2022-08-27 03:07:39,806 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-08-27 03:07:40,663 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-08-27 03:07:41.529  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Aug 27, 2022 3:07:43 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Aug 27, 2022 3:07:43 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Aug 27, 2022 3:07:43 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Aug 27, 2022 3:07:43 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-08-27 03:07:44.148 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-08-27 03:07:44.452  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-08-27 03:07:44.627  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-08-27 03:07:45.275 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-08-27 03:07:45.277 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-08-27 03:07:45.279 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-08-27 03:07:45.282 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-08-27 03:07:45.319 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-08-27 03:07:45.322 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-08-27 03:07:45.444 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-08-27 03:07:46.104 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Aug 27, 2022 3:07:46 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-08-27 03:07:46.944  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 8.025 seconds (JVM running for 9.775) Aug 27, 2022 3:08:09 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-08-27 03:08:50.984  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-08-27 03:08:50.996 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-08-27 03:08:51.045 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-08-27 03:08:51.051 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-08-27 03:08:51.084  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-08-27 03:08:51.087  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-08-27 03:08:51.088  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-08-27 03:08:51.089 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-08-27 03:08:51.090 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-08-27 03:08:51.095 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-08-27 03:08:51.102 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-08-27 03:08:51.106 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-08-27 03:08:51.151 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-08-27 03:08:51.159 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-08-27 03:08:51.160 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-08-27 03:08:51.164 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-08-27 03:08:52.001  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-08-27 03:08:52.006  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-08-27 03:08:52.007 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-08-27 03:08:52.010 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-08-27 03:08:52.026  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-08-27 03:08:52.028  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-08-27 03:08:52.029 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-08-27 03:08:52.029 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-08-27 03:08:52.030 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-08-27 03:08:52.043 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-08-27 03:08:52.044 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-08-27 03:08:52.044 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-08-27 03:08:52.051 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-08-27 03:08:52.051 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-08-27 03:08:52.052 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-08-27 03:08:52.059 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-08-27 03:08:52.091 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 291245826574274115909654474748073021117287577791 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Aug 27 03:05:36 UTC 2022 Final Date: Thu Aug 26 03:05:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [43:43:21:f3:66:fc:f3:fc:62:d1:50:de:f1:68:f1:3c:01:0f:b3:4b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 206150bcdcc2e1b5bb03cd27d5d5654bf2370913 579f76a1158d77cf22b66ed748dc9724f4b44dc0 81ef243d2318efa361e18ba2fe669313b2709d46 ce65a342b1d0f2675e286d9e470f134f1ea6fbe5 6a119bbe174ae2efd204d7e8eb3a8ea574827f71 72fe941388b6ae55d1ae0806558ce7ceba98e0b6 34905c30700391b6cdfcc168bcbace5674b4fbc9 04dddd8a9b047cc343edb3e3dd74024b140b474c c80e6fc67d6e2d274c30fa64c12b2c4cb935fbd3 03ed4ebb236b0d4238f4a31a361bffe5fba4ac28 074c04a10266c8c7f396a8498c5e175c5c1e4630 ab9604d950b3617db64ff9b16c42306e87d5764a d29a22f27a214a0f8fe1ccb1cbadba3836fdf9d1 311829b62da204df9c16ad1bf4ef156d63ae334e 320fbc0f6c790dd9925daf4a6b93b017b7330f56 6b6ae02e324a1dd4df01bd495003879b19993b11 77ff379a6228926d5957b1e1a21f673564010aab b02dc8c2a407e19eb075b479cad1a055906b5b7c 08158bcf8f4e8da92b7e17b3bbd59e082afb91d6 181d8218 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [64:98:d6:ae:09:f0:92:bf:80:e7:ad:02:53:1c:46:df:8d:8b:87:e2] modulus: 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 public exponent: 10001 ] 2022-08-27 04:25:25.318  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-08-27 04:25:25.321 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-08-27 04:25:25.326 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-08-27 04:25:25.327 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-08-27 04:25:25.328  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-08-27 04:25:25.329  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-08-27 04:25:25.330  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-08-27 04:25:25.331 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-08-27 04:25:25.331 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-08-27 04:25:25.332 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-08-27 04:25:25.338 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-08-27 04:25:25.340 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-08-27 04:25:25.340 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-08-27 04:25:25.341 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-08-27 04:25:25.502  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-08-27 04:25:25.503  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-08-27 04:25:25.505 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-08-27 04:25:25.506 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-08-27 04:25:25.509  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-08-27 04:25:25.509  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-08-27 04:25:25.510 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-08-27 04:25:25.511 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-08-27 04:25:25.511 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-08-27 04:25:25.512 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-08-27 04:25:25.512 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-08-27 04:25:25.513 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-08-27 04:25:25.514 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-08-27 04:25:25.514 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-08-27 04:25:25.514 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-08-27 04:25:25.516 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-08-27 04:25:25.521 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 291245826574274115909654474748073021117287577791 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Aug 27 03:05:36 UTC 2022 Final Date: Thu Aug 26 03:05:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [43:43:21:f3:66:fc:f3:fc:62:d1:50:de:f1:68:f1:3c:01:0f:b3:4b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 206150bcdcc2e1b5bb03cd27d5d5654bf2370913 579f76a1158d77cf22b66ed748dc9724f4b44dc0 81ef243d2318efa361e18ba2fe669313b2709d46 ce65a342b1d0f2675e286d9e470f134f1ea6fbe5 6a119bbe174ae2efd204d7e8eb3a8ea574827f71 72fe941388b6ae55d1ae0806558ce7ceba98e0b6 34905c30700391b6cdfcc168bcbace5674b4fbc9 04dddd8a9b047cc343edb3e3dd74024b140b474c c80e6fc67d6e2d274c30fa64c12b2c4cb935fbd3 03ed4ebb236b0d4238f4a31a361bffe5fba4ac28 074c04a10266c8c7f396a8498c5e175c5c1e4630 ab9604d950b3617db64ff9b16c42306e87d5764a d29a22f27a214a0f8fe1ccb1cbadba3836fdf9d1 311829b62da204df9c16ad1bf4ef156d63ae334e 320fbc0f6c790dd9925daf4a6b93b017b7330f56 6b6ae02e324a1dd4df01bd495003879b19993b11 77ff379a6228926d5957b1e1a21f673564010aab b02dc8c2a407e19eb075b479cad1a055906b5b7c 08158bcf8f4e8da92b7e17b3bbd59e082afb91d6 181d8218 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7a:82:9c:fb:1d:25:fe:1a:55:0d:99:41:41:80:20:bc:66:e1:33:cb] modulus: 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 public exponent: 10001 ] 2022-08-27 04:28:21.043  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-08-27 04:28:21.044 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-08-27 04:28:21.046 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-08-27 04:28:21.046 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-08-27 04:28:21.047  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-08-27 04:28:21.047  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-08-27 04:28:21.048  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-08-27 04:28:21.048 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-08-27 04:28:21.049 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-08-27 04:28:21.049 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-08-27 04:28:21.054 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-08-27 04:28:21.055 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-08-27 04:28:21.055 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-08-27 04:28:21.056 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-08-27 04:28:21.174  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-08-27 04:28:21.175  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-08-27 04:28:21.175 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-08-27 04:28:21.176 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-08-27 04:28:21.177  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-08-27 04:28:21.178  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-08-27 04:28:21.178 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-08-27 04:28:21.178 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-08-27 04:28:21.179 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-08-27 04:28:21.180 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-08-27 04:28:21.180 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-08-27 04:28:21.181 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-08-27 04:28:21.183 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-08-27 04:28:21.183 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-08-27 04:28:21.184 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-08-27 04:28:21.185 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-08-27 04:28:21.189 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 291245826574274115909654474748073021117287577791 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Aug 27 03:05:36 UTC 2022 Final Date: Thu Aug 26 03:05:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [43:43:21:f3:66:fc:f3:fc:62:d1:50:de:f1:68:f1:3c:01:0f:b3:4b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 206150bcdcc2e1b5bb03cd27d5d5654bf2370913 579f76a1158d77cf22b66ed748dc9724f4b44dc0 81ef243d2318efa361e18ba2fe669313b2709d46 ce65a342b1d0f2675e286d9e470f134f1ea6fbe5 6a119bbe174ae2efd204d7e8eb3a8ea574827f71 72fe941388b6ae55d1ae0806558ce7ceba98e0b6 34905c30700391b6cdfcc168bcbace5674b4fbc9 04dddd8a9b047cc343edb3e3dd74024b140b474c c80e6fc67d6e2d274c30fa64c12b2c4cb935fbd3 03ed4ebb236b0d4238f4a31a361bffe5fba4ac28 074c04a10266c8c7f396a8498c5e175c5c1e4630 ab9604d950b3617db64ff9b16c42306e87d5764a d29a22f27a214a0f8fe1ccb1cbadba3836fdf9d1 311829b62da204df9c16ad1bf4ef156d63ae334e 320fbc0f6c790dd9925daf4a6b93b017b7330f56 6b6ae02e324a1dd4df01bd495003879b19993b11 77ff379a6228926d5957b1e1a21f673564010aab b02dc8c2a407e19eb075b479cad1a055906b5b7c 08158bcf8f4e8da92b7e17b3bbd59e082afb91d6 181d8218 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a2:ec:67:29:85:8e:93:70:9b:53:8b:5d:3c:e2:53:6d:f5:3c:87:64] modulus: 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 public exponent: 10001 ] 2022-08-27 04:29:38.968  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-08-27 04:29:38.969 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-08-27 04:29:38.971 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-08-27 04:29:38.973 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-08-27 04:29:38.979  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-08-27 04:29:38.980  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-08-27 04:29:38.980  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-08-27 04:29:38.981 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-08-27 04:29:38.981 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-08-27 04:29:38.986 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-08-27 04:29:38.992 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-08-27 04:29:38.993 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-08-27 04:29:38.993 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-08-27 04:29:38.993 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-08-27 04:29:39.153  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-08-27 04:29:39.154  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-08-27 04:29:39.154 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-08-27 04:29:39.155 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-08-27 04:29:39.157  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-08-27 04:29:39.157  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-08-27 04:29:39.158 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-08-27 04:29:39.158 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-08-27 04:29:39.159 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-08-27 04:29:39.159 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-08-27 04:29:39.160 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-08-27 04:29:39.160 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-08-27 04:29:39.161 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-08-27 04:29:39.161 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-08-27 04:29:39.161 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-08-27 04:29:39.162 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-08-27 04:29:39.166 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 291245826574274115909654474748073021117287577791 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Aug 27 03:05:36 UTC 2022 Final Date: Thu Aug 26 03:05:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [43:43:21:f3:66:fc:f3:fc:62:d1:50:de:f1:68:f1:3c:01:0f:b3:4b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 206150bcdcc2e1b5bb03cd27d5d5654bf2370913 579f76a1158d77cf22b66ed748dc9724f4b44dc0 81ef243d2318efa361e18ba2fe669313b2709d46 ce65a342b1d0f2675e286d9e470f134f1ea6fbe5 6a119bbe174ae2efd204d7e8eb3a8ea574827f71 72fe941388b6ae55d1ae0806558ce7ceba98e0b6 34905c30700391b6cdfcc168bcbace5674b4fbc9 04dddd8a9b047cc343edb3e3dd74024b140b474c c80e6fc67d6e2d274c30fa64c12b2c4cb935fbd3 03ed4ebb236b0d4238f4a31a361bffe5fba4ac28 074c04a10266c8c7f396a8498c5e175c5c1e4630 ab9604d950b3617db64ff9b16c42306e87d5764a d29a22f27a214a0f8fe1ccb1cbadba3836fdf9d1 311829b62da204df9c16ad1bf4ef156d63ae334e 320fbc0f6c790dd9925daf4a6b93b017b7330f56 6b6ae02e324a1dd4df01bd495003879b19993b11 77ff379a6228926d5957b1e1a21f673564010aab b02dc8c2a407e19eb075b479cad1a055906b5b7c 08158bcf8f4e8da92b7e17b3bbd59e082afb91d6 181d8218 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f8:ee:37:e8:fb:bd:82:8b:7d:13:22:1a:2c:98:43:ae:55:ac:f9:99] modulus: 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 public exponent: 10001 ] 2022-08-27 04:31:00.953  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-08-27 04:31:00.954 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-08-27 04:31:00.956 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-08-27 04:31:00.956 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-08-27 04:31:00.957  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-08-27 04:31:00.957  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-08-27 04:31:00.958  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-08-27 04:31:00.958 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-08-27 04:31:00.959 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-08-27 04:31:00.959 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-08-27 04:31:00.965 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-08-27 04:31:00.965 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-08-27 04:31:00.965 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-08-27 04:31:00.966 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-08-27 04:31:01.185  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-08-27 04:31:01.185  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-08-27 04:31:01.186 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-08-27 04:31:01.186 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-08-27 04:31:01.188  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-08-27 04:31:01.189  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-08-27 04:31:01.190 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-08-27 04:31:01.190 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-08-27 04:31:01.191 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-08-27 04:31:01.191 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-08-27 04:31:01.192 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-08-27 04:31:01.192 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-08-27 04:31:01.193 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-08-27 04:31:01.193 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-08-27 04:31:01.194 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-08-27 04:31:01.195 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-08-27 04:31:01.198 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 291245826574274115909654474748073021117287577791 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Aug 27 03:05:36 UTC 2022 Final Date: Thu Aug 26 03:05:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [43:43:21:f3:66:fc:f3:fc:62:d1:50:de:f1:68:f1:3c:01:0f:b3:4b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 206150bcdcc2e1b5bb03cd27d5d5654bf2370913 579f76a1158d77cf22b66ed748dc9724f4b44dc0 81ef243d2318efa361e18ba2fe669313b2709d46 ce65a342b1d0f2675e286d9e470f134f1ea6fbe5 6a119bbe174ae2efd204d7e8eb3a8ea574827f71 72fe941388b6ae55d1ae0806558ce7ceba98e0b6 34905c30700391b6cdfcc168bcbace5674b4fbc9 04dddd8a9b047cc343edb3e3dd74024b140b474c c80e6fc67d6e2d274c30fa64c12b2c4cb935fbd3 03ed4ebb236b0d4238f4a31a361bffe5fba4ac28 074c04a10266c8c7f396a8498c5e175c5c1e4630 ab9604d950b3617db64ff9b16c42306e87d5764a d29a22f27a214a0f8fe1ccb1cbadba3836fdf9d1 311829b62da204df9c16ad1bf4ef156d63ae334e 320fbc0f6c790dd9925daf4a6b93b017b7330f56 6b6ae02e324a1dd4df01bd495003879b19993b11 77ff379a6228926d5957b1e1a21f673564010aab b02dc8c2a407e19eb075b479cad1a055906b5b7c 08158bcf8f4e8da92b7e17b3bbd59e082afb91d6 181d8218 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [34:0b:e6:5d:25:1f:a3:d6:43:47:ab:97:21:e8:22:e6:9a:76:42:15] modulus: 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 public exponent: 10001 ] 2022-08-27 04:33:57.530  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-08-27 04:33:57.533 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-08-27 04:33:57.536 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-08-27 04:33:57.537 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-08-27 04:33:57.538  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-08-27 04:33:57.539  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-08-27 04:33:57.540  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-08-27 04:33:57.540 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-08-27 04:33:57.541 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-08-27 04:33:57.541 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-08-27 04:33:57.550 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-08-27 04:33:57.553 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-08-27 04:33:57.553 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-08-27 04:33:57.553 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-08-27 04:33:57.718  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-08-27 04:33:57.720  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-08-27 04:33:57.721 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-08-27 04:33:57.721 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-08-27 04:33:57.723  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-08-27 04:33:57.725  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-08-27 04:33:57.725 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-08-27 04:33:57.726 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-08-27 04:33:57.726 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-08-27 04:33:57.727 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-08-27 04:33:57.727 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-08-27 04:33:57.727 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-08-27 04:33:57.728 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-08-27 04:33:57.729 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-08-27 04:33:57.729 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-08-27 04:33:57.730 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-08-27 04:33:57.733 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 291245826574274115909654474748073021117287577791 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Aug 27 03:05:36 UTC 2022 Final Date: Thu Aug 26 03:05:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [43:43:21:f3:66:fc:f3:fc:62:d1:50:de:f1:68:f1:3c:01:0f:b3:4b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 206150bcdcc2e1b5bb03cd27d5d5654bf2370913 579f76a1158d77cf22b66ed748dc9724f4b44dc0 81ef243d2318efa361e18ba2fe669313b2709d46 ce65a342b1d0f2675e286d9e470f134f1ea6fbe5 6a119bbe174ae2efd204d7e8eb3a8ea574827f71 72fe941388b6ae55d1ae0806558ce7ceba98e0b6 34905c30700391b6cdfcc168bcbace5674b4fbc9 04dddd8a9b047cc343edb3e3dd74024b140b474c c80e6fc67d6e2d274c30fa64c12b2c4cb935fbd3 03ed4ebb236b0d4238f4a31a361bffe5fba4ac28 074c04a10266c8c7f396a8498c5e175c5c1e4630 ab9604d950b3617db64ff9b16c42306e87d5764a d29a22f27a214a0f8fe1ccb1cbadba3836fdf9d1 311829b62da204df9c16ad1bf4ef156d63ae334e 320fbc0f6c790dd9925daf4a6b93b017b7330f56 6b6ae02e324a1dd4df01bd495003879b19993b11 77ff379a6228926d5957b1e1a21f673564010aab b02dc8c2a407e19eb075b479cad1a055906b5b7c 08158bcf8f4e8da92b7e17b3bbd59e082afb91d6 181d8218 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [44:9b:14:71:cb:2b:27:07:8d:0e:94:2b:d5:8a:4f:b3:d7:e6:4f:ac] modulus: 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 public exponent: 10001 ] 2022-08-27 04:35:44.376  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-08-27 04:35:44.377 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-08-27 04:35:44.378 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-08-27 04:35:44.379 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-08-27 04:35:44.379  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-08-27 04:35:44.380  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-08-27 04:35:44.380  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-08-27 04:35:44.381 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-08-27 04:35:44.381 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-08-27 04:35:44.381 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-08-27 04:35:44.386 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-08-27 04:35:44.386 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-08-27 04:35:44.387 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-08-27 04:35:44.387 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-08-27 04:35:44.560  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-08-27 04:35:44.561  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-08-27 04:35:44.561 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-08-27 04:35:44.562 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-08-27 04:35:44.563  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-08-27 04:35:44.563  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-08-27 04:35:44.564 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-08-27 04:35:44.564 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-08-27 04:35:44.564 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-08-27 04:35:44.565 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-08-27 04:35:44.565 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-08-27 04:35:44.565 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-08-27 04:35:44.566 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-08-27 04:35:44.567 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-08-27 04:35:44.567 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-08-27 04:35:44.568 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-08-27 04:35:44.571 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 291245826574274115909654474748073021117287577791 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Aug 27 03:05:36 UTC 2022 Final Date: Thu Aug 26 03:05:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [43:43:21:f3:66:fc:f3:fc:62:d1:50:de:f1:68:f1:3c:01:0f:b3:4b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 206150bcdcc2e1b5bb03cd27d5d5654bf2370913 579f76a1158d77cf22b66ed748dc9724f4b44dc0 81ef243d2318efa361e18ba2fe669313b2709d46 ce65a342b1d0f2675e286d9e470f134f1ea6fbe5 6a119bbe174ae2efd204d7e8eb3a8ea574827f71 72fe941388b6ae55d1ae0806558ce7ceba98e0b6 34905c30700391b6cdfcc168bcbace5674b4fbc9 04dddd8a9b047cc343edb3e3dd74024b140b474c c80e6fc67d6e2d274c30fa64c12b2c4cb935fbd3 03ed4ebb236b0d4238f4a31a361bffe5fba4ac28 074c04a10266c8c7f396a8498c5e175c5c1e4630 ab9604d950b3617db64ff9b16c42306e87d5764a d29a22f27a214a0f8fe1ccb1cbadba3836fdf9d1 311829b62da204df9c16ad1bf4ef156d63ae334e 320fbc0f6c790dd9925daf4a6b93b017b7330f56 6b6ae02e324a1dd4df01bd495003879b19993b11 77ff379a6228926d5957b1e1a21f673564010aab b02dc8c2a407e19eb075b479cad1a055906b5b7c 08158bcf8f4e8da92b7e17b3bbd59e082afb91d6 181d8218 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5f:96:5f:a9:c9:84:42:20:f1:4b:c9:af:a7:dd:e7:27:61:bf:a7:33] modulus: bcc92b04e58d186634e8180a76c7befed1b6d564dd4fa308a6cfd7225aab0e10c60feea86c68b88d32d7c6b319f81bb73d856b59172accc6ccc691ee309f41aa7f88309c4ca9648dc4554c3a617bc9b395a63d290ad0d70a331b3684c1c318f86b9ce54852bf10af3f5d3c051d74a806832642e5a20da1fa97ac417c0cb60fef795dd46b70c55172f030ac0aff0c5b4ec21775dc72e9e14a74dcd3a760613d52af4f255355206c276261ef7cfbe661df524fb7c77a9689d2d06beaf5319ab6bc115fdce4e04e9a4587700a13e16d54aa6a3920192e0123224f93a73ca68443e3add2e0123cdb9de72e43f6fea2ee836a762576c7e5071b44e2fb634575c55069 public exponent: 10001 ] 2022-08-27 04:38:44.838  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-08-27 04:38:44.839 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-08-27 04:38:44.841 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-08-27 04:38:44.842 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-08-27 04:38:44.843  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-08-27 04:38:44.843  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-08-27 04:38:44.843  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-08-27 04:38:44.844 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-08-27 04:38:44.844 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-08-27 04:38:44.845 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-08-27 04:38:44.850 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-08-27 04:38:44.850 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-08-27 04:38:44.851 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-08-27 04:38:44.851 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-08-27 04:38:45.060  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-08-27 04:38:45.061  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-08-27 04:38:45.061 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-08-27 04:38:45.062 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-08-27 04:38:45.068  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-08-27 04:38:45.068  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-08-27 04:38:45.069 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-08-27 04:38:45.069 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-08-27 04:38:45.070 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-08-27 04:38:45.071 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-08-27 04:38:45.072 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-08-27 04:38:45.072 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-08-27 04:38:45.073 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-08-27 04:38:45.074 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-08-27 04:38:45.074 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-08-27 04:38:45.075 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-08-27 04:38:45.079 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 291245826574274115909654474748073021117287577791 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Aug 27 03:05:36 UTC 2022 Final Date: Thu Aug 26 03:05:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [43:43:21:f3:66:fc:f3:fc:62:d1:50:de:f1:68:f1:3c:01:0f:b3:4b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 206150bcdcc2e1b5bb03cd27d5d5654bf2370913 579f76a1158d77cf22b66ed748dc9724f4b44dc0 81ef243d2318efa361e18ba2fe669313b2709d46 ce65a342b1d0f2675e286d9e470f134f1ea6fbe5 6a119bbe174ae2efd204d7e8eb3a8ea574827f71 72fe941388b6ae55d1ae0806558ce7ceba98e0b6 34905c30700391b6cdfcc168bcbace5674b4fbc9 04dddd8a9b047cc343edb3e3dd74024b140b474c c80e6fc67d6e2d274c30fa64c12b2c4cb935fbd3 03ed4ebb236b0d4238f4a31a361bffe5fba4ac28 074c04a10266c8c7f396a8498c5e175c5c1e4630 ab9604d950b3617db64ff9b16c42306e87d5764a d29a22f27a214a0f8fe1ccb1cbadba3836fdf9d1 311829b62da204df9c16ad1bf4ef156d63ae334e 320fbc0f6c790dd9925daf4a6b93b017b7330f56 6b6ae02e324a1dd4df01bd495003879b19993b11 77ff379a6228926d5957b1e1a21f673564010aab b02dc8c2a407e19eb075b479cad1a055906b5b7c 08158bcf8f4e8da92b7e17b3bbd59e082afb91d6 181d8218 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [34:39:ef:92:88:35:2b:ca:c5:c8:f8:ff:0b:26:5b:80:05:ff:35:99] modulus: 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 public exponent: 10001 ] 2022-08-27 04:39:25.255  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-08-27 04:39:25.257 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-08-27 04:39:25.258 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-08-27 04:39:25.259 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-08-27 04:39:25.260  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-08-27 04:39:25.260  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-08-27 04:39:25.261  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-08-27 04:39:25.261 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-08-27 04:39:25.262 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-08-27 04:39:25.262 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-08-27 04:39:25.267 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-08-27 04:39:25.268 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-08-27 04:39:25.268 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-08-27 04:39:25.268 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-08-27 04:39:25.403  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-08-27 04:39:25.403  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-08-27 04:39:25.404 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-08-27 04:39:25.404 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-08-27 04:39:25.406  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-08-27 04:39:25.406  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-08-27 04:39:25.407 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-08-27 04:39:25.407 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-08-27 04:39:25.407 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-08-27 04:39:25.408 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-08-27 04:39:25.408 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-08-27 04:39:25.409 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-08-27 04:39:25.410 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-08-27 04:39:25.410 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-08-27 04:39:25.410 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-08-27 04:39:25.411 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-08-27 04:39:25.414 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 291245826574274115909654474748073021117287577791 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Aug 27 03:05:36 UTC 2022 Final Date: Thu Aug 26 03:05:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [43:43:21:f3:66:fc:f3:fc:62:d1:50:de:f1:68:f1:3c:01:0f:b3:4b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 206150bcdcc2e1b5bb03cd27d5d5654bf2370913 579f76a1158d77cf22b66ed748dc9724f4b44dc0 81ef243d2318efa361e18ba2fe669313b2709d46 ce65a342b1d0f2675e286d9e470f134f1ea6fbe5 6a119bbe174ae2efd204d7e8eb3a8ea574827f71 72fe941388b6ae55d1ae0806558ce7ceba98e0b6 34905c30700391b6cdfcc168bcbace5674b4fbc9 04dddd8a9b047cc343edb3e3dd74024b140b474c c80e6fc67d6e2d274c30fa64c12b2c4cb935fbd3 03ed4ebb236b0d4238f4a31a361bffe5fba4ac28 074c04a10266c8c7f396a8498c5e175c5c1e4630 ab9604d950b3617db64ff9b16c42306e87d5764a d29a22f27a214a0f8fe1ccb1cbadba3836fdf9d1 311829b62da204df9c16ad1bf4ef156d63ae334e 320fbc0f6c790dd9925daf4a6b93b017b7330f56 6b6ae02e324a1dd4df01bd495003879b19993b11 77ff379a6228926d5957b1e1a21f673564010aab b02dc8c2a407e19eb075b479cad1a055906b5b7c 08158bcf8f4e8da92b7e17b3bbd59e082afb91d6 181d8218 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [14:9b:4d:98:99:ba:29:60:ea:57:4d:b5:32:92:43:3e:74:4d:be:52] modulus: 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 public exponent: 10001 ] 2022-08-27 04:43:30.177  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-08-27 04:43:30.178 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-08-27 04:43:30.180 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-08-27 04:43:30.180 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-08-27 04:43:30.181  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-08-27 04:43:30.181  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-08-27 04:43:30.181  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-08-27 04:43:30.182 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-08-27 04:43:30.182 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-08-27 04:43:30.182 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-08-27 04:43:30.187 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-08-27 04:43:30.187 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-08-27 04:43:30.188 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-08-27 04:43:30.188 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-08-27 04:43:30.392  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-08-27 04:43:30.392  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-08-27 04:43:30.393 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-08-27 04:43:30.393 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-08-27 04:43:30.394  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-08-27 04:43:30.395  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-08-27 04:43:30.395 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-08-27 04:43:30.395 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-08-27 04:43:30.395 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-08-27 04:43:30.396 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-08-27 04:43:30.396 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-08-27 04:43:30.397 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-08-27 04:43:30.397 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-08-27 04:43:30.398 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-08-27 04:43:30.398 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-08-27 04:43:30.399 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-08-27 04:43:30.402 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 291245826574274115909654474748073021117287577791 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Aug 27 03:05:36 UTC 2022 Final Date: Thu Aug 26 03:05:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [43:43:21:f3:66:fc:f3:fc:62:d1:50:de:f1:68:f1:3c:01:0f:b3:4b] modulus: e4414adf68ff1d2c6d71df6262da272cbb3ff7491e0e98b199363594748fbfbddc55e85074ce8d6ec51fa9b170a752e98266bc933f20360f3ec47eabe0ed3bc20773f0aca5e3ecb420e1531bdfb728aeb49ea160f090f00593f26848e9286133e7c14961eaaa3b6e5f81cca09428cf7ba6bcb9ef6acbffe035d8e0d5a57d97bd81bc2488642e7d2c99895113ffcbf1874f57d8964654f46dc86f6d203378ac6a3b5744a80ee2e6c10abb47f1ebeb1f2f0adde31a52a373682c08014147f188b8b419635109600d95324c13abe7dc4a9fc858083f911669deaaf713a894b6a53b7609b372762cab90124450dd7d4ee5fa591dcf46745d0d20867794bd3cf7d3243c4e83c14e4cca469fec805454b8ba7dc85f1d95f8ba092ea98f523acbe019167f8f55e9ed4ac584b0dc369dfbc43af0a745d9dbbdc78ef9c68ee7a6e26d2315285c9b347f7e9f592ed8f110ef12888f7227240c38656b4bbc957a0a86c309910a04c70c29e1f19ec7f6326e41e425c34fd69a633e8da9d70acb9d5548058507 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 206150bcdcc2e1b5bb03cd27d5d5654bf2370913 579f76a1158d77cf22b66ed748dc9724f4b44dc0 81ef243d2318efa361e18ba2fe669313b2709d46 ce65a342b1d0f2675e286d9e470f134f1ea6fbe5 6a119bbe174ae2efd204d7e8eb3a8ea574827f71 72fe941388b6ae55d1ae0806558ce7ceba98e0b6 34905c30700391b6cdfcc168bcbace5674b4fbc9 04dddd8a9b047cc343edb3e3dd74024b140b474c c80e6fc67d6e2d274c30fa64c12b2c4cb935fbd3 03ed4ebb236b0d4238f4a31a361bffe5fba4ac28 074c04a10266c8c7f396a8498c5e175c5c1e4630 ab9604d950b3617db64ff9b16c42306e87d5764a d29a22f27a214a0f8fe1ccb1cbadba3836fdf9d1 311829b62da204df9c16ad1bf4ef156d63ae334e 320fbc0f6c790dd9925daf4a6b93b017b7330f56 6b6ae02e324a1dd4df01bd495003879b19993b11 77ff379a6228926d5957b1e1a21f673564010aab b02dc8c2a407e19eb075b479cad1a055906b5b7c 08158bcf8f4e8da92b7e17b3bbd59e082afb91d6 181d8218 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [76:44:f6:2a:40:a3:fc:f0:38:14:5b:53:6e:22:eb:c2:bf:40:09:30] modulus: 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 public exponent: 10001 ] 2022-08-27 04:43:47.838  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-08-27 04:43:47.839 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-08-27 04:43:47.840 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-08-27 04:43:47.841 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-08-27 04:43:47.841  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-08-27 04:43:47.842  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-08-27 04:43:47.842  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-08-27 04:43:47.843 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-08-27 04:43:47.843 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-08-27 04:43:47.843 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-08-27 04:43:47.848 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-08-27 04:43:47.848 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-08-27 04:43:47.848 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-08-27 04:43:47.849 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-08-27 04:43:48.056  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-08-27 04:43:48.057  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-08-27 04:43:48.057 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-08-27 04:43:48.058 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-08-27 04:43:48.059  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-08-27 04:43:48.059  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-08-27 04:43:48.060 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-08-27 04:43:48.061 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-08-27 04:43:48.061 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-08-27 04:43:48.061 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-08-27 04:43:48.062 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-08-27 04:43:48.062 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-08-27 04:43:48.062 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-08-27 04:43:48.063 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-08-27 04:43:48.063 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-08-27 04:43:48.064 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-08-27 04:43:48.067 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 291245826574274115909654474748073021117287577791 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Aug 27 03:05:36 UTC 2022 Final Date: Thu Aug 26 03:05:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [43:43:21:f3:66:fc:f3:fc:62:d1:50:de:f1:68:f1:3c:01:0f:b3:4b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 206150bcdcc2e1b5bb03cd27d5d5654bf2370913 579f76a1158d77cf22b66ed748dc9724f4b44dc0 81ef243d2318efa361e18ba2fe669313b2709d46 ce65a342b1d0f2675e286d9e470f134f1ea6fbe5 6a119bbe174ae2efd204d7e8eb3a8ea574827f71 72fe941388b6ae55d1ae0806558ce7ceba98e0b6 34905c30700391b6cdfcc168bcbace5674b4fbc9 04dddd8a9b047cc343edb3e3dd74024b140b474c c80e6fc67d6e2d274c30fa64c12b2c4cb935fbd3 03ed4ebb236b0d4238f4a31a361bffe5fba4ac28 074c04a10266c8c7f396a8498c5e175c5c1e4630 ab9604d950b3617db64ff9b16c42306e87d5764a d29a22f27a214a0f8fe1ccb1cbadba3836fdf9d1 311829b62da204df9c16ad1bf4ef156d63ae334e 320fbc0f6c790dd9925daf4a6b93b017b7330f56 6b6ae02e324a1dd4df01bd495003879b19993b11 77ff379a6228926d5957b1e1a21f673564010aab b02dc8c2a407e19eb075b479cad1a055906b5b7c 08158bcf8f4e8da92b7e17b3bbd59e082afb91d6 181d8218 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [11:00:d1:b4:0d:d3:fe:64:eb:fe:b4:05:ef:07:85:c1:10:1d:68:3b] modulus: 99ebc7602f733bfd2765aa04ba970da74691adbed456ccc593b10bd7f751c9c6add37ebd2a069aeb64e5217f6dbb3f22a4616761389ff8b7ceebca752d56d9a7df3ecc9fe98d8e7ac6f92a96b730ea65d6786575284dcdca7d7ee423ab4da0c0114fa7e126d0ce10b6c0c7bd6c93b4a58ba80b93b1f9c40945ef0631459e2e0025f0a4cf784e1a3a576b1fa89fecd00edf85b0d8910b5fd873c65907e9dd2c08bf3458ba6c765a0c79afe651272c58fa4625134204c30e7e9ec67315d0804d2d9fc2c281671ae7168e47be0a944d91ae6ab013c421255727e54f53158e07dabe4a3a9b2e9a22b0571a0eb1a38673f520039c313aa1f173b8f266113f73d6b317 public exponent: 10001 ] 2022-08-27 04:44:33.325  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-08-27 04:44:33.326 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-08-27 04:44:33.327 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-08-27 04:44:33.328 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-08-27 04:44:33.328  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-08-27 04:44:33.329  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-08-27 04:44:33.329  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-08-27 04:44:33.329 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-08-27 04:44:33.330 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-08-27 04:44:33.330 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-08-27 04:44:33.337 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-08-27 04:44:33.338 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-08-27 04:44:33.338 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-08-27 04:44:33.338 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-08-27 04:44:33.471  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-08-27 04:44:33.472  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-08-27 04:44:33.472 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-08-27 04:44:33.472 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-08-27 04:44:33.473  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-08-27 04:44:33.474  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-08-27 04:44:33.474 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-08-27 04:44:33.474 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-08-27 04:44:33.475 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-08-27 04:44:33.475 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-08-27 04:44:33.475 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-08-27 04:44:33.476 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-08-27 04:44:33.476 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-08-27 04:44:33.477 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-08-27 04:44:33.477 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-08-27 04:44:33.477 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-08-27 04:44:33.481 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 291245826574274115909654474748073021117287577791 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Aug 27 03:05:36 UTC 2022 Final Date: Thu Aug 26 03:05:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [43:43:21:f3:66:fc:f3:fc:62:d1:50:de:f1:68:f1:3c:01:0f:b3:4b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 206150bcdcc2e1b5bb03cd27d5d5654bf2370913 579f76a1158d77cf22b66ed748dc9724f4b44dc0 81ef243d2318efa361e18ba2fe669313b2709d46 ce65a342b1d0f2675e286d9e470f134f1ea6fbe5 6a119bbe174ae2efd204d7e8eb3a8ea574827f71 72fe941388b6ae55d1ae0806558ce7ceba98e0b6 34905c30700391b6cdfcc168bcbace5674b4fbc9 04dddd8a9b047cc343edb3e3dd74024b140b474c c80e6fc67d6e2d274c30fa64c12b2c4cb935fbd3 03ed4ebb236b0d4238f4a31a361bffe5fba4ac28 074c04a10266c8c7f396a8498c5e175c5c1e4630 ab9604d950b3617db64ff9b16c42306e87d5764a d29a22f27a214a0f8fe1ccb1cbadba3836fdf9d1 311829b62da204df9c16ad1bf4ef156d63ae334e 320fbc0f6c790dd9925daf4a6b93b017b7330f56 6b6ae02e324a1dd4df01bd495003879b19993b11 77ff379a6228926d5957b1e1a21f673564010aab b02dc8c2a407e19eb075b479cad1a055906b5b7c 08158bcf8f4e8da92b7e17b3bbd59e082afb91d6 181d8218 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [39:5f:24:8d:cc:97:33:86:c9:7c:20:69:b1:f7:21:73:ca:44:53:22] modulus: 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 public exponent: 10001 ] 2022-08-27 04:48:39.512  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-08-27 04:48:39.514 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-08-27 04:48:39.516 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-08-27 04:48:39.517 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-08-27 04:48:39.517  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-08-27 04:48:39.518  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-08-27 04:48:39.518  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-08-27 04:48:39.518 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-08-27 04:48:39.519 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-08-27 04:48:39.519 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-08-27 04:48:39.525 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-08-27 04:48:39.526 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-08-27 04:48:39.526 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-08-27 04:48:39.526 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-08-27 04:48:39.741  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-08-27 04:48:39.741  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-08-27 04:48:39.742 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-08-27 04:48:39.742 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-08-27 04:48:39.743  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-08-27 04:48:39.744  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-08-27 04:48:39.744 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-08-27 04:48:39.744 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-08-27 04:48:39.745 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-08-27 04:48:39.745 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-08-27 04:48:39.745 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-08-27 04:48:39.746 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-08-27 04:48:39.746 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-08-27 04:48:39.747 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-08-27 04:48:39.747 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-08-27 04:48:39.748 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-08-27 04:48:39.756 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 291245826574274115909654474748073021117287577791 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Aug 27 03:05:36 UTC 2022 Final Date: Thu Aug 26 03:05:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [43:43:21:f3:66:fc:f3:fc:62:d1:50:de:f1:68:f1:3c:01:0f:b3:4b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 206150bcdcc2e1b5bb03cd27d5d5654bf2370913 579f76a1158d77cf22b66ed748dc9724f4b44dc0 81ef243d2318efa361e18ba2fe669313b2709d46 ce65a342b1d0f2675e286d9e470f134f1ea6fbe5 6a119bbe174ae2efd204d7e8eb3a8ea574827f71 72fe941388b6ae55d1ae0806558ce7ceba98e0b6 34905c30700391b6cdfcc168bcbace5674b4fbc9 04dddd8a9b047cc343edb3e3dd74024b140b474c c80e6fc67d6e2d274c30fa64c12b2c4cb935fbd3 03ed4ebb236b0d4238f4a31a361bffe5fba4ac28 074c04a10266c8c7f396a8498c5e175c5c1e4630 ab9604d950b3617db64ff9b16c42306e87d5764a d29a22f27a214a0f8fe1ccb1cbadba3836fdf9d1 311829b62da204df9c16ad1bf4ef156d63ae334e 320fbc0f6c790dd9925daf4a6b93b017b7330f56 6b6ae02e324a1dd4df01bd495003879b19993b11 77ff379a6228926d5957b1e1a21f673564010aab b02dc8c2a407e19eb075b479cad1a055906b5b7c 08158bcf8f4e8da92b7e17b3bbd59e082afb91d6 181d8218 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [53:96:a1:bf:76:79:fb:e6:4a:a0:74:09:20:d9:e7:5d:61:d1:bd:bf] modulus: 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 public exponent: 10001 ] 2022-08-27 04:52:56.687  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-08-27 04:52:56.691 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-08-27 04:52:56.693 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-08-27 04:52:56.696 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-08-27 04:52:56.696  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-08-27 04:52:56.697  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-08-27 04:52:56.697  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-08-27 04:52:56.698 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-08-27 04:52:56.698 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-08-27 04:52:56.699 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-08-27 04:52:56.704 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-08-27 04:52:56.705 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-08-27 04:52:56.706 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-08-27 04:52:56.706 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-08-27 04:52:56.907  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-08-27 04:52:56.907  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-08-27 04:52:56.908 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-08-27 04:52:56.908 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-08-27 04:52:56.909  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-08-27 04:52:56.909  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-08-27 04:52:56.910 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-08-27 04:52:56.910 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-08-27 04:52:56.910 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-08-27 04:52:56.911 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-08-27 04:52:56.911 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-08-27 04:52:56.911 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-08-27 04:52:56.912 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-08-27 04:52:56.912 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-08-27 04:52:56.912 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-08-27 04:52:56.913 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-08-27 04:52:56.916 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 291245826574274115909654474748073021117287577791 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Aug 27 03:05:36 UTC 2022 Final Date: Thu Aug 26 03:05:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [43:43:21:f3:66:fc:f3:fc:62:d1:50:de:f1:68:f1:3c:01:0f:b3:4b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 206150bcdcc2e1b5bb03cd27d5d5654bf2370913 579f76a1158d77cf22b66ed748dc9724f4b44dc0 81ef243d2318efa361e18ba2fe669313b2709d46 ce65a342b1d0f2675e286d9e470f134f1ea6fbe5 6a119bbe174ae2efd204d7e8eb3a8ea574827f71 72fe941388b6ae55d1ae0806558ce7ceba98e0b6 34905c30700391b6cdfcc168bcbace5674b4fbc9 04dddd8a9b047cc343edb3e3dd74024b140b474c c80e6fc67d6e2d274c30fa64c12b2c4cb935fbd3 03ed4ebb236b0d4238f4a31a361bffe5fba4ac28 074c04a10266c8c7f396a8498c5e175c5c1e4630 ab9604d950b3617db64ff9b16c42306e87d5764a d29a22f27a214a0f8fe1ccb1cbadba3836fdf9d1 311829b62da204df9c16ad1bf4ef156d63ae334e 320fbc0f6c790dd9925daf4a6b93b017b7330f56 6b6ae02e324a1dd4df01bd495003879b19993b11 77ff379a6228926d5957b1e1a21f673564010aab b02dc8c2a407e19eb075b479cad1a055906b5b7c 08158bcf8f4e8da92b7e17b3bbd59e082afb91d6 181d8218 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f0:7f:b7:5e:f0:0d:ec:9e:1e:2d:e0:5c:4a:a0:47:bb:e1:6b:f6:d8] modulus: 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 public exponent: 10001 ] 2022-08-27 04:57:22.247  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-08-27 04:57:22.249 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-08-27 04:57:22.251 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-08-27 04:57:22.251 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-08-27 04:57:22.252  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-08-27 04:57:22.252  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-08-27 04:57:22.253  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-08-27 04:57:22.253 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-08-27 04:57:22.253 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-08-27 04:57:22.253 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-08-27 04:57:22.258 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-08-27 04:57:22.259 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-08-27 04:57:22.259 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-08-27 04:57:22.259 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-08-27 04:57:22.413  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-08-27 04:57:22.414  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-08-27 04:57:22.414 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-08-27 04:57:22.414 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-08-27 04:57:22.415  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-08-27 04:57:22.416  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-08-27 04:57:22.416 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-08-27 04:57:22.416 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-08-27 04:57:22.417 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-08-27 04:57:22.417 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-08-27 04:57:22.418 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-08-27 04:57:22.418 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-08-27 04:57:22.418 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-08-27 04:57:22.418 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-08-27 04:57:22.419 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-08-27 04:57:22.419 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-08-27 04:57:22.423 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 291245826574274115909654474748073021117287577791 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Aug 27 03:05:36 UTC 2022 Final Date: Thu Aug 26 03:05:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [43:43:21:f3:66:fc:f3:fc:62:d1:50:de:f1:68:f1:3c:01:0f:b3:4b] modulus: e4414adf68ff1d2c6d71df6262da272cbb3ff7491e0e98b199363594748fbfbddc55e85074ce8d6ec51fa9b170a752e98266bc933f20360f3ec47eabe0ed3bc20773f0aca5e3ecb420e1531bdfb728aeb49ea160f090f00593f26848e9286133e7c14961eaaa3b6e5f81cca09428cf7ba6bcb9ef6acbffe035d8e0d5a57d97bd81bc2488642e7d2c99895113ffcbf1874f57d8964654f46dc86f6d203378ac6a3b5744a80ee2e6c10abb47f1ebeb1f2f0adde31a52a373682c08014147f188b8b419635109600d95324c13abe7dc4a9fc858083f911669deaaf713a894b6a53b7609b372762cab90124450dd7d4ee5fa591dcf46745d0d20867794bd3cf7d3243c4e83c14e4cca469fec805454b8ba7dc85f1d95f8ba092ea98f523acbe019167f8f55e9ed4ac584b0dc369dfbc43af0a745d9dbbdc78ef9c68ee7a6e26d2315285c9b347f7e9f592ed8f110ef12888f7227240c38656b4bbc957a0a86c309910a04c70c29e1f19ec7f6326e41e425c34fd69a633e8da9d70acb9d5548058507 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 206150bcdcc2e1b5bb03cd27d5d5654bf2370913 579f76a1158d77cf22b66ed748dc9724f4b44dc0 81ef243d2318efa361e18ba2fe669313b2709d46 ce65a342b1d0f2675e286d9e470f134f1ea6fbe5 6a119bbe174ae2efd204d7e8eb3a8ea574827f71 72fe941388b6ae55d1ae0806558ce7ceba98e0b6 34905c30700391b6cdfcc168bcbace5674b4fbc9 04dddd8a9b047cc343edb3e3dd74024b140b474c c80e6fc67d6e2d274c30fa64c12b2c4cb935fbd3 03ed4ebb236b0d4238f4a31a361bffe5fba4ac28 074c04a10266c8c7f396a8498c5e175c5c1e4630 ab9604d950b3617db64ff9b16c42306e87d5764a d29a22f27a214a0f8fe1ccb1cbadba3836fdf9d1 311829b62da204df9c16ad1bf4ef156d63ae334e 320fbc0f6c790dd9925daf4a6b93b017b7330f56 6b6ae02e324a1dd4df01bd495003879b19993b11 77ff379a6228926d5957b1e1a21f673564010aab b02dc8c2a407e19eb075b479cad1a055906b5b7c 08158bcf8f4e8da92b7e17b3bbd59e082afb91d6 181d8218 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [03:8c:63:c7:b2:28:29:44:e9:54:d7:10:33:9f:e2:89:c8:b7:39:b7] modulus: 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 public exponent: 10001 ] 2022-08-27 05:02:37.111  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-08-27 05:02:37.113 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-08-27 05:02:37.115 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-08-27 05:02:37.116 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-08-27 05:02:37.117  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-08-27 05:02:37.117  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-08-27 05:02:37.118  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-08-27 05:02:37.118 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-08-27 05:02:37.119 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-08-27 05:02:37.119 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-08-27 05:02:37.124 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-08-27 05:02:37.125 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-08-27 05:02:37.125 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-08-27 05:02:37.126 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-08-27 05:02:37.302  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-08-27 05:02:37.303  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-08-27 05:02:37.303 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-08-27 05:02:37.303 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-08-27 05:02:37.305  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-08-27 05:02:37.305  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-08-27 05:02:37.306 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-08-27 05:02:37.306 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-08-27 05:02:37.306 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-08-27 05:02:37.307 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-08-27 05:02:37.308 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-08-27 05:02:37.308 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-08-27 05:02:37.309 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-08-27 05:02:37.309 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-08-27 05:02:37.309 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-08-27 05:02:37.310 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-08-27 05:02:37.315 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 291245826574274115909654474748073021117287577791 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Aug 27 03:05:36 UTC 2022 Final Date: Thu Aug 26 03:05:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [43:43:21:f3:66:fc:f3:fc:62:d1:50:de:f1:68:f1:3c:01:0f:b3:4b] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 206150bcdcc2e1b5bb03cd27d5d5654bf2370913 579f76a1158d77cf22b66ed748dc9724f4b44dc0 81ef243d2318efa361e18ba2fe669313b2709d46 ce65a342b1d0f2675e286d9e470f134f1ea6fbe5 6a119bbe174ae2efd204d7e8eb3a8ea574827f71 72fe941388b6ae55d1ae0806558ce7ceba98e0b6 34905c30700391b6cdfcc168bcbace5674b4fbc9 04dddd8a9b047cc343edb3e3dd74024b140b474c c80e6fc67d6e2d274c30fa64c12b2c4cb935fbd3 03ed4ebb236b0d4238f4a31a361bffe5fba4ac28 074c04a10266c8c7f396a8498c5e175c5c1e4630 ab9604d950b3617db64ff9b16c42306e87d5764a d29a22f27a214a0f8fe1ccb1cbadba3836fdf9d1 311829b62da204df9c16ad1bf4ef156d63ae334e 320fbc0f6c790dd9925daf4a6b93b017b7330f56 6b6ae02e324a1dd4df01bd495003879b19993b11 77ff379a6228926d5957b1e1a21f673564010aab b02dc8c2a407e19eb075b479cad1a055906b5b7c 08158bcf8f4e8da92b7e17b3bbd59e082afb91d6 181d8218 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [40:a2:27:94:41:ae:4c:0e:31:13:fe:db:1d:66:50:c9:1a:26:c5:a4] modulus: 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 public exponent: 10001 ] 2022-08-27 05:07:14.213  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-08-27 05:07:14.217 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-08-27 05:07:14.219 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-08-27 05:07:14.221 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-08-27 05:07:14.222  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-08-27 05:07:14.222  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-08-27 05:07:14.223  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-08-27 05:07:14.223 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-08-27 05:07:14.224 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-08-27 05:07:14.224 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-08-27 05:07:14.230 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-08-27 05:07:14.231 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-08-27 05:07:14.232 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-08-27 05:07:14.232 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-08-27 05:07:14.517  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-08-27 05:07:14.519  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-08-27 05:07:14.519 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-08-27 05:07:14.520 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-08-27 05:07:14.521  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-08-27 05:07:14.522  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-08-27 05:07:14.522 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-08-27 05:07:14.523 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-08-27 05:07:14.523 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-08-27 05:07:14.541 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-08-27 05:07:14.541 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-08-27 05:07:14.541 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-08-27 05:07:14.542 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-08-27 05:07:14.542 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-08-27 05:07:14.542 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-08-27 05:07:14.543 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-08-27 05:07:14.547 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 291245826574274115909654474748073021117287577791 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Aug 27 03:05:36 UTC 2022 Final Date: Thu Aug 26 03:05:35 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [43:43:21:f3:66:fc:f3:fc:62:d1:50:de:f1:68:f1:3c:01:0f:b3:4b] modulus: e4414adf68ff1d2c6d71df6262da272cbb3ff7491e0e98b199363594748fbfbddc55e85074ce8d6ec51fa9b170a752e98266bc933f20360f3ec47eabe0ed3bc20773f0aca5e3ecb420e1531bdfb728aeb49ea160f090f00593f26848e9286133e7c14961eaaa3b6e5f81cca09428cf7ba6bcb9ef6acbffe035d8e0d5a57d97bd81bc2488642e7d2c99895113ffcbf1874f57d8964654f46dc86f6d203378ac6a3b5744a80ee2e6c10abb47f1ebeb1f2f0adde31a52a373682c08014147f188b8b419635109600d95324c13abe7dc4a9fc858083f911669deaaf713a894b6a53b7609b372762cab90124450dd7d4ee5fa591dcf46745d0d20867794bd3cf7d3243c4e83c14e4cca469fec805454b8ba7dc85f1d95f8ba092ea98f523acbe019167f8f55e9ed4ac584b0dc369dfbc43af0a745d9dbbdc78ef9c68ee7a6e26d2315285c9b347f7e9f592ed8f110ef12888f7227240c38656b4bbc957a0a86c309910a04c70c29e1f19ec7f6326e41e425c34fd69a633e8da9d70acb9d5548058507 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 206150bcdcc2e1b5bb03cd27d5d5654bf2370913 579f76a1158d77cf22b66ed748dc9724f4b44dc0 81ef243d2318efa361e18ba2fe669313b2709d46 ce65a342b1d0f2675e286d9e470f134f1ea6fbe5 6a119bbe174ae2efd204d7e8eb3a8ea574827f71 72fe941388b6ae55d1ae0806558ce7ceba98e0b6 34905c30700391b6cdfcc168bcbace5674b4fbc9 04dddd8a9b047cc343edb3e3dd74024b140b474c c80e6fc67d6e2d274c30fa64c12b2c4cb935fbd3 03ed4ebb236b0d4238f4a31a361bffe5fba4ac28 074c04a10266c8c7f396a8498c5e175c5c1e4630 ab9604d950b3617db64ff9b16c42306e87d5764a d29a22f27a214a0f8fe1ccb1cbadba3836fdf9d1 311829b62da204df9c16ad1bf4ef156d63ae334e 320fbc0f6c790dd9925daf4a6b93b017b7330f56 6b6ae02e324a1dd4df01bd495003879b19993b11 77ff379a6228926d5957b1e1a21f673564010aab b02dc8c2a407e19eb075b479cad1a055906b5b7c 08158bcf8f4e8da92b7e17b3bbd59e082afb91d6 181d8218 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [db:84:72:82:c6:5a:d0:6f:34:fe:f3:76:aa:ec:a7:fe:26:77:0e:99] modulus: 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 public exponent: 10001 ]