2022-04-01 04:59:27,425 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-04-01 04:59:28,569 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-04-01 04:59:29.337  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Apr 01, 2022 4:59:31 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Apr 01, 2022 4:59:31 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Apr 01, 2022 4:59:31 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Apr 01, 2022 4:59:31 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-04-01 04:59:32.211 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-04-01 04:59:32.500  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-04-01 04:59:32.674  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-04-01 04:59:33.458 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-04-01 04:59:33.461 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-04-01 04:59:33.463 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-04-01 04:59:33.467 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-04-01 04:59:33.508 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-04-01 04:59:33.512 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-04-01 04:59:33.637 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-04-01 04:59:34.341 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Apr 01, 2022 4:59:34 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-04-01 04:59:35.203  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 8.657 seconds (JVM running for 10.52) Apr 01, 2022 5:00:02 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-04-01 05:00:30.819  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-01 05:00:30.831 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-01 05:00:30.888 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-04-01 05:00:30.894 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-01 05:00:30.930  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-04-01 05:00:30.935  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-01 05:00:30.937  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-01 05:00:30.939 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-01 05:00:30.939 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-01 05:00:30.945 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-01 05:00:30.952 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-01 05:00:30.956 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-01 05:00:30.998 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-01 05:00:31.014 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-01 05:00:31.015 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-01 05:00:31.020 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-01 05:00:31.728  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-01 05:00:31.731  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-01 05:00:31.732 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-01 05:00:31.734 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-01 05:00:31.748  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-01 05:00:31.749  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-01 05:00:31.750 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-01 05:00:31.750 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-01 05:00:31.751 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-01 05:00:31.765 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-01 05:00:31.766 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-01 05:00:31.766 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-01 05:00:31.773 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-01 05:00:31.773 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-01 05:00:31.774 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-01 05:00:31.776 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-01 05:00:31.812 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 419976620763646229154180093432372525734247167730 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 01 04:56:54 UTC 2022 Final Date: Wed Mar 31 04:56:53 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6d:69:46:ec:4a:5a:2b:3a:8e:a0:c8:ce:e2:ca:1e:f9:89:a6:25:bb] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: ad8018163a58deb0129ecd9a5066fc26da17d5c8 f06f63dcbc530efb29ec9a8f7ff5199c583972f8 a241580eac7c11e44657e2cb526f93d54ede5e94 4834f1b3077a57d2133a984a9dc4339b71202cfc be991e98c68b43d8af7bd26c71cb255f044cf81c 82225bb51a42f8b3aa9393c4084079781849ef74 aaa3026874bbfafcd25660f080c5fe0e3b674f27 32b560aae603b1dcdfcbf9430353bd90d98621ef aa2ae8043b4ef6eff3423fd56de139b875da5ddd 69db147cc469743baa35b6512ea63e73ff29d01c f285bea711b7b9425b6e288daa69336b5b6ce127 f6fce9f70fd9eef94f0bdef64cbe5e65d3d15481 3707bb56b8520e5a8e0e3e5574a0e3a5f2794f38 fd07f6712c6ea9c81dcee8f894f88e1d1b8dd6ab 181b2d4e41ed68df6bc8387da4df4360ddcc9141 2c5053a1f1ebcd4558aea85e4182da7263e68d54 d0543e6eed380cd92e8b645439b5a091087f47bf 313855be52738e58d9fd24b2152960eff3927918 00abf95e6894230791d07bb0908550aa73432c88 18034a32 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6c:2c:a9:1f:4d:11:c0:45:36:26:50:32:d5:22:ac:fd:35:e3:7d:ad] modulus: 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 public exponent: 10001 ] 2022-04-01 07:33:34.176  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-01 07:33:34.180 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-01 07:33:34.184 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-01 07:33:34.185 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-01 07:33:34.186  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-01 07:33:34.187  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-01 07:33:34.187  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-01 07:33:34.188 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-01 07:33:34.188 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-01 07:33:34.189 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-01 07:33:34.220 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-01 07:33:34.223 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-01 07:33:34.224 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-01 07:33:34.224 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-01 07:33:34.452  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-01 07:33:34.453  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-01 07:33:34.454 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-01 07:33:34.454 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-01 07:33:34.458  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-01 07:33:34.458  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-01 07:33:34.459 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-01 07:33:34.459 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-01 07:33:34.460 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-01 07:33:34.461 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-01 07:33:34.462 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-01 07:33:34.462 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-01 07:33:34.463 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-01 07:33:34.464 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-01 07:33:34.464 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-01 07:33:34.466 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-01 07:33:34.471 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 419976620763646229154180093432372525734247167730 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 01 04:56:54 UTC 2022 Final Date: Wed Mar 31 04:56:53 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6d:69:46:ec:4a:5a:2b:3a:8e:a0:c8:ce:e2:ca:1e:f9:89:a6:25:bb] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: ad8018163a58deb0129ecd9a5066fc26da17d5c8 f06f63dcbc530efb29ec9a8f7ff5199c583972f8 a241580eac7c11e44657e2cb526f93d54ede5e94 4834f1b3077a57d2133a984a9dc4339b71202cfc be991e98c68b43d8af7bd26c71cb255f044cf81c 82225bb51a42f8b3aa9393c4084079781849ef74 aaa3026874bbfafcd25660f080c5fe0e3b674f27 32b560aae603b1dcdfcbf9430353bd90d98621ef aa2ae8043b4ef6eff3423fd56de139b875da5ddd 69db147cc469743baa35b6512ea63e73ff29d01c f285bea711b7b9425b6e288daa69336b5b6ce127 f6fce9f70fd9eef94f0bdef64cbe5e65d3d15481 3707bb56b8520e5a8e0e3e5574a0e3a5f2794f38 fd07f6712c6ea9c81dcee8f894f88e1d1b8dd6ab 181b2d4e41ed68df6bc8387da4df4360ddcc9141 2c5053a1f1ebcd4558aea85e4182da7263e68d54 d0543e6eed380cd92e8b645439b5a091087f47bf 313855be52738e58d9fd24b2152960eff3927918 00abf95e6894230791d07bb0908550aa73432c88 18034a32 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5a:75:8f:de:12:7b:05:b0:cf:20:0e:f5:18:ee:2e:1a:6d:e1:3a:1e] modulus: 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 public exponent: 10001 ] 2022-04-01 07:35:22.001  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-01 07:35:22.003 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-01 07:35:22.004 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-04-01 07:35:22.005 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-01 07:35:22.006  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-04-01 07:35:22.007  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-01 07:35:22.007  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-01 07:35:22.007 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-01 07:35:22.008 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-01 07:35:22.009 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-01 07:35:22.016 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-01 07:35:22.017 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-01 07:35:22.017 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-01 07:35:22.018 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-01 07:35:22.167  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-01 07:35:22.167  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-01 07:35:22.168 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-01 07:35:22.168 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-01 07:35:22.170  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-01 07:35:22.171  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-01 07:35:22.171 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-01 07:35:22.172 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-01 07:35:22.172 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-01 07:35:22.173 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-01 07:35:22.173 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-01 07:35:22.174 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-01 07:35:22.175 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-01 07:35:22.175 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-01 07:35:22.175 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-01 07:35:22.176 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-01 07:35:22.180 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 419976620763646229154180093432372525734247167730 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 01 04:56:54 UTC 2022 Final Date: Wed Mar 31 04:56:53 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6d:69:46:ec:4a:5a:2b:3a:8e:a0:c8:ce:e2:ca:1e:f9:89:a6:25:bb] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: ad8018163a58deb0129ecd9a5066fc26da17d5c8 f06f63dcbc530efb29ec9a8f7ff5199c583972f8 a241580eac7c11e44657e2cb526f93d54ede5e94 4834f1b3077a57d2133a984a9dc4339b71202cfc be991e98c68b43d8af7bd26c71cb255f044cf81c 82225bb51a42f8b3aa9393c4084079781849ef74 aaa3026874bbfafcd25660f080c5fe0e3b674f27 32b560aae603b1dcdfcbf9430353bd90d98621ef aa2ae8043b4ef6eff3423fd56de139b875da5ddd 69db147cc469743baa35b6512ea63e73ff29d01c f285bea711b7b9425b6e288daa69336b5b6ce127 f6fce9f70fd9eef94f0bdef64cbe5e65d3d15481 3707bb56b8520e5a8e0e3e5574a0e3a5f2794f38 fd07f6712c6ea9c81dcee8f894f88e1d1b8dd6ab 181b2d4e41ed68df6bc8387da4df4360ddcc9141 2c5053a1f1ebcd4558aea85e4182da7263e68d54 d0543e6eed380cd92e8b645439b5a091087f47bf 313855be52738e58d9fd24b2152960eff3927918 00abf95e6894230791d07bb0908550aa73432c88 18034a32 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9d:03:65:68:8f:31:e9:01:a1:47:b4:12:9f:99:2f:c7:04:0d:0d:af] modulus: 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 public exponent: 10001 ] 2022-04-01 07:36:35.282  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-01 07:36:35.283 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-01 07:36:35.286 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-04-01 07:36:35.287 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-01 07:36:35.287  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-04-01 07:36:35.288  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-01 07:36:35.289  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-01 07:36:35.289 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-01 07:36:35.290 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-01 07:36:35.291 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-01 07:36:35.298 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-01 07:36:35.299 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-01 07:36:35.299 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-01 07:36:35.300 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-01 07:36:35.462  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-01 07:36:35.463  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-01 07:36:35.463 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-01 07:36:35.464 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-01 07:36:35.466  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-01 07:36:35.466  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-01 07:36:35.467 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-01 07:36:35.467 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-01 07:36:35.468 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-01 07:36:35.468 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-01 07:36:35.469 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-01 07:36:35.469 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-01 07:36:35.470 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-01 07:36:35.470 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-01 07:36:35.471 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-01 07:36:35.472 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-01 07:36:35.476 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 419976620763646229154180093432372525734247167730 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 01 04:56:54 UTC 2022 Final Date: Wed Mar 31 04:56:53 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6d:69:46:ec:4a:5a:2b:3a:8e:a0:c8:ce:e2:ca:1e:f9:89:a6:25:bb] modulus: ed64f3c1a838e016638021f296f4d5822106aa492c02c629cb12841b086cb1249c9a28e7e69347245541b61386a20b69cecb39b5a5c1defccfaa60659303247945229bbeba03abf8de0b4310bd3050816a80cb318a7a642c963d0198fb72bf15a5ac33fe1e7ce703c413de5c9dbcaff61900a52db01cab81081a5e35fd0ab408a0c3f07b85fef6ca0cfb4675b21ae8c065f4af4c05403798192610f37ab777391b00b8b744f8c6ea6ee3481ef51b4d2d1744d4eb92080ec008602656ba626f573ef950fe2b81e85312c5b900f30f674668993c285b368aed7de66f34320ad9ec2c68b3f86cd7d1c08639d79616bf758b7845473e83eafe9d095647d8472ea56dbd59c022907afa7e31013295d9f32e8b853a2e8e7d960216a5b380549378ccb3206b308734abff825c38c27377ebc4f395be656cc522aa799abd03f886f03fba9eb390bbcfaf4ab0bdeb9af2ada9fcb0886c0e50ebfe9142dc9381e52d6e28dacebce8b06936dd2ebab0e5200d87a9c91bf40d36cd90996bd029c252d88514a9 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: ad8018163a58deb0129ecd9a5066fc26da17d5c8 f06f63dcbc530efb29ec9a8f7ff5199c583972f8 a241580eac7c11e44657e2cb526f93d54ede5e94 4834f1b3077a57d2133a984a9dc4339b71202cfc be991e98c68b43d8af7bd26c71cb255f044cf81c 82225bb51a42f8b3aa9393c4084079781849ef74 aaa3026874bbfafcd25660f080c5fe0e3b674f27 32b560aae603b1dcdfcbf9430353bd90d98621ef aa2ae8043b4ef6eff3423fd56de139b875da5ddd 69db147cc469743baa35b6512ea63e73ff29d01c f285bea711b7b9425b6e288daa69336b5b6ce127 f6fce9f70fd9eef94f0bdef64cbe5e65d3d15481 3707bb56b8520e5a8e0e3e5574a0e3a5f2794f38 fd07f6712c6ea9c81dcee8f894f88e1d1b8dd6ab 181b2d4e41ed68df6bc8387da4df4360ddcc9141 2c5053a1f1ebcd4558aea85e4182da7263e68d54 d0543e6eed380cd92e8b645439b5a091087f47bf 313855be52738e58d9fd24b2152960eff3927918 00abf95e6894230791d07bb0908550aa73432c88 18034a32 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [33:f9:af:ef:44:83:a7:07:3b:44:1b:55:17:e5:fb:e4:46:b0:33:5b] modulus: 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 public exponent: 10001 ] 2022-04-01 07:37:55.489  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-01 07:37:55.491 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-01 07:37:55.493 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-01 07:37:55.494 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-01 07:37:55.495  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-01 07:37:55.496  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-01 07:37:55.497  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-01 07:37:55.498 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-01 07:37:55.498 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-01 07:37:55.499 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-01 07:37:55.506 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-01 07:37:55.507 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-01 07:37:55.507 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-01 07:37:55.508 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-01 07:37:55.668  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-01 07:37:55.669  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-01 07:37:55.670 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-01 07:37:55.670 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-01 07:37:55.673  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-01 07:37:55.675  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-01 07:37:55.677 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-01 07:37:55.678 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-01 07:37:55.678 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-01 07:37:55.679 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-01 07:37:55.679 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-01 07:37:55.680 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-01 07:37:55.681 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-01 07:37:55.682 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-01 07:37:55.682 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-01 07:37:55.683 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-01 07:37:55.688 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 419976620763646229154180093432372525734247167730 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 01 04:56:54 UTC 2022 Final Date: Wed Mar 31 04:56:53 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6d:69:46:ec:4a:5a:2b:3a:8e:a0:c8:ce:e2:ca:1e:f9:89:a6:25:bb] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: ad8018163a58deb0129ecd9a5066fc26da17d5c8 f06f63dcbc530efb29ec9a8f7ff5199c583972f8 a241580eac7c11e44657e2cb526f93d54ede5e94 4834f1b3077a57d2133a984a9dc4339b71202cfc be991e98c68b43d8af7bd26c71cb255f044cf81c 82225bb51a42f8b3aa9393c4084079781849ef74 aaa3026874bbfafcd25660f080c5fe0e3b674f27 32b560aae603b1dcdfcbf9430353bd90d98621ef aa2ae8043b4ef6eff3423fd56de139b875da5ddd 69db147cc469743baa35b6512ea63e73ff29d01c f285bea711b7b9425b6e288daa69336b5b6ce127 f6fce9f70fd9eef94f0bdef64cbe5e65d3d15481 3707bb56b8520e5a8e0e3e5574a0e3a5f2794f38 fd07f6712c6ea9c81dcee8f894f88e1d1b8dd6ab 181b2d4e41ed68df6bc8387da4df4360ddcc9141 2c5053a1f1ebcd4558aea85e4182da7263e68d54 d0543e6eed380cd92e8b645439b5a091087f47bf 313855be52738e58d9fd24b2152960eff3927918 00abf95e6894230791d07bb0908550aa73432c88 18034a32 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ea:04:95:90:f6:25:77:0d:4a:82:0d:4a:b9:3e:ab:3d:f9:8d:f7:32] modulus: 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 public exponent: 10001 ] 2022-04-01 07:40:14.942  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-01 07:40:14.945 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-01 07:40:14.948 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-01 07:40:14.949 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-01 07:40:14.951  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-01 07:40:14.952  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-01 07:40:14.953  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-01 07:40:14.954 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-01 07:40:14.955 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-01 07:40:14.955 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-01 07:40:14.964 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-01 07:40:14.965 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-01 07:40:14.966 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-01 07:40:14.966 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-01 07:40:15.148  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-01 07:40:15.149  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-01 07:40:15.150 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-01 07:40:15.150 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-01 07:40:15.152  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-01 07:40:15.153  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-01 07:40:15.154 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-01 07:40:15.154 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-01 07:40:15.155 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-01 07:40:15.156 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-01 07:40:15.157 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-01 07:40:15.157 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-01 07:40:15.159 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-01 07:40:15.160 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-01 07:40:15.161 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-01 07:40:15.162 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-01 07:40:15.168 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 419976620763646229154180093432372525734247167730 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 01 04:56:54 UTC 2022 Final Date: Wed Mar 31 04:56:53 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6d:69:46:ec:4a:5a:2b:3a:8e:a0:c8:ce:e2:ca:1e:f9:89:a6:25:bb] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: ad8018163a58deb0129ecd9a5066fc26da17d5c8 f06f63dcbc530efb29ec9a8f7ff5199c583972f8 a241580eac7c11e44657e2cb526f93d54ede5e94 4834f1b3077a57d2133a984a9dc4339b71202cfc be991e98c68b43d8af7bd26c71cb255f044cf81c 82225bb51a42f8b3aa9393c4084079781849ef74 aaa3026874bbfafcd25660f080c5fe0e3b674f27 32b560aae603b1dcdfcbf9430353bd90d98621ef aa2ae8043b4ef6eff3423fd56de139b875da5ddd 69db147cc469743baa35b6512ea63e73ff29d01c f285bea711b7b9425b6e288daa69336b5b6ce127 f6fce9f70fd9eef94f0bdef64cbe5e65d3d15481 3707bb56b8520e5a8e0e3e5574a0e3a5f2794f38 fd07f6712c6ea9c81dcee8f894f88e1d1b8dd6ab 181b2d4e41ed68df6bc8387da4df4360ddcc9141 2c5053a1f1ebcd4558aea85e4182da7263e68d54 d0543e6eed380cd92e8b645439b5a091087f47bf 313855be52738e58d9fd24b2152960eff3927918 00abf95e6894230791d07bb0908550aa73432c88 18034a32 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [04:e5:84:32:83:c4:6d:6a:2e:e3:ca:1f:94:96:57:6d:06:0c:76:38] modulus: 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 public exponent: 10001 ] 2022-04-01 07:43:05.212  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-01 07:43:05.214 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-01 07:43:05.215 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-01 07:43:05.216 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-01 07:43:05.216  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-01 07:43:05.217  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-01 07:43:05.218  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-01 07:43:05.218 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-01 07:43:05.219 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-01 07:43:05.219 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-01 07:43:05.224 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-01 07:43:05.225 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-01 07:43:05.225 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-01 07:43:05.225 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-01 07:43:05.376  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-01 07:43:05.377  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-01 07:43:05.377 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-01 07:43:05.378 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-01 07:43:05.380  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-01 07:43:05.380  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-01 07:43:05.381 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-01 07:43:05.381 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-01 07:43:05.381 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-01 07:43:05.383 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-01 07:43:05.383 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-01 07:43:05.384 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-01 07:43:05.385 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-01 07:43:05.386 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-01 07:43:05.386 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-01 07:43:05.388 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-01 07:43:05.393 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 419976620763646229154180093432372525734247167730 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 01 04:56:54 UTC 2022 Final Date: Wed Mar 31 04:56:53 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6d:69:46:ec:4a:5a:2b:3a:8e:a0:c8:ce:e2:ca:1e:f9:89:a6:25:bb] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: ad8018163a58deb0129ecd9a5066fc26da17d5c8 f06f63dcbc530efb29ec9a8f7ff5199c583972f8 a241580eac7c11e44657e2cb526f93d54ede5e94 4834f1b3077a57d2133a984a9dc4339b71202cfc be991e98c68b43d8af7bd26c71cb255f044cf81c 82225bb51a42f8b3aa9393c4084079781849ef74 aaa3026874bbfafcd25660f080c5fe0e3b674f27 32b560aae603b1dcdfcbf9430353bd90d98621ef aa2ae8043b4ef6eff3423fd56de139b875da5ddd 69db147cc469743baa35b6512ea63e73ff29d01c f285bea711b7b9425b6e288daa69336b5b6ce127 f6fce9f70fd9eef94f0bdef64cbe5e65d3d15481 3707bb56b8520e5a8e0e3e5574a0e3a5f2794f38 fd07f6712c6ea9c81dcee8f894f88e1d1b8dd6ab 181b2d4e41ed68df6bc8387da4df4360ddcc9141 2c5053a1f1ebcd4558aea85e4182da7263e68d54 d0543e6eed380cd92e8b645439b5a091087f47bf 313855be52738e58d9fd24b2152960eff3927918 00abf95e6894230791d07bb0908550aa73432c88 18034a32 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f9:4f:9a:f9:68:09:d6:c0:d2:ae:ef:19:16:00:e7:7b:8c:49:c3:19] modulus: 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 public exponent: 10001 ] 2022-04-01 07:46:43.660  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-01 07:46:43.661 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-01 07:46:43.663 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-01 07:46:43.664 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-01 07:46:43.664  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-01 07:46:43.669  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-01 07:46:43.670  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-01 07:46:43.670 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-01 07:46:43.670 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-01 07:46:43.671 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-01 07:46:43.688 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-01 07:46:43.695 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-01 07:46:43.695 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-01 07:46:43.696 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-01 07:46:43.965  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-01 07:46:43.966  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-01 07:46:43.966 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-01 07:46:43.966 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-01 07:46:43.968  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-01 07:46:43.968  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-01 07:46:43.969 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-01 07:46:43.969 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-01 07:46:43.969 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-01 07:46:43.970 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-01 07:46:43.970 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-01 07:46:43.971 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-01 07:46:43.971 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-01 07:46:43.972 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-01 07:46:43.972 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-01 07:46:43.973 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-01 07:46:43.976 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 419976620763646229154180093432372525734247167730 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 01 04:56:54 UTC 2022 Final Date: Wed Mar 31 04:56:53 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6d:69:46:ec:4a:5a:2b:3a:8e:a0:c8:ce:e2:ca:1e:f9:89:a6:25:bb] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: ad8018163a58deb0129ecd9a5066fc26da17d5c8 f06f63dcbc530efb29ec9a8f7ff5199c583972f8 a241580eac7c11e44657e2cb526f93d54ede5e94 4834f1b3077a57d2133a984a9dc4339b71202cfc be991e98c68b43d8af7bd26c71cb255f044cf81c 82225bb51a42f8b3aa9393c4084079781849ef74 aaa3026874bbfafcd25660f080c5fe0e3b674f27 32b560aae603b1dcdfcbf9430353bd90d98621ef aa2ae8043b4ef6eff3423fd56de139b875da5ddd 69db147cc469743baa35b6512ea63e73ff29d01c f285bea711b7b9425b6e288daa69336b5b6ce127 f6fce9f70fd9eef94f0bdef64cbe5e65d3d15481 3707bb56b8520e5a8e0e3e5574a0e3a5f2794f38 fd07f6712c6ea9c81dcee8f894f88e1d1b8dd6ab 181b2d4e41ed68df6bc8387da4df4360ddcc9141 2c5053a1f1ebcd4558aea85e4182da7263e68d54 d0543e6eed380cd92e8b645439b5a091087f47bf 313855be52738e58d9fd24b2152960eff3927918 00abf95e6894230791d07bb0908550aa73432c88 18034a32 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e6:5e:cc:6b:b4:14:92:94:56:b1:e4:dd:d9:a8:28:b0:43:17:89:7d] modulus: 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 public exponent: 10001 ]