a3ece1f875e39f5e12a2a97a 14d3dafd Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [79:00:e6:76:2d:1b:99:74:f0:29:23:ec:c6:07:bc:f1:29:5b:5b:58] modulus: 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 public exponent: 10001 ]