2022-07-14 03:30:02,909 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-07-14 03:30:04,300 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-07-14 03:30:05.610  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Jul 14, 2022 3:30:08 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jul 14, 2022 3:30:08 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jul 14, 2022 3:30:08 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jul 14, 2022 3:30:08 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-07-14 03:30:09.379 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-07-14 03:30:09.762  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-07-14 03:30:09.955  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-07-14 03:30:10.838 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-07-14 03:30:10.842 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-07-14 03:30:10.844 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-07-14 03:30:10.850 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-07-14 03:30:10.900 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-07-14 03:30:10.905 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-07-14 03:30:11.038 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-07-14 03:30:11.950 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jul 14, 2022 3:30:12 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-07-14 03:30:13.185  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 11.732 seconds (JVM running for 14.074) Jul 14, 2022 3:30:37 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-07-14 03:30:55.763  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-14 03:30:55.777 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-14 03:30:55.833 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-07-14 03:30:55.842 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-14 03:30:55.873  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-07-14 03:30:55.876  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-14 03:30:55.883  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-14 03:30:55.886 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-14 03:30:55.886 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-14 03:30:55.892 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-14 03:30:55.902 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-14 03:30:55.906 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-14 03:30:55.955 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-14 03:30:55.963 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-14 03:30:55.965 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-14 03:30:55.970 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-14 03:30:56.842  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-14 03:30:56.848  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-14 03:30:56.849 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-14 03:30:56.853 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-14 03:30:56.872  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-14 03:30:56.873  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-14 03:30:56.875 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 03:30:56.875 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 03:30:56.875 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 03:30:56.898 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 03:30:56.899 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 03:30:56.899 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 03:30:56.910 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 03:30:56.912 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 03:30:56.912 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 03:30:56.915 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-14 03:30:56.961 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 57159492789973039609726666004785979582009886985 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jul 14 03:26:56 UTC 2022 Final Date: Tue Jul 13 03:26:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [13:8f:be:03:9d:af:29:3d:9e:c7:e4:45:ef:b6:80:e4:71:7f:10:b2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4da9142be80f63a3e15aeb0c4c97fac131f46562 1e3467640058a9c5aed894bb3f4253eeeb66c12d 78897e96594cff20cb4dbfe253412161711e5de4 11c5b631e3317d519bd379f8fdc64145af00e1fb c9d2fdb19c4370ca87139e4cf6401db140976cc1 445816e40bfcb2ba9a8ac25df61ee023c4262db5 0eeba942d10cff19ae3d17ba2d121a9ea088a706 74c7590834f5f9c2054b912be673516e971b2302 b8ed67607067c5a2836847ca9ba1d242da077db3 f07d07a42fd53c486453f971a710e47cfe2790e8 c5cb5939e7be8382a230216e9db8951a6d4578d9 86a1a51bc70e91ba49bd8122586e80fdd096c213 98a896f2d35608dc0f11eb6f8c1edfcb08b957c0 c5e04022edd49240c03e9e22e617bf2f38974214 94a51f19de44a7f5d7f3ad5bc15fa3809bc9bdb2 965fe60295aa6442abecdbf9f73a2dc979deedf0 2d66676836f722051677a91d0e82cb69c682e894 b729c9c0715876f4ab72748177d6071d397ac54f 10e21bc2be695f3f0c472ff1120bd95621ddabb5 43f9fded Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [59:5f:f9:60:e7:6d:ac:f7:cd:fa:25:5f:c6:ca:84:fd:e6:e9:f3:b7] modulus: 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 public exponent: 10001 ] 2022-07-14 04:59:06.116  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-14 04:59:06.120 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-14 04:59:06.123 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-14 04:59:06.124 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-14 04:59:06.125  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-14 04:59:06.126  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-14 04:59:06.127  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-14 04:59:06.127 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-14 04:59:06.128 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-14 04:59:06.128 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-14 04:59:06.140 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-14 04:59:06.142 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-14 04:59:06.143 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-14 04:59:06.143 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-14 04:59:06.552  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-14 04:59:06.554  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-14 04:59:06.555 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-14 04:59:06.555 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-14 04:59:06.559  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-14 04:59:06.560  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-14 04:59:06.561 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 04:59:06.561 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 04:59:06.562 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 04:59:06.563 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 04:59:06.564 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 04:59:06.564 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 04:59:06.566 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 04:59:06.566 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 04:59:06.566 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 04:59:06.568 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-14 04:59:06.574 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 57159492789973039609726666004785979582009886985 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jul 14 03:26:56 UTC 2022 Final Date: Tue Jul 13 03:26:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [13:8f:be:03:9d:af:29:3d:9e:c7:e4:45:ef:b6:80:e4:71:7f:10:b2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4da9142be80f63a3e15aeb0c4c97fac131f46562 1e3467640058a9c5aed894bb3f4253eeeb66c12d 78897e96594cff20cb4dbfe253412161711e5de4 11c5b631e3317d519bd379f8fdc64145af00e1fb c9d2fdb19c4370ca87139e4cf6401db140976cc1 445816e40bfcb2ba9a8ac25df61ee023c4262db5 0eeba942d10cff19ae3d17ba2d121a9ea088a706 74c7590834f5f9c2054b912be673516e971b2302 b8ed67607067c5a2836847ca9ba1d242da077db3 f07d07a42fd53c486453f971a710e47cfe2790e8 c5cb5939e7be8382a230216e9db8951a6d4578d9 86a1a51bc70e91ba49bd8122586e80fdd096c213 98a896f2d35608dc0f11eb6f8c1edfcb08b957c0 c5e04022edd49240c03e9e22e617bf2f38974214 94a51f19de44a7f5d7f3ad5bc15fa3809bc9bdb2 965fe60295aa6442abecdbf9f73a2dc979deedf0 2d66676836f722051677a91d0e82cb69c682e894 b729c9c0715876f4ab72748177d6071d397ac54f 10e21bc2be695f3f0c472ff1120bd95621ddabb5 43f9fded Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4b:6e:fe:dd:ed:4c:5f:dd:83:2c:da:3a:c7:e4:3c:75:35:a7:ee:41] modulus: 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 public exponent: 10001 ] 2022-07-14 05:01:08.251  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-14 05:01:08.254 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-14 05:01:08.257 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-07-14 05:01:08.260 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-14 05:01:08.261  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-07-14 05:01:08.262  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-14 05:01:08.263  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-14 05:01:08.263 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-14 05:01:08.264 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-14 05:01:08.265 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-14 05:01:08.273 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-14 05:01:08.275 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-14 05:01:08.275 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-14 05:01:08.276 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-14 05:01:08.553  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-14 05:01:08.554  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-14 05:01:08.555 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-14 05:01:08.555 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-14 05:01:08.558  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-14 05:01:08.558  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-14 05:01:08.559 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 05:01:08.559 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 05:01:08.560 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 05:01:08.561 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 05:01:08.561 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 05:01:08.561 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 05:01:08.562 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 05:01:08.563 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 05:01:08.563 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 05:01:08.564 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-14 05:01:08.569 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 57159492789973039609726666004785979582009886985 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jul 14 03:26:56 UTC 2022 Final Date: Tue Jul 13 03:26:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [13:8f:be:03:9d:af:29:3d:9e:c7:e4:45:ef:b6:80:e4:71:7f:10:b2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4da9142be80f63a3e15aeb0c4c97fac131f46562 1e3467640058a9c5aed894bb3f4253eeeb66c12d 78897e96594cff20cb4dbfe253412161711e5de4 11c5b631e3317d519bd379f8fdc64145af00e1fb c9d2fdb19c4370ca87139e4cf6401db140976cc1 445816e40bfcb2ba9a8ac25df61ee023c4262db5 0eeba942d10cff19ae3d17ba2d121a9ea088a706 74c7590834f5f9c2054b912be673516e971b2302 b8ed67607067c5a2836847ca9ba1d242da077db3 f07d07a42fd53c486453f971a710e47cfe2790e8 c5cb5939e7be8382a230216e9db8951a6d4578d9 86a1a51bc70e91ba49bd8122586e80fdd096c213 98a896f2d35608dc0f11eb6f8c1edfcb08b957c0 c5e04022edd49240c03e9e22e617bf2f38974214 94a51f19de44a7f5d7f3ad5bc15fa3809bc9bdb2 965fe60295aa6442abecdbf9f73a2dc979deedf0 2d66676836f722051677a91d0e82cb69c682e894 b729c9c0715876f4ab72748177d6071d397ac54f 10e21bc2be695f3f0c472ff1120bd95621ddabb5 43f9fded Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [19:0a:5d:5d:e9:b8:72:06:9e:ca:bf:63:50:5a:e1:0e:27:05:a4:f8] modulus: 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 public exponent: 10001 ] 2022-07-14 05:02:35.060  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-14 05:02:35.064 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-14 05:02:35.067 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-07-14 05:02:35.070 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-14 05:02:35.071  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-07-14 05:02:35.072  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-14 05:02:35.072  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-14 05:02:35.073 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-14 05:02:35.074 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-14 05:02:35.075 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-14 05:02:35.086 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-14 05:02:35.088 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-14 05:02:35.088 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-14 05:02:35.089 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-14 05:02:35.406  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-14 05:02:35.407  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-14 05:02:35.407 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-14 05:02:35.408 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-14 05:02:35.426  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-14 05:02:35.439  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-14 05:02:35.447 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 05:02:35.448 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 05:02:35.449 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 05:02:35.453 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 05:02:35.454 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 05:02:35.455 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 05:02:35.456 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 05:02:35.457 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 05:02:35.457 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 05:02:35.459 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-14 05:02:35.481 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 57159492789973039609726666004785979582009886985 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jul 14 03:26:56 UTC 2022 Final Date: Tue Jul 13 03:26:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [13:8f:be:03:9d:af:29:3d:9e:c7:e4:45:ef:b6:80:e4:71:7f:10:b2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4da9142be80f63a3e15aeb0c4c97fac131f46562 1e3467640058a9c5aed894bb3f4253eeeb66c12d 78897e96594cff20cb4dbfe253412161711e5de4 11c5b631e3317d519bd379f8fdc64145af00e1fb c9d2fdb19c4370ca87139e4cf6401db140976cc1 445816e40bfcb2ba9a8ac25df61ee023c4262db5 0eeba942d10cff19ae3d17ba2d121a9ea088a706 74c7590834f5f9c2054b912be673516e971b2302 b8ed67607067c5a2836847ca9ba1d242da077db3 f07d07a42fd53c486453f971a710e47cfe2790e8 c5cb5939e7be8382a230216e9db8951a6d4578d9 86a1a51bc70e91ba49bd8122586e80fdd096c213 98a896f2d35608dc0f11eb6f8c1edfcb08b957c0 c5e04022edd49240c03e9e22e617bf2f38974214 94a51f19de44a7f5d7f3ad5bc15fa3809bc9bdb2 965fe60295aa6442abecdbf9f73a2dc979deedf0 2d66676836f722051677a91d0e82cb69c682e894 b729c9c0715876f4ab72748177d6071d397ac54f 10e21bc2be695f3f0c472ff1120bd95621ddabb5 43f9fded Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [54:87:da:01:ee:ad:06:ad:36:9d:1a:57:48:3a:b9:05:ae:6e:22:0b] modulus: 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 public exponent: 10001 ] 2022-07-14 05:05:03.563  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-14 05:05:03.567 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-14 05:05:03.570 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-14 05:05:03.571 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-14 05:05:03.572  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-14 05:05:03.575  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-14 05:05:03.576  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-14 05:05:03.583 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-14 05:05:03.584 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-14 05:05:03.584 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-14 05:05:03.593 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-14 05:05:03.594 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-14 05:05:03.594 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-14 05:05:03.595 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-14 05:05:03.853  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-14 05:05:03.854  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-14 05:05:03.855 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-14 05:05:03.855 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-14 05:05:03.858  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-14 05:05:03.858  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-14 05:05:03.859 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 05:05:03.859 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 05:05:03.860 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 05:05:03.861 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 05:05:03.862 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 05:05:03.862 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 05:05:03.865 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 05:05:03.865 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 05:05:03.866 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 05:05:03.868 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-14 05:05:03.875 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 57159492789973039609726666004785979582009886985 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jul 14 03:26:56 UTC 2022 Final Date: Tue Jul 13 03:26:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [13:8f:be:03:9d:af:29:3d:9e:c7:e4:45:ef:b6:80:e4:71:7f:10:b2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4da9142be80f63a3e15aeb0c4c97fac131f46562 1e3467640058a9c5aed894bb3f4253eeeb66c12d 78897e96594cff20cb4dbfe253412161711e5de4 11c5b631e3317d519bd379f8fdc64145af00e1fb c9d2fdb19c4370ca87139e4cf6401db140976cc1 445816e40bfcb2ba9a8ac25df61ee023c4262db5 0eeba942d10cff19ae3d17ba2d121a9ea088a706 74c7590834f5f9c2054b912be673516e971b2302 b8ed67607067c5a2836847ca9ba1d242da077db3 f07d07a42fd53c486453f971a710e47cfe2790e8 c5cb5939e7be8382a230216e9db8951a6d4578d9 86a1a51bc70e91ba49bd8122586e80fdd096c213 98a896f2d35608dc0f11eb6f8c1edfcb08b957c0 c5e04022edd49240c03e9e22e617bf2f38974214 94a51f19de44a7f5d7f3ad5bc15fa3809bc9bdb2 965fe60295aa6442abecdbf9f73a2dc979deedf0 2d66676836f722051677a91d0e82cb69c682e894 b729c9c0715876f4ab72748177d6071d397ac54f 10e21bc2be695f3f0c472ff1120bd95621ddabb5 43f9fded Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c0:c8:77:60:f1:59:62:57:49:5d:0e:aa:b9:2e:9b:3c:ce:f3:9a:36] modulus: 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 public exponent: 10001 ] 2022-07-14 05:08:39.224  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-14 05:08:39.228 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-14 05:08:39.232 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-14 05:08:39.233 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-14 05:08:39.235  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-14 05:08:39.236  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-14 05:08:39.236  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-14 05:08:39.236 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-14 05:08:39.237 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-14 05:08:39.238 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-14 05:08:39.247 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-14 05:08:39.250 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-14 05:08:39.251 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-14 05:08:39.251 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-14 05:08:39.490  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-14 05:08:39.491  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-14 05:08:39.491 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-14 05:08:39.491 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-14 05:08:39.493  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-14 05:08:39.493  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-14 05:08:39.494 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 05:08:39.494 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 05:08:39.494 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 05:08:39.495 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 05:08:39.496 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 05:08:39.496 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 05:08:39.497 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 05:08:39.497 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 05:08:39.497 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 05:08:39.501 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-14 05:08:39.512 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 57159492789973039609726666004785979582009886985 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jul 14 03:26:56 UTC 2022 Final Date: Tue Jul 13 03:26:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [13:8f:be:03:9d:af:29:3d:9e:c7:e4:45:ef:b6:80:e4:71:7f:10:b2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4da9142be80f63a3e15aeb0c4c97fac131f46562 1e3467640058a9c5aed894bb3f4253eeeb66c12d 78897e96594cff20cb4dbfe253412161711e5de4 11c5b631e3317d519bd379f8fdc64145af00e1fb c9d2fdb19c4370ca87139e4cf6401db140976cc1 445816e40bfcb2ba9a8ac25df61ee023c4262db5 0eeba942d10cff19ae3d17ba2d121a9ea088a706 74c7590834f5f9c2054b912be673516e971b2302 b8ed67607067c5a2836847ca9ba1d242da077db3 f07d07a42fd53c486453f971a710e47cfe2790e8 c5cb5939e7be8382a230216e9db8951a6d4578d9 86a1a51bc70e91ba49bd8122586e80fdd096c213 98a896f2d35608dc0f11eb6f8c1edfcb08b957c0 c5e04022edd49240c03e9e22e617bf2f38974214 94a51f19de44a7f5d7f3ad5bc15fa3809bc9bdb2 965fe60295aa6442abecdbf9f73a2dc979deedf0 2d66676836f722051677a91d0e82cb69c682e894 b729c9c0715876f4ab72748177d6071d397ac54f 10e21bc2be695f3f0c472ff1120bd95621ddabb5 43f9fded Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a7:ba:9a:5e:f2:59:7e:93:d6:6f:c2:b7:b9:a2:f3:f3:c5:d8:6d:cb] modulus: a5b672b55bbdf51e50d8accaa2dcd6742635c59c5f9c424e9b15366fb19ae8fb403f20434d1b60ed9259e5dce7f0ab1634093bf5f64aeed946110eba31b280493f6ee7a42b29e0aca68b9bb32d5bfc4aa24de16faae6ec8f1327e18392f0436dfa09facd3e553508787e4415fa17c01d4ebb70c3173f8ed14decf95224e8e83786a833986281d2b98b9c0d7b49a334a3c7bfa2c5b6d40d82a9dae4318b63b1eea8fef98da80b231462099a040fffe963b69281ec4d8af149b0daa407542679dd788a2848a6947ac2a7c5075898169773e8b733b287e6c2c8d0797095bc51fd0ecbf962e3374be5e78d827cad96a7acf7d980d60dc8ef68f32920f099a1223963 public exponent: 10001 ] 2022-07-14 05:12:33.657  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-14 05:12:33.660 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-14 05:12:33.663 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-14 05:12:33.664 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-14 05:12:33.664  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-14 05:12:33.665  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-14 05:12:33.666  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-14 05:12:33.666 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-14 05:12:33.667 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-14 05:12:33.667 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-14 05:12:33.675 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-14 05:12:33.676 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-14 05:12:33.676 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-14 05:12:33.676 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-14 05:12:33.903  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-14 05:12:33.903  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-14 05:12:33.904 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-14 05:12:33.904 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-14 05:12:33.906  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-14 05:12:33.907  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-14 05:12:33.907 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 05:12:33.907 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 05:12:33.908 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 05:12:33.909 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 05:12:33.909 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 05:12:33.910 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 05:12:33.911 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 05:12:33.911 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 05:12:33.912 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 05:12:33.913 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-14 05:12:33.918 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 57159492789973039609726666004785979582009886985 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jul 14 03:26:56 UTC 2022 Final Date: Tue Jul 13 03:26:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [13:8f:be:03:9d:af:29:3d:9e:c7:e4:45:ef:b6:80:e4:71:7f:10:b2] modulus: dd6cb9d067e89409d8ee7aafaaa7e29dc5fee4f5cbe92235b02e61e153f32fc0613f911193107b66e50b2c7e35399bd8d89f3a10faf5a5d2c908acccc099b8d6eb06decc117be8364b53402f544a26def657d262073a2bdc950b18485f23b36f009f1711a2c6ab888d5d327b6f729feb525b63cb9a70354d3cad34f492bf63edb0e2569f721175e8749100fdd23d302e9edd2334ec06c2e006b145a38dbb4e934d0e5c1d9c85a288caa1caea57350839305dbaaa84318d385b4ffb72b8f0c8cee5d35ddd7da92815761b9c07f483e42fe8e15275f6b092799f8879127a449edae325e8a21dbf4b3094a0aededf5c5a517da95eb6f39e742f0f919f213ef572b58944483177f38e9a27ae290e0c67397f3ec3ab59fc4e3c6d990e99e3efebfb27fe7a6fc95a03724c4ef24cfe79fcd5264bedf4d8ecd8b64640a631dbedc72e7256f97abd02651fd9e0ebaf7948ed1a245fb3c5d00a9dd12f596e3ee56e5dc0d72ff2fd1aad2d507a638cbd33a5cea29cd6d97b77f85c362c334eda5a90a23ec9 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4da9142be80f63a3e15aeb0c4c97fac131f46562 1e3467640058a9c5aed894bb3f4253eeeb66c12d 78897e96594cff20cb4dbfe253412161711e5de4 11c5b631e3317d519bd379f8fdc64145af00e1fb c9d2fdb19c4370ca87139e4cf6401db140976cc1 445816e40bfcb2ba9a8ac25df61ee023c4262db5 0eeba942d10cff19ae3d17ba2d121a9ea088a706 74c7590834f5f9c2054b912be673516e971b2302 b8ed67607067c5a2836847ca9ba1d242da077db3 f07d07a42fd53c486453f971a710e47cfe2790e8 c5cb5939e7be8382a230216e9db8951a6d4578d9 86a1a51bc70e91ba49bd8122586e80fdd096c213 98a896f2d35608dc0f11eb6f8c1edfcb08b957c0 c5e04022edd49240c03e9e22e617bf2f38974214 94a51f19de44a7f5d7f3ad5bc15fa3809bc9bdb2 965fe60295aa6442abecdbf9f73a2dc979deedf0 2d66676836f722051677a91d0e82cb69c682e894 b729c9c0715876f4ab72748177d6071d397ac54f 10e21bc2be695f3f0c472ff1120bd95621ddabb5 43f9fded Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [73:2c:82:c7:71:68:04:90:5c:4f:a0:c2:a0:b6:0f:16:95:ab:3f:3c] modulus: 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 public exponent: 10001 ] 2022-07-14 05:14:30.244  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-14 05:14:30.247 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-14 05:14:30.249 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-14 05:14:30.250 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-14 05:14:30.251  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-14 05:14:30.251  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-14 05:14:30.252  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-14 05:14:30.252 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-14 05:14:30.253 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-14 05:14:30.253 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-14 05:14:30.261 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-14 05:14:30.263 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-14 05:14:30.263 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-14 05:14:30.264 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-14 05:14:30.453  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-14 05:14:30.454  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-14 05:14:30.455 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-14 05:14:30.455 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-14 05:14:30.457  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-14 05:14:30.458  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-14 05:14:30.458 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 05:14:30.459 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 05:14:30.459 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 05:14:30.460 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 05:14:30.461 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 05:14:30.461 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 05:14:30.463 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 05:14:30.463 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 05:14:30.464 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 05:14:30.465 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-14 05:14:30.470 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 57159492789973039609726666004785979582009886985 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jul 14 03:26:56 UTC 2022 Final Date: Tue Jul 13 03:26:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [13:8f:be:03:9d:af:29:3d:9e:c7:e4:45:ef:b6:80:e4:71:7f:10:b2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4da9142be80f63a3e15aeb0c4c97fac131f46562 1e3467640058a9c5aed894bb3f4253eeeb66c12d 78897e96594cff20cb4dbfe253412161711e5de4 11c5b631e3317d519bd379f8fdc64145af00e1fb c9d2fdb19c4370ca87139e4cf6401db140976cc1 445816e40bfcb2ba9a8ac25df61ee023c4262db5 0eeba942d10cff19ae3d17ba2d121a9ea088a706 74c7590834f5f9c2054b912be673516e971b2302 b8ed67607067c5a2836847ca9ba1d242da077db3 f07d07a42fd53c486453f971a710e47cfe2790e8 c5cb5939e7be8382a230216e9db8951a6d4578d9 86a1a51bc70e91ba49bd8122586e80fdd096c213 98a896f2d35608dc0f11eb6f8c1edfcb08b957c0 c5e04022edd49240c03e9e22e617bf2f38974214 94a51f19de44a7f5d7f3ad5bc15fa3809bc9bdb2 965fe60295aa6442abecdbf9f73a2dc979deedf0 2d66676836f722051677a91d0e82cb69c682e894 b729c9c0715876f4ab72748177d6071d397ac54f 10e21bc2be695f3f0c472ff1120bd95621ddabb5 43f9fded Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f7:ee:7e:40:c6:a6:83:91:8d:37:d0:67:b3:9f:2e:34:af:b8:02:ac] modulus: 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 public exponent: 10001 ] 2022-07-14 05:16:57.250  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-14 05:16:57.253 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-14 05:16:57.256 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-14 05:16:57.257 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-14 05:16:57.258  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-14 05:16:57.259  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-14 05:16:57.259  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-14 05:16:57.262 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-14 05:16:57.262 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-14 05:16:57.263 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-14 05:16:57.271 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-14 05:16:57.273 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-14 05:16:57.273 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-14 05:16:57.274 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-14 05:16:57.545  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-14 05:16:57.546  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-14 05:16:57.546 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-14 05:16:57.547 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-14 05:16:57.549  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-14 05:16:57.550  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-14 05:16:57.550 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 05:16:57.551 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 05:16:57.551 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 05:16:57.552 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 05:16:57.552 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 05:16:57.553 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 05:16:57.553 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 05:16:57.554 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 05:16:57.554 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 05:16:57.555 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-14 05:16:57.560 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 57159492789973039609726666004785979582009886985 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jul 14 03:26:56 UTC 2022 Final Date: Tue Jul 13 03:26:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [13:8f:be:03:9d:af:29:3d:9e:c7:e4:45:ef:b6:80:e4:71:7f:10:b2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4da9142be80f63a3e15aeb0c4c97fac131f46562 1e3467640058a9c5aed894bb3f4253eeeb66c12d 78897e96594cff20cb4dbfe253412161711e5de4 11c5b631e3317d519bd379f8fdc64145af00e1fb c9d2fdb19c4370ca87139e4cf6401db140976cc1 445816e40bfcb2ba9a8ac25df61ee023c4262db5 0eeba942d10cff19ae3d17ba2d121a9ea088a706 74c7590834f5f9c2054b912be673516e971b2302 b8ed67607067c5a2836847ca9ba1d242da077db3 f07d07a42fd53c486453f971a710e47cfe2790e8 c5cb5939e7be8382a230216e9db8951a6d4578d9 86a1a51bc70e91ba49bd8122586e80fdd096c213 98a896f2d35608dc0f11eb6f8c1edfcb08b957c0 c5e04022edd49240c03e9e22e617bf2f38974214 94a51f19de44a7f5d7f3ad5bc15fa3809bc9bdb2 965fe60295aa6442abecdbf9f73a2dc979deedf0 2d66676836f722051677a91d0e82cb69c682e894 b729c9c0715876f4ab72748177d6071d397ac54f 10e21bc2be695f3f0c472ff1120bd95621ddabb5 43f9fded Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f3:b0:17:7e:61:c7:48:ed:97:a6:21:e3:c7:7b:60:98:d7:73:ee:07] modulus: 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 public exponent: 10001 ] 2022-07-14 05:19:18.456  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-14 05:19:18.459 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-14 05:19:18.463 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-07-14 05:19:18.465 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-14 05:19:18.466  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-07-14 05:19:18.467  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-14 05:19:18.469  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-14 05:19:18.471 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-14 05:19:18.472 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-14 05:19:18.472 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-14 05:19:18.484 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-14 05:19:18.485 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-14 05:19:18.486 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-14 05:19:18.486 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-14 05:19:18.775  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-14 05:19:18.776  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-14 05:19:18.776 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-14 05:19:18.777 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-14 05:19:18.796  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-14 05:19:18.797  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-14 05:19:18.797 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 05:19:18.798 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 05:19:18.798 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 05:19:18.800 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 05:19:18.800 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 05:19:18.801 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 05:19:18.802 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 05:19:18.803 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 05:19:18.803 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 05:19:18.807 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-14 05:19:18.816 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 57159492789973039609726666004785979582009886985 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jul 14 03:26:56 UTC 2022 Final Date: Tue Jul 13 03:26:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [13:8f:be:03:9d:af:29:3d:9e:c7:e4:45:ef:b6:80:e4:71:7f:10:b2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4da9142be80f63a3e15aeb0c4c97fac131f46562 1e3467640058a9c5aed894bb3f4253eeeb66c12d 78897e96594cff20cb4dbfe253412161711e5de4 11c5b631e3317d519bd379f8fdc64145af00e1fb c9d2fdb19c4370ca87139e4cf6401db140976cc1 445816e40bfcb2ba9a8ac25df61ee023c4262db5 0eeba942d10cff19ae3d17ba2d121a9ea088a706 74c7590834f5f9c2054b912be673516e971b2302 b8ed67607067c5a2836847ca9ba1d242da077db3 f07d07a42fd53c486453f971a710e47cfe2790e8 c5cb5939e7be8382a230216e9db8951a6d4578d9 86a1a51bc70e91ba49bd8122586e80fdd096c213 98a896f2d35608dc0f11eb6f8c1edfcb08b957c0 c5e04022edd49240c03e9e22e617bf2f38974214 94a51f19de44a7f5d7f3ad5bc15fa3809bc9bdb2 965fe60295aa6442abecdbf9f73a2dc979deedf0 2d66676836f722051677a91d0e82cb69c682e894 b729c9c0715876f4ab72748177d6071d397ac54f 10e21bc2be695f3f0c472ff1120bd95621ddabb5 43f9fded Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6d:f0:a2:01:cd:3b:3a:8b:6a:4a:35:3b:35:5d:a6:5b:8b:c4:9f:f5] modulus: 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 public exponent: 10001 ] 2022-07-14 05:21:24.998  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-14 05:21:25.002 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-14 05:21:25.004 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-14 05:21:25.004 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-14 05:21:25.005  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-14 05:21:25.005  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-14 05:21:25.007  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-14 05:21:25.007 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-14 05:21:25.008 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-14 05:21:25.008 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-14 05:21:25.019 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-14 05:21:25.020 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-14 05:21:25.021 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-14 05:21:25.021 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-14 05:21:25.319  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-14 05:21:25.319  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-14 05:21:25.320 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-14 05:21:25.320 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-14 05:21:25.322  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-14 05:21:25.322  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-14 05:21:25.323 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 05:21:25.323 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 05:21:25.323 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 05:21:25.324 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 05:21:25.324 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 05:21:25.325 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 05:21:25.326 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 05:21:25.326 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 05:21:25.327 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 05:21:25.328 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-14 05:21:25.334 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 57159492789973039609726666004785979582009886985 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jul 14 03:26:56 UTC 2022 Final Date: Tue Jul 13 03:26:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [13:8f:be:03:9d:af:29:3d:9e:c7:e4:45:ef:b6:80:e4:71:7f:10:b2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4da9142be80f63a3e15aeb0c4c97fac131f46562 1e3467640058a9c5aed894bb3f4253eeeb66c12d 78897e96594cff20cb4dbfe253412161711e5de4 11c5b631e3317d519bd379f8fdc64145af00e1fb c9d2fdb19c4370ca87139e4cf6401db140976cc1 445816e40bfcb2ba9a8ac25df61ee023c4262db5 0eeba942d10cff19ae3d17ba2d121a9ea088a706 74c7590834f5f9c2054b912be673516e971b2302 b8ed67607067c5a2836847ca9ba1d242da077db3 f07d07a42fd53c486453f971a710e47cfe2790e8 c5cb5939e7be8382a230216e9db8951a6d4578d9 86a1a51bc70e91ba49bd8122586e80fdd096c213 98a896f2d35608dc0f11eb6f8c1edfcb08b957c0 c5e04022edd49240c03e9e22e617bf2f38974214 94a51f19de44a7f5d7f3ad5bc15fa3809bc9bdb2 965fe60295aa6442abecdbf9f73a2dc979deedf0 2d66676836f722051677a91d0e82cb69c682e894 b729c9c0715876f4ab72748177d6071d397ac54f 10e21bc2be695f3f0c472ff1120bd95621ddabb5 43f9fded Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [19:b9:93:2f:73:a0:b2:55:a5:dc:8f:18:a4:ba:ad:ef:9b:c4:33:74] modulus: c4f9cd92aab3541a994ad909c4a13dc860f67808b990c6a8054370946fe20d96ded622fbeca259f156ea4bc17cedd3760ffcec0e24dc072d3654665bf718729624df131af168046bcd28e541867decff701e7845962d94eebc330a6c0ddd45f498fb212cfc787134f6da3ab1c25706068d39631712f40abc346143c18750044be645f7967ec65340626d46139de09873953f3215dfa971a060689328fa4995645f329976e748bb675fd5069265c28b04a1dcbccb88ae667ce3f61b66995d4310afea051db96ac603cb59939aa071ed49098f249d5304f055dc83ca977cf11e47cda64105fa738f0fba523523a5770dff7123ca49e6e1d117698fd0caf150483b public exponent: 10001 ] 2022-07-14 05:25:19.783  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-14 05:25:19.786 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-14 05:25:19.789 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-14 05:25:19.790 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-14 05:25:19.791  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-14 05:25:19.792  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-14 05:25:19.792  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-14 05:25:19.793 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-14 05:25:19.802 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-14 05:25:19.803 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-14 05:25:19.813 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-14 05:25:19.819 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-14 05:25:19.820 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-14 05:25:19.821 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-14 05:25:20.097  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-14 05:25:20.098  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-14 05:25:20.098 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-14 05:25:20.098 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-14 05:25:20.099  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-14 05:25:20.100  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-14 05:25:20.100 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 05:25:20.100 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 05:25:20.101 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 05:25:20.101 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 05:25:20.102 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 05:25:20.102 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 05:25:20.103 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 05:25:20.103 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 05:25:20.103 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 05:25:20.104 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-14 05:25:20.110 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 57159492789973039609726666004785979582009886985 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jul 14 03:26:56 UTC 2022 Final Date: Tue Jul 13 03:26:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [13:8f:be:03:9d:af:29:3d:9e:c7:e4:45:ef:b6:80:e4:71:7f:10:b2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4da9142be80f63a3e15aeb0c4c97fac131f46562 1e3467640058a9c5aed894bb3f4253eeeb66c12d 78897e96594cff20cb4dbfe253412161711e5de4 11c5b631e3317d519bd379f8fdc64145af00e1fb c9d2fdb19c4370ca87139e4cf6401db140976cc1 445816e40bfcb2ba9a8ac25df61ee023c4262db5 0eeba942d10cff19ae3d17ba2d121a9ea088a706 74c7590834f5f9c2054b912be673516e971b2302 b8ed67607067c5a2836847ca9ba1d242da077db3 f07d07a42fd53c486453f971a710e47cfe2790e8 c5cb5939e7be8382a230216e9db8951a6d4578d9 86a1a51bc70e91ba49bd8122586e80fdd096c213 98a896f2d35608dc0f11eb6f8c1edfcb08b957c0 c5e04022edd49240c03e9e22e617bf2f38974214 94a51f19de44a7f5d7f3ad5bc15fa3809bc9bdb2 965fe60295aa6442abecdbf9f73a2dc979deedf0 2d66676836f722051677a91d0e82cb69c682e894 b729c9c0715876f4ab72748177d6071d397ac54f 10e21bc2be695f3f0c472ff1120bd95621ddabb5 43f9fded Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f9:f6:b4:3c:97:31:1f:40:17:58:89:b2:d0:31:5c:ac:c4:f2:2a:b6] modulus: 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 public exponent: 10001 ] 2022-07-14 05:27:57.121  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-14 05:27:57.124 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-14 05:27:57.128 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-07-14 05:27:57.130 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-14 05:27:57.131  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-07-14 05:27:57.132  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-14 05:27:57.132  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-14 05:27:57.133 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-14 05:27:57.133 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-14 05:27:57.134 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-14 05:27:57.150 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-14 05:27:57.152 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-14 05:27:57.152 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-14 05:27:57.152 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-14 05:27:57.447  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-14 05:27:57.448  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-14 05:27:57.454 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-14 05:27:57.458 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-14 05:27:57.461  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-14 05:27:57.461  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-14 05:27:57.462 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 05:27:57.463 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 05:27:57.463 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 05:27:57.465 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 05:27:57.465 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 05:27:57.466 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 05:27:57.467 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 05:27:57.468 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 05:27:57.468 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 05:27:57.469 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-14 05:27:57.475 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 57159492789973039609726666004785979582009886985 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jul 14 03:26:56 UTC 2022 Final Date: Tue Jul 13 03:26:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [13:8f:be:03:9d:af:29:3d:9e:c7:e4:45:ef:b6:80:e4:71:7f:10:b2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4da9142be80f63a3e15aeb0c4c97fac131f46562 1e3467640058a9c5aed894bb3f4253eeeb66c12d 78897e96594cff20cb4dbfe253412161711e5de4 11c5b631e3317d519bd379f8fdc64145af00e1fb c9d2fdb19c4370ca87139e4cf6401db140976cc1 445816e40bfcb2ba9a8ac25df61ee023c4262db5 0eeba942d10cff19ae3d17ba2d121a9ea088a706 74c7590834f5f9c2054b912be673516e971b2302 b8ed67607067c5a2836847ca9ba1d242da077db3 f07d07a42fd53c486453f971a710e47cfe2790e8 c5cb5939e7be8382a230216e9db8951a6d4578d9 86a1a51bc70e91ba49bd8122586e80fdd096c213 98a896f2d35608dc0f11eb6f8c1edfcb08b957c0 c5e04022edd49240c03e9e22e617bf2f38974214 94a51f19de44a7f5d7f3ad5bc15fa3809bc9bdb2 965fe60295aa6442abecdbf9f73a2dc979deedf0 2d66676836f722051677a91d0e82cb69c682e894 b729c9c0715876f4ab72748177d6071d397ac54f 10e21bc2be695f3f0c472ff1120bd95621ddabb5 43f9fded Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [27:e0:ef:f4:bd:84:43:49:af:ee:c3:91:cd:b9:6a:71:41:9c:98:f1] modulus: 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 public exponent: 10001 ] 2022-07-14 05:28:17.367  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-14 05:28:17.368 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-14 05:28:17.370 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-07-14 05:28:17.371 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-14 05:28:17.372  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-07-14 05:28:17.372  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-14 05:28:17.373  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-14 05:28:17.373 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-14 05:28:17.374 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-14 05:28:17.374 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-14 05:28:17.385 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-14 05:28:17.387 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-14 05:28:17.387 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-14 05:28:17.387 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-14 05:28:17.635  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-14 05:28:17.636  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-14 05:28:17.636 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-14 05:28:17.642 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-14 05:28:17.647  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-14 05:28:17.647  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-14 05:28:17.648 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 05:28:17.648 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 05:28:17.649 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 05:28:17.650 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 05:28:17.650 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 05:28:17.651 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 05:28:17.652 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 05:28:17.652 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 05:28:17.652 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 05:28:17.653 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-14 05:28:17.658 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 57159492789973039609726666004785979582009886985 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jul 14 03:26:56 UTC 2022 Final Date: Tue Jul 13 03:26:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [13:8f:be:03:9d:af:29:3d:9e:c7:e4:45:ef:b6:80:e4:71:7f:10:b2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4da9142be80f63a3e15aeb0c4c97fac131f46562 1e3467640058a9c5aed894bb3f4253eeeb66c12d 78897e96594cff20cb4dbfe253412161711e5de4 11c5b631e3317d519bd379f8fdc64145af00e1fb c9d2fdb19c4370ca87139e4cf6401db140976cc1 445816e40bfcb2ba9a8ac25df61ee023c4262db5 0eeba942d10cff19ae3d17ba2d121a9ea088a706 74c7590834f5f9c2054b912be673516e971b2302 b8ed67607067c5a2836847ca9ba1d242da077db3 f07d07a42fd53c486453f971a710e47cfe2790e8 c5cb5939e7be8382a230216e9db8951a6d4578d9 86a1a51bc70e91ba49bd8122586e80fdd096c213 98a896f2d35608dc0f11eb6f8c1edfcb08b957c0 c5e04022edd49240c03e9e22e617bf2f38974214 94a51f19de44a7f5d7f3ad5bc15fa3809bc9bdb2 965fe60295aa6442abecdbf9f73a2dc979deedf0 2d66676836f722051677a91d0e82cb69c682e894 b729c9c0715876f4ab72748177d6071d397ac54f 10e21bc2be695f3f0c472ff1120bd95621ddabb5 43f9fded Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d4:d8:18:ac:73:75:e6:80:70:99:ad:a2:25:2a:9f:bf:58:51:6e:eb] modulus: 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 public exponent: 10001 ] 2022-07-14 05:30:21.861  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-14 05:30:21.865 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-14 05:30:21.869 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-14 05:30:21.871 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-14 05:30:21.871  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-14 05:30:21.872  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-14 05:30:21.873  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-14 05:30:21.873 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-14 05:30:21.874 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-14 05:30:21.875 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-14 05:30:21.885 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-14 05:30:21.887 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-14 05:30:21.887 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-14 05:30:21.888 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-14 05:30:22.104  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-14 05:30:22.104  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-14 05:30:22.105 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-14 05:30:22.105 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-14 05:30:22.107  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-14 05:30:22.107  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-14 05:30:22.108 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 05:30:22.108 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 05:30:22.108 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 05:30:22.109 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 05:30:22.109 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 05:30:22.109 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 05:30:22.110 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 05:30:22.111 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 05:30:22.111 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 05:30:22.112 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-14 05:30:22.116 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 57159492789973039609726666004785979582009886985 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jul 14 03:26:56 UTC 2022 Final Date: Tue Jul 13 03:26:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [13:8f:be:03:9d:af:29:3d:9e:c7:e4:45:ef:b6:80:e4:71:7f:10:b2] modulus: dd6cb9d067e89409d8ee7aafaaa7e29dc5fee4f5cbe92235b02e61e153f32fc0613f911193107b66e50b2c7e35399bd8d89f3a10faf5a5d2c908acccc099b8d6eb06decc117be8364b53402f544a26def657d262073a2bdc950b18485f23b36f009f1711a2c6ab888d5d327b6f729feb525b63cb9a70354d3cad34f492bf63edb0e2569f721175e8749100fdd23d302e9edd2334ec06c2e006b145a38dbb4e934d0e5c1d9c85a288caa1caea57350839305dbaaa84318d385b4ffb72b8f0c8cee5d35ddd7da92815761b9c07f483e42fe8e15275f6b092799f8879127a449edae325e8a21dbf4b3094a0aededf5c5a517da95eb6f39e742f0f919f213ef572b58944483177f38e9a27ae290e0c67397f3ec3ab59fc4e3c6d990e99e3efebfb27fe7a6fc95a03724c4ef24cfe79fcd5264bedf4d8ecd8b64640a631dbedc72e7256f97abd02651fd9e0ebaf7948ed1a245fb3c5d00a9dd12f596e3ee56e5dc0d72ff2fd1aad2d507a638cbd33a5cea29cd6d97b77f85c362c334eda5a90a23ec9 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4da9142be80f63a3e15aeb0c4c97fac131f46562 1e3467640058a9c5aed894bb3f4253eeeb66c12d 78897e96594cff20cb4dbfe253412161711e5de4 11c5b631e3317d519bd379f8fdc64145af00e1fb c9d2fdb19c4370ca87139e4cf6401db140976cc1 445816e40bfcb2ba9a8ac25df61ee023c4262db5 0eeba942d10cff19ae3d17ba2d121a9ea088a706 74c7590834f5f9c2054b912be673516e971b2302 b8ed67607067c5a2836847ca9ba1d242da077db3 f07d07a42fd53c486453f971a710e47cfe2790e8 c5cb5939e7be8382a230216e9db8951a6d4578d9 86a1a51bc70e91ba49bd8122586e80fdd096c213 98a896f2d35608dc0f11eb6f8c1edfcb08b957c0 c5e04022edd49240c03e9e22e617bf2f38974214 94a51f19de44a7f5d7f3ad5bc15fa3809bc9bdb2 965fe60295aa6442abecdbf9f73a2dc979deedf0 2d66676836f722051677a91d0e82cb69c682e894 b729c9c0715876f4ab72748177d6071d397ac54f 10e21bc2be695f3f0c472ff1120bd95621ddabb5 43f9fded Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b2:05:e9:4d:61:88:aa:a0:e2:8c:19:6c:2f:e3:74:d2:39:50:69:c1] modulus: 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 public exponent: 10001 ] 2022-07-14 05:35:16.243  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-14 05:35:16.246 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-14 05:35:16.249 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-14 05:35:16.250 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-14 05:35:16.251  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-14 05:35:16.252  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-14 05:35:16.253  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-14 05:35:16.253 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-14 05:35:16.254 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-14 05:35:16.254 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-14 05:35:16.261 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-14 05:35:16.263 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-14 05:35:16.263 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-14 05:35:16.263 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-14 05:35:16.543  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-14 05:35:16.544  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-14 05:35:16.544 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-14 05:35:16.545 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-14 05:35:16.547  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-14 05:35:16.547  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-14 05:35:16.547 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 05:35:16.548 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 05:35:16.548 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 05:35:16.549 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 05:35:16.549 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 05:35:16.549 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 05:35:16.551 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 05:35:16.552 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 05:35:16.552 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 05:35:16.553 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-14 05:35:16.558 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 57159492789973039609726666004785979582009886985 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jul 14 03:26:56 UTC 2022 Final Date: Tue Jul 13 03:26:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [13:8f:be:03:9d:af:29:3d:9e:c7:e4:45:ef:b6:80:e4:71:7f:10:b2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4da9142be80f63a3e15aeb0c4c97fac131f46562 1e3467640058a9c5aed894bb3f4253eeeb66c12d 78897e96594cff20cb4dbfe253412161711e5de4 11c5b631e3317d519bd379f8fdc64145af00e1fb c9d2fdb19c4370ca87139e4cf6401db140976cc1 445816e40bfcb2ba9a8ac25df61ee023c4262db5 0eeba942d10cff19ae3d17ba2d121a9ea088a706 74c7590834f5f9c2054b912be673516e971b2302 b8ed67607067c5a2836847ca9ba1d242da077db3 f07d07a42fd53c486453f971a710e47cfe2790e8 c5cb5939e7be8382a230216e9db8951a6d4578d9 86a1a51bc70e91ba49bd8122586e80fdd096c213 98a896f2d35608dc0f11eb6f8c1edfcb08b957c0 c5e04022edd49240c03e9e22e617bf2f38974214 94a51f19de44a7f5d7f3ad5bc15fa3809bc9bdb2 965fe60295aa6442abecdbf9f73a2dc979deedf0 2d66676836f722051677a91d0e82cb69c682e894 b729c9c0715876f4ab72748177d6071d397ac54f 10e21bc2be695f3f0c472ff1120bd95621ddabb5 43f9fded Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f6:07:2e:ec:d6:5c:4f:7f:f6:23:82:1f:aa:66:de:36:3d:96:b4:4a] modulus: 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 public exponent: 10001 ] 2022-07-14 05:39:54.251  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-14 05:39:54.254 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-14 05:39:54.257 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-14 05:39:54.258 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-14 05:39:54.259  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-14 05:39:54.260  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-14 05:39:54.260  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-14 05:39:54.261 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-14 05:39:54.262 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-14 05:39:54.262 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-14 05:39:54.268 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-14 05:39:54.270 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-14 05:39:54.270 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-14 05:39:54.271 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-14 05:39:54.520  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-14 05:39:54.520  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-14 05:39:54.521 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-14 05:39:54.521 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-14 05:39:54.523  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-14 05:39:54.523  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-14 05:39:54.524 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 05:39:54.524 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 05:39:54.524 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 05:39:54.525 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 05:39:54.525 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 05:39:54.525 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 05:39:54.526 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 05:39:54.526 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 05:39:54.526 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 05:39:54.527 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-14 05:39:54.537 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 57159492789973039609726666004785979582009886985 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jul 14 03:26:56 UTC 2022 Final Date: Tue Jul 13 03:26:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [13:8f:be:03:9d:af:29:3d:9e:c7:e4:45:ef:b6:80:e4:71:7f:10:b2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4da9142be80f63a3e15aeb0c4c97fac131f46562 1e3467640058a9c5aed894bb3f4253eeeb66c12d 78897e96594cff20cb4dbfe253412161711e5de4 11c5b631e3317d519bd379f8fdc64145af00e1fb c9d2fdb19c4370ca87139e4cf6401db140976cc1 445816e40bfcb2ba9a8ac25df61ee023c4262db5 0eeba942d10cff19ae3d17ba2d121a9ea088a706 74c7590834f5f9c2054b912be673516e971b2302 b8ed67607067c5a2836847ca9ba1d242da077db3 f07d07a42fd53c486453f971a710e47cfe2790e8 c5cb5939e7be8382a230216e9db8951a6d4578d9 86a1a51bc70e91ba49bd8122586e80fdd096c213 98a896f2d35608dc0f11eb6f8c1edfcb08b957c0 c5e04022edd49240c03e9e22e617bf2f38974214 94a51f19de44a7f5d7f3ad5bc15fa3809bc9bdb2 965fe60295aa6442abecdbf9f73a2dc979deedf0 2d66676836f722051677a91d0e82cb69c682e894 b729c9c0715876f4ab72748177d6071d397ac54f 10e21bc2be695f3f0c472ff1120bd95621ddabb5 43f9fded Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e5:ef:22:94:8b:02:d8:d9:98:7a:0d:78:05:a6:19:93:0c:3b:77:3c] modulus: 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 public exponent: 10001 ] 2022-07-14 05:48:50.641  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-14 05:48:50.645 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-14 05:48:50.651 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-14 05:48:50.653 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-14 05:48:50.654  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-14 05:48:50.655  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-14 05:48:50.656  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-14 05:48:50.657 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-14 05:48:50.657 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-14 05:48:50.658 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-14 05:48:50.663 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-14 05:48:50.666 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-14 05:48:50.667 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-14 05:48:50.667 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-14 05:48:50.976  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-14 05:48:50.978  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-14 05:48:50.978 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-14 05:48:50.979 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-14 05:48:50.980  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-14 05:48:50.981  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-14 05:48:50.981 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 05:48:50.982 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 05:48:50.982 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 05:48:50.983 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 05:48:50.983 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 05:48:50.983 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 05:48:50.988 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 05:48:50.988 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 05:48:50.989 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 05:48:50.994 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-14 05:48:51.000 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 57159492789973039609726666004785979582009886985 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jul 14 03:26:56 UTC 2022 Final Date: Tue Jul 13 03:26:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [13:8f:be:03:9d:af:29:3d:9e:c7:e4:45:ef:b6:80:e4:71:7f:10:b2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4da9142be80f63a3e15aeb0c4c97fac131f46562 1e3467640058a9c5aed894bb3f4253eeeb66c12d 78897e96594cff20cb4dbfe253412161711e5de4 11c5b631e3317d519bd379f8fdc64145af00e1fb c9d2fdb19c4370ca87139e4cf6401db140976cc1 445816e40bfcb2ba9a8ac25df61ee023c4262db5 0eeba942d10cff19ae3d17ba2d121a9ea088a706 74c7590834f5f9c2054b912be673516e971b2302 b8ed67607067c5a2836847ca9ba1d242da077db3 f07d07a42fd53c486453f971a710e47cfe2790e8 c5cb5939e7be8382a230216e9db8951a6d4578d9 86a1a51bc70e91ba49bd8122586e80fdd096c213 98a896f2d35608dc0f11eb6f8c1edfcb08b957c0 c5e04022edd49240c03e9e22e617bf2f38974214 94a51f19de44a7f5d7f3ad5bc15fa3809bc9bdb2 965fe60295aa6442abecdbf9f73a2dc979deedf0 2d66676836f722051677a91d0e82cb69c682e894 b729c9c0715876f4ab72748177d6071d397ac54f 10e21bc2be695f3f0c472ff1120bd95621ddabb5 43f9fded Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ae:22:11:3d:78:df:65:01:77:03:ba:56:ff:f6:23:b9:a5:86:30:eb] modulus: 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 public exponent: 10001 ] 2022-07-14 05:53:40.252  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-14 05:53:40.255 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-14 05:53:40.258 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-14 05:53:40.259 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-14 05:53:40.260  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-14 05:53:40.261  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-14 05:53:40.261  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-14 05:53:40.262 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-14 05:53:40.262 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-14 05:53:40.263 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-14 05:53:40.271 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-14 05:53:40.272 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-14 05:53:40.273 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-14 05:53:40.273 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-14 05:53:40.464  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-14 05:53:40.465  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-14 05:53:40.465 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-14 05:53:40.466 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-14 05:53:40.467  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-14 05:53:40.468  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-14 05:53:40.468 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 05:53:40.469 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 05:53:40.469 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 05:53:40.470 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 05:53:40.471 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 05:53:40.471 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 05:53:40.472 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-14 05:53:40.472 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-14 05:53:40.472 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-14 05:53:40.473 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-14 05:53:40.479 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 57159492789973039609726666004785979582009886985 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jul 14 03:26:56 UTC 2022 Final Date: Tue Jul 13 03:26:55 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [13:8f:be:03:9d:af:29:3d:9e:c7:e4:45:ef:b6:80:e4:71:7f:10:b2] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4da9142be80f63a3e15aeb0c4c97fac131f46562 1e3467640058a9c5aed894bb3f4253eeeb66c12d 78897e96594cff20cb4dbfe253412161711e5de4 11c5b631e3317d519bd379f8fdc64145af00e1fb c9d2fdb19c4370ca87139e4cf6401db140976cc1 445816e40bfcb2ba9a8ac25df61ee023c4262db5 0eeba942d10cff19ae3d17ba2d121a9ea088a706 74c7590834f5f9c2054b912be673516e971b2302 b8ed67607067c5a2836847ca9ba1d242da077db3 f07d07a42fd53c486453f971a710e47cfe2790e8 c5cb5939e7be8382a230216e9db8951a6d4578d9 86a1a51bc70e91ba49bd8122586e80fdd096c213 98a896f2d35608dc0f11eb6f8c1edfcb08b957c0 c5e04022edd49240c03e9e22e617bf2f38974214 94a51f19de44a7f5d7f3ad5bc15fa3809bc9bdb2 965fe60295aa6442abecdbf9f73a2dc979deedf0 2d66676836f722051677a91d0e82cb69c682e894 b729c9c0715876f4ab72748177d6071d397ac54f 10e21bc2be695f3f0c472ff1120bd95621ddabb5 43f9fded Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b5:07:88:0f:54:e1:a6:ef:c0:23:4c:7a:4f:fe:38:65:76:ff:3d:eb] modulus: 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 public exponent: 10001 ]