2022-04-05 08:26:50,636 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-04-05 08:26:51,784 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-04-05 08:26:52.638  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Apr 05, 2022 8:26:55 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Apr 05, 2022 8:26:55 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Apr 05, 2022 8:26:55 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Apr 05, 2022 8:26:55 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-04-05 08:26:55.824 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-04-05 08:26:56.126  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-04-05 08:26:56.324  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-04-05 08:26:57.158 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-04-05 08:26:57.162 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-04-05 08:26:57.163 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-04-05 08:26:57.167 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-04-05 08:26:57.219 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-04-05 08:26:57.224 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-04-05 08:26:57.399 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-04-05 08:26:58.148 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Apr 05, 2022 8:26:58 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-04-05 08:26:59.170  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 9.496 seconds (JVM running for 11.624) Apr 05, 2022 8:27:20 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-04-05 08:27:34.075  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-05 08:27:34.089 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-05 08:27:34.149 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-04-05 08:27:34.156 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-05 08:27:34.187  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-04-05 08:27:34.190  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-05 08:27:34.192  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-05 08:27:34.194 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-05 08:27:34.195 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-05 08:27:34.201 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-05 08:27:34.212 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-05 08:27:34.218 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-05 08:27:34.288 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-05 08:27:34.301 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-05 08:27:34.302 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-05 08:27:34.308 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-05 08:27:36.545  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-05 08:27:36.549  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-05 08:27:36.550 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-05 08:27:36.551 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-05 08:27:36.563  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-05 08:27:36.565  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-05 08:27:36.566 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-05 08:27:36.566 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-05 08:27:36.566 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-05 08:27:36.580 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-05 08:27:36.581 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-05 08:27:36.581 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-05 08:27:36.588 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-05 08:27:36.589 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-05 08:27:36.589 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-05 08:27:36.591 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-05 08:27:36.652 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 468351180683128442763011284744861227675351475670 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Apr 05 08:23:32 UTC 2022 Final Date: Sun Apr 04 08:23:31 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ec:7e:1e:64:a8:96:f4:0b:63:2b:61:e2:06:6a:f9:7b:53:bb:36:0a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8b66a9363ba2c2aac6abe430bdbaebafbc66a736 3c914f6aa9f5c972a31c72cc9eb9c5040e4a0880 02d871cd0a80175ee75fb1364b0fa7e2f3304a76 7ebd29b330ab14075bd6059001e21e977296bb66 7278f4ec7e98a59ee85a96cf72912dcbe2d44f1f b9fda29811567ce46439730935e62de2b9e030bb a8e8c5815c21bcb6409b02f9843f3ce2f7ecd8e3 d018e28c7a38941879e9a645328e7178edfeb388 0ee2478883fc49c67e31f85613f390254486b561 bbb4588e09d0be30f04354e4a52dd4291d914dbc e532b2bd69fb82ad5dab0a8cccd4f4db5c29a2cd d2ebaf1e3a53b2123e1b300ed0af3eb1fa539139 1896e9722f5daea6b064685d48c70731b7c67e04 67d38c68ebc40f1424946c7895cd9df202f0c763 d11218dda215a45fb51bf55e1c7c67cf7d315e55 b5fb602b59f099f84f5a1fc6d9c15911f02cc717 ba289fa71fb5623766b3f5a43e4b2f00d0aafa69 1066194f1a6ba66615aeb7caa4a8f285cc37fce1 53979b361bc91b85161d7a43ab2243abe44a1b3e ef3d1dab Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8c:cf:cb:02:72:1b:d2:78:5b:c3:a5:a0:4c:91:9b:1a:db:2f:d5:98] modulus: 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 public exponent: 10001 ] 2022-04-05 09:34:25.945  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-05 09:34:25.949 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-05 09:34:25.953 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-04-05 09:34:25.955 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-05 09:34:25.956  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-04-05 09:34:25.957  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-05 09:34:25.957  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-05 09:34:25.958 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-05 09:34:25.959 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-05 09:34:25.960 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-05 09:34:25.968 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-05 09:34:25.970 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-05 09:34:25.970 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-05 09:34:25.971 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-05 09:34:26.369  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-05 09:34:26.370  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-05 09:34:26.371 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-05 09:34:26.371 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-05 09:34:26.376  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-05 09:34:26.381  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-05 09:34:26.381 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-05 09:34:26.382 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-05 09:34:26.382 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-05 09:34:26.383 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-05 09:34:26.392 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-05 09:34:26.392 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-05 09:34:26.394 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-05 09:34:26.394 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-05 09:34:26.394 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-05 09:34:26.396 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-05 09:34:26.401 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 468351180683128442763011284744861227675351475670 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Apr 05 08:23:32 UTC 2022 Final Date: Sun Apr 04 08:23:31 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ec:7e:1e:64:a8:96:f4:0b:63:2b:61:e2:06:6a:f9:7b:53:bb:36:0a] modulus: a00ae9107a02194bbac5bb933cbcc64d316f1b09030df62932aad9287cd0d8958553a729fcec920ac8a0d701fb8033b77038d22c8cc24709196bc83ac1cfc6d1e1b3d0cac7377070e91482cca4e8db1a3af3806c0ae9523972ca7c441633b7b0156cc7d34a38f3196ee722ca4a91496fc80fa27075efae5d3e10f5e029dfa9198bb4021405ac0731b661e05f5381f89d5da95caac16c5b9d94f3540b029ca03d113dd0cddc46c422839a909f2f9e0351ec838f322283eeb71e6ee6734559cc695b5df8a6662c5ae097f7229db4d23adbcad6ac843ed0234f34bd5dd961da1b95c09f29bb2302f700b25c5b982491675e5ef305b647e81a3cb9056c6aada826def05dbd540f3473fd09f5f8da8d8ca7e8f6cb6ae0cdc554987d9e145d2c47e9ac10d853e549f67d0aed7950426f401d374e1b11cdab58f067f5b3162b59c706282eecdb526dc1d2211f9dd12f2dec856a3c89515f744596b5ac2c657b5455dd8c4ff77edde1dda64e1f9119cf699548e12e8785fcebf47be6cf6c323d8ad243a3 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8b66a9363ba2c2aac6abe430bdbaebafbc66a736 3c914f6aa9f5c972a31c72cc9eb9c5040e4a0880 02d871cd0a80175ee75fb1364b0fa7e2f3304a76 7ebd29b330ab14075bd6059001e21e977296bb66 7278f4ec7e98a59ee85a96cf72912dcbe2d44f1f b9fda29811567ce46439730935e62de2b9e030bb a8e8c5815c21bcb6409b02f9843f3ce2f7ecd8e3 d018e28c7a38941879e9a645328e7178edfeb388 0ee2478883fc49c67e31f85613f390254486b561 bbb4588e09d0be30f04354e4a52dd4291d914dbc e532b2bd69fb82ad5dab0a8cccd4f4db5c29a2cd d2ebaf1e3a53b2123e1b300ed0af3eb1fa539139 1896e9722f5daea6b064685d48c70731b7c67e04 67d38c68ebc40f1424946c7895cd9df202f0c763 d11218dda215a45fb51bf55e1c7c67cf7d315e55 b5fb602b59f099f84f5a1fc6d9c15911f02cc717 ba289fa71fb5623766b3f5a43e4b2f00d0aafa69 1066194f1a6ba66615aeb7caa4a8f285cc37fce1 53979b361bc91b85161d7a43ab2243abe44a1b3e ef3d1dab Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d0:6a:08:e4:b0:f0:49:3b:2f:eb:d8:64:e5:5f:73:39:07:29:77:0c] modulus: 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 public exponent: 10001 ] 2022-04-05 09:34:55.836  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-05 09:34:55.837 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-05 09:34:55.839 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-05 09:34:55.839 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-05 09:34:55.840  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-05 09:34:55.846  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-05 09:34:55.846  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-05 09:34:55.847 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-05 09:34:55.847 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-05 09:34:55.848 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-05 09:34:55.866 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-05 09:34:55.867 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-05 09:34:55.867 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-05 09:34:55.868 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-05 09:34:56.063  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-05 09:34:56.063  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-05 09:34:56.064 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-05 09:34:56.065 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-05 09:34:56.067  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-05 09:34:56.068  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-05 09:34:56.069 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-05 09:34:56.069 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-05 09:34:56.070 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-05 09:34:56.071 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-05 09:34:56.072 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-05 09:34:56.073 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-05 09:34:56.074 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-05 09:34:56.075 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-05 09:34:56.075 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-05 09:34:56.077 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-05 09:34:56.085 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 468351180683128442763011284744861227675351475670 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Apr 05 08:23:32 UTC 2022 Final Date: Sun Apr 04 08:23:31 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ec:7e:1e:64:a8:96:f4:0b:63:2b:61:e2:06:6a:f9:7b:53:bb:36:0a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8b66a9363ba2c2aac6abe430bdbaebafbc66a736 3c914f6aa9f5c972a31c72cc9eb9c5040e4a0880 02d871cd0a80175ee75fb1364b0fa7e2f3304a76 7ebd29b330ab14075bd6059001e21e977296bb66 7278f4ec7e98a59ee85a96cf72912dcbe2d44f1f b9fda29811567ce46439730935e62de2b9e030bb a8e8c5815c21bcb6409b02f9843f3ce2f7ecd8e3 d018e28c7a38941879e9a645328e7178edfeb388 0ee2478883fc49c67e31f85613f390254486b561 bbb4588e09d0be30f04354e4a52dd4291d914dbc e532b2bd69fb82ad5dab0a8cccd4f4db5c29a2cd d2ebaf1e3a53b2123e1b300ed0af3eb1fa539139 1896e9722f5daea6b064685d48c70731b7c67e04 67d38c68ebc40f1424946c7895cd9df202f0c763 d11218dda215a45fb51bf55e1c7c67cf7d315e55 b5fb602b59f099f84f5a1fc6d9c15911f02cc717 ba289fa71fb5623766b3f5a43e4b2f00d0aafa69 1066194f1a6ba66615aeb7caa4a8f285cc37fce1 53979b361bc91b85161d7a43ab2243abe44a1b3e ef3d1dab Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d6:76:d2:bb:a4:4b:a0:3f:d4:fa:3e:09:b9:34:ba:75:03:03:e6:55] modulus: 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 public exponent: 10001 ] 2022-04-05 09:36:58.276  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-05 09:36:58.278 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-05 09:36:58.280 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-04-05 09:36:58.281 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-05 09:36:58.287  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-04-05 09:36:58.288  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-05 09:36:58.290  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-05 09:36:58.306 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-05 09:36:58.308 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-05 09:36:58.311 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-05 09:36:58.319 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-05 09:36:58.320 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-05 09:36:58.320 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-05 09:36:58.320 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-05 09:36:58.643  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-05 09:36:58.644  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-05 09:36:58.645 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-05 09:36:58.645 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-05 09:36:58.649  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-05 09:36:58.649  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-05 09:36:58.650 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-05 09:36:58.650 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-05 09:36:58.651 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-05 09:36:58.653 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-05 09:36:58.653 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-05 09:36:58.653 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-05 09:36:58.655 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-05 09:36:58.656 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-05 09:36:58.656 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-05 09:36:58.658 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-05 09:36:58.665 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 468351180683128442763011284744861227675351475670 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Apr 05 08:23:32 UTC 2022 Final Date: Sun Apr 04 08:23:31 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ec:7e:1e:64:a8:96:f4:0b:63:2b:61:e2:06:6a:f9:7b:53:bb:36:0a] modulus: a00ae9107a02194bbac5bb933cbcc64d316f1b09030df62932aad9287cd0d8958553a729fcec920ac8a0d701fb8033b77038d22c8cc24709196bc83ac1cfc6d1e1b3d0cac7377070e91482cca4e8db1a3af3806c0ae9523972ca7c441633b7b0156cc7d34a38f3196ee722ca4a91496fc80fa27075efae5d3e10f5e029dfa9198bb4021405ac0731b661e05f5381f89d5da95caac16c5b9d94f3540b029ca03d113dd0cddc46c422839a909f2f9e0351ec838f322283eeb71e6ee6734559cc695b5df8a6662c5ae097f7229db4d23adbcad6ac843ed0234f34bd5dd961da1b95c09f29bb2302f700b25c5b982491675e5ef305b647e81a3cb9056c6aada826def05dbd540f3473fd09f5f8da8d8ca7e8f6cb6ae0cdc554987d9e145d2c47e9ac10d853e549f67d0aed7950426f401d374e1b11cdab58f067f5b3162b59c706282eecdb526dc1d2211f9dd12f2dec856a3c89515f744596b5ac2c657b5455dd8c4ff77edde1dda64e1f9119cf699548e12e8785fcebf47be6cf6c323d8ad243a3 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8b66a9363ba2c2aac6abe430bdbaebafbc66a736 3c914f6aa9f5c972a31c72cc9eb9c5040e4a0880 02d871cd0a80175ee75fb1364b0fa7e2f3304a76 7ebd29b330ab14075bd6059001e21e977296bb66 7278f4ec7e98a59ee85a96cf72912dcbe2d44f1f b9fda29811567ce46439730935e62de2b9e030bb a8e8c5815c21bcb6409b02f9843f3ce2f7ecd8e3 d018e28c7a38941879e9a645328e7178edfeb388 0ee2478883fc49c67e31f85613f390254486b561 bbb4588e09d0be30f04354e4a52dd4291d914dbc e532b2bd69fb82ad5dab0a8cccd4f4db5c29a2cd d2ebaf1e3a53b2123e1b300ed0af3eb1fa539139 1896e9722f5daea6b064685d48c70731b7c67e04 67d38c68ebc40f1424946c7895cd9df202f0c763 d11218dda215a45fb51bf55e1c7c67cf7d315e55 b5fb602b59f099f84f5a1fc6d9c15911f02cc717 ba289fa71fb5623766b3f5a43e4b2f00d0aafa69 1066194f1a6ba66615aeb7caa4a8f285cc37fce1 53979b361bc91b85161d7a43ab2243abe44a1b3e ef3d1dab Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b4:cc:4f:6a:48:8c:d1:f6:d8:1f:57:c1:4d:0b:02:de:b5:af:88:31] modulus: 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 public exponent: 10001 ] 2022-04-05 09:38:19.808  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-05 09:38:19.810 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-05 09:38:19.812 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-04-05 09:38:19.813 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-05 09:38:19.813  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-04-05 09:38:19.814  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-05 09:38:19.814  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-05 09:38:19.815 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-05 09:38:19.815 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-05 09:38:19.816 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-05 09:38:19.823 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-05 09:38:19.825 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-05 09:38:19.825 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-05 09:38:19.825 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-05 09:38:20.105  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-05 09:38:20.105  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-05 09:38:20.106 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-05 09:38:20.106 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-05 09:38:20.112  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-05 09:38:20.112  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-05 09:38:20.113 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-05 09:38:20.113 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-05 09:38:20.114 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-05 09:38:20.115 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-05 09:38:20.115 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-05 09:38:20.115 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-05 09:38:20.121 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-05 09:38:20.121 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-05 09:38:20.122 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-05 09:38:20.129 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-05 09:38:20.140 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 468351180683128442763011284744861227675351475670 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Apr 05 08:23:32 UTC 2022 Final Date: Sun Apr 04 08:23:31 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ec:7e:1e:64:a8:96:f4:0b:63:2b:61:e2:06:6a:f9:7b:53:bb:36:0a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8b66a9363ba2c2aac6abe430bdbaebafbc66a736 3c914f6aa9f5c972a31c72cc9eb9c5040e4a0880 02d871cd0a80175ee75fb1364b0fa7e2f3304a76 7ebd29b330ab14075bd6059001e21e977296bb66 7278f4ec7e98a59ee85a96cf72912dcbe2d44f1f b9fda29811567ce46439730935e62de2b9e030bb a8e8c5815c21bcb6409b02f9843f3ce2f7ecd8e3 d018e28c7a38941879e9a645328e7178edfeb388 0ee2478883fc49c67e31f85613f390254486b561 bbb4588e09d0be30f04354e4a52dd4291d914dbc e532b2bd69fb82ad5dab0a8cccd4f4db5c29a2cd d2ebaf1e3a53b2123e1b300ed0af3eb1fa539139 1896e9722f5daea6b064685d48c70731b7c67e04 67d38c68ebc40f1424946c7895cd9df202f0c763 d11218dda215a45fb51bf55e1c7c67cf7d315e55 b5fb602b59f099f84f5a1fc6d9c15911f02cc717 ba289fa71fb5623766b3f5a43e4b2f00d0aafa69 1066194f1a6ba66615aeb7caa4a8f285cc37fce1 53979b361bc91b85161d7a43ab2243abe44a1b3e ef3d1dab Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f1:b0:0c:25:f5:02:01:e5:df:9e:15:32:9c:ba:b8:13:f8:38:b4:29] modulus: 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 public exponent: 10001 ] 2022-04-05 09:39:58.242  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-05 09:39:58.244 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-05 09:39:58.245 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-05 09:39:58.246 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-05 09:39:58.246  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-05 09:39:58.247  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-05 09:39:58.247  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-05 09:39:58.248 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-05 09:39:58.248 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-05 09:39:58.248 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-05 09:39:58.256 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-05 09:39:58.257 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-05 09:39:58.257 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-05 09:39:58.257 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-05 09:39:58.516  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-05 09:39:58.517  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-05 09:39:58.517 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-05 09:39:58.517 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-05 09:39:58.519  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-05 09:39:58.519  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-05 09:39:58.520 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-05 09:39:58.520 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-05 09:39:58.520 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-05 09:39:58.521 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-05 09:39:58.521 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-05 09:39:58.522 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-05 09:39:58.523 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-05 09:39:58.523 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-05 09:39:58.524 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-05 09:39:58.525 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-05 09:39:58.528 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 468351180683128442763011284744861227675351475670 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Apr 05 08:23:32 UTC 2022 Final Date: Sun Apr 04 08:23:31 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ec:7e:1e:64:a8:96:f4:0b:63:2b:61:e2:06:6a:f9:7b:53:bb:36:0a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8b66a9363ba2c2aac6abe430bdbaebafbc66a736 3c914f6aa9f5c972a31c72cc9eb9c5040e4a0880 02d871cd0a80175ee75fb1364b0fa7e2f3304a76 7ebd29b330ab14075bd6059001e21e977296bb66 7278f4ec7e98a59ee85a96cf72912dcbe2d44f1f b9fda29811567ce46439730935e62de2b9e030bb a8e8c5815c21bcb6409b02f9843f3ce2f7ecd8e3 d018e28c7a38941879e9a645328e7178edfeb388 0ee2478883fc49c67e31f85613f390254486b561 bbb4588e09d0be30f04354e4a52dd4291d914dbc e532b2bd69fb82ad5dab0a8cccd4f4db5c29a2cd d2ebaf1e3a53b2123e1b300ed0af3eb1fa539139 1896e9722f5daea6b064685d48c70731b7c67e04 67d38c68ebc40f1424946c7895cd9df202f0c763 d11218dda215a45fb51bf55e1c7c67cf7d315e55 b5fb602b59f099f84f5a1fc6d9c15911f02cc717 ba289fa71fb5623766b3f5a43e4b2f00d0aafa69 1066194f1a6ba66615aeb7caa4a8f285cc37fce1 53979b361bc91b85161d7a43ab2243abe44a1b3e ef3d1dab Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [86:8a:05:3b:bd:6a:e3:7e:34:2c:a2:72:81:a7:d5:33:a9:4d:14:1e] modulus: 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 public exponent: 10001 ] 2022-04-05 09:41:50.123  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-05 09:41:50.124 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-05 09:41:50.126 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-05 09:41:50.127 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-05 09:41:50.128  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-05 09:41:50.129  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-05 09:41:50.130  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-05 09:41:50.131 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-05 09:41:50.131 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-05 09:41:50.132 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-05 09:41:50.139 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-05 09:41:50.141 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-05 09:41:50.141 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-05 09:41:50.142 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-05 09:41:50.395  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-05 09:41:50.396  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-05 09:41:50.396 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-05 09:41:50.396 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-05 09:41:50.398  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-05 09:41:50.398  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-05 09:41:50.399 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-05 09:41:50.399 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-05 09:41:50.400 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-05 09:41:50.400 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-05 09:41:50.401 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-05 09:41:50.405 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-05 09:41:50.407 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-05 09:41:50.407 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-05 09:41:50.408 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-05 09:41:50.410 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-05 09:41:50.416 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 468351180683128442763011284744861227675351475670 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Apr 05 08:23:32 UTC 2022 Final Date: Sun Apr 04 08:23:31 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ec:7e:1e:64:a8:96:f4:0b:63:2b:61:e2:06:6a:f9:7b:53:bb:36:0a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8b66a9363ba2c2aac6abe430bdbaebafbc66a736 3c914f6aa9f5c972a31c72cc9eb9c5040e4a0880 02d871cd0a80175ee75fb1364b0fa7e2f3304a76 7ebd29b330ab14075bd6059001e21e977296bb66 7278f4ec7e98a59ee85a96cf72912dcbe2d44f1f b9fda29811567ce46439730935e62de2b9e030bb a8e8c5815c21bcb6409b02f9843f3ce2f7ecd8e3 d018e28c7a38941879e9a645328e7178edfeb388 0ee2478883fc49c67e31f85613f390254486b561 bbb4588e09d0be30f04354e4a52dd4291d914dbc e532b2bd69fb82ad5dab0a8cccd4f4db5c29a2cd d2ebaf1e3a53b2123e1b300ed0af3eb1fa539139 1896e9722f5daea6b064685d48c70731b7c67e04 67d38c68ebc40f1424946c7895cd9df202f0c763 d11218dda215a45fb51bf55e1c7c67cf7d315e55 b5fb602b59f099f84f5a1fc6d9c15911f02cc717 ba289fa71fb5623766b3f5a43e4b2f00d0aafa69 1066194f1a6ba66615aeb7caa4a8f285cc37fce1 53979b361bc91b85161d7a43ab2243abe44a1b3e ef3d1dab Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [41:c5:26:a9:5d:f2:ef:74:70:00:f7:8a:c7:2c:e4:54:e6:3b:f5:75] modulus: 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 public exponent: 10001 ] 2022-04-05 09:44:25.082  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-05 09:44:25.084 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-05 09:44:25.086 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-05 09:44:25.087 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-05 09:44:25.087  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-05 09:44:25.089  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-05 09:44:25.090  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-05 09:44:25.090 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-05 09:44:25.091 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-05 09:44:25.091 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-05 09:44:25.096 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-05 09:44:25.097 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-05 09:44:25.097 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-05 09:44:25.098 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-05 09:44:25.390  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-05 09:44:25.390  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-05 09:44:25.391 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-05 09:44:25.391 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-05 09:44:25.393  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-05 09:44:25.393  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-05 09:44:25.394 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-05 09:44:25.395 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-05 09:44:25.395 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-05 09:44:25.397 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-05 09:44:25.397 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-05 09:44:25.398 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-05 09:44:25.399 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-05 09:44:25.399 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-05 09:44:25.400 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-05 09:44:25.401 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-05 09:44:25.406 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 468351180683128442763011284744861227675351475670 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Apr 05 08:23:32 UTC 2022 Final Date: Sun Apr 04 08:23:31 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ec:7e:1e:64:a8:96:f4:0b:63:2b:61:e2:06:6a:f9:7b:53:bb:36:0a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8b66a9363ba2c2aac6abe430bdbaebafbc66a736 3c914f6aa9f5c972a31c72cc9eb9c5040e4a0880 02d871cd0a80175ee75fb1364b0fa7e2f3304a76 7ebd29b330ab14075bd6059001e21e977296bb66 7278f4ec7e98a59ee85a96cf72912dcbe2d44f1f b9fda29811567ce46439730935e62de2b9e030bb a8e8c5815c21bcb6409b02f9843f3ce2f7ecd8e3 d018e28c7a38941879e9a645328e7178edfeb388 0ee2478883fc49c67e31f85613f390254486b561 bbb4588e09d0be30f04354e4a52dd4291d914dbc e532b2bd69fb82ad5dab0a8cccd4f4db5c29a2cd d2ebaf1e3a53b2123e1b300ed0af3eb1fa539139 1896e9722f5daea6b064685d48c70731b7c67e04 67d38c68ebc40f1424946c7895cd9df202f0c763 d11218dda215a45fb51bf55e1c7c67cf7d315e55 b5fb602b59f099f84f5a1fc6d9c15911f02cc717 ba289fa71fb5623766b3f5a43e4b2f00d0aafa69 1066194f1a6ba66615aeb7caa4a8f285cc37fce1 53979b361bc91b85161d7a43ab2243abe44a1b3e ef3d1dab Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [10:5e:e9:f5:4b:6a:d0:a5:c4:6f:05:51:4c:ac:f8:e0:bf:df:c1:21] modulus: 96fb530b4e8a9b47874dd9ab033e7df6e77bd6ce736fcceb85b104e65de97dbbceee1f0654ca3397d57df9ce6d454dd510534a8a0f2132ee976cb3f459d08bba347304215eebc507c310728f5103d4289ca270385705c6eefded85123efa30e0ec7f3c41c9b8795ca3fc96b91f49fc6dbc413d2bbe366b2e1795cdd529cbf7ad65bce7ddaff5390ddb59e4cf5e123f955ef9bb3d7cbb0f1ab5cf3c011c921a43e308427db6092051c815cb1280f84efa2b57624e4756fd0bb454af50956383b53fd38722aa2750577164f9083307cfc5d839962afa8a6a3ea8a98e4d087a5ec9d6f6052ca925de5e4ba75c93b1ec02870e46225db19d56532293ec680e20d591 public exponent: 10001 ] 2022-04-05 09:47:56.703  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-05 09:47:56.705 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-05 09:47:56.708 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-05 09:47:56.709 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-05 09:47:56.710  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-05 09:47:56.710  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-05 09:47:56.711  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-05 09:47:56.711 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-05 09:47:56.712 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-05 09:47:56.713 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-05 09:47:56.718 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-05 09:47:56.719 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-05 09:47:56.720 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-05 09:47:56.720 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-05 09:47:56.939  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-05 09:47:56.941  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-05 09:47:56.943 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-05 09:47:56.944 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-05 09:47:56.967  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-05 09:47:56.968  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-05 09:47:56.986 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-05 09:47:56.986 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-05 09:47:56.986 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-05 09:47:56.987 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-05 09:47:56.987 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-05 09:47:56.988 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-05 09:47:56.990 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-05 09:47:56.990 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-05 09:47:56.991 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-05 09:47:56.991 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-05 09:47:56.997 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 468351180683128442763011284744861227675351475670 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Apr 05 08:23:32 UTC 2022 Final Date: Sun Apr 04 08:23:31 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ec:7e:1e:64:a8:96:f4:0b:63:2b:61:e2:06:6a:f9:7b:53:bb:36:0a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8b66a9363ba2c2aac6abe430bdbaebafbc66a736 3c914f6aa9f5c972a31c72cc9eb9c5040e4a0880 02d871cd0a80175ee75fb1364b0fa7e2f3304a76 7ebd29b330ab14075bd6059001e21e977296bb66 7278f4ec7e98a59ee85a96cf72912dcbe2d44f1f b9fda29811567ce46439730935e62de2b9e030bb a8e8c5815c21bcb6409b02f9843f3ce2f7ecd8e3 d018e28c7a38941879e9a645328e7178edfeb388 0ee2478883fc49c67e31f85613f390254486b561 bbb4588e09d0be30f04354e4a52dd4291d914dbc e532b2bd69fb82ad5dab0a8cccd4f4db5c29a2cd d2ebaf1e3a53b2123e1b300ed0af3eb1fa539139 1896e9722f5daea6b064685d48c70731b7c67e04 67d38c68ebc40f1424946c7895cd9df202f0c763 d11218dda215a45fb51bf55e1c7c67cf7d315e55 b5fb602b59f099f84f5a1fc6d9c15911f02cc717 ba289fa71fb5623766b3f5a43e4b2f00d0aafa69 1066194f1a6ba66615aeb7caa4a8f285cc37fce1 53979b361bc91b85161d7a43ab2243abe44a1b3e ef3d1dab Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e1:bc:20:94:b4:e6:24:ae:66:f9:bf:9f:d3:b2:84:ec:21:80:6c:02] modulus: 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 public exponent: 10001 ] 2022-04-05 09:50:10.564  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-05 09:50:10.566 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-05 09:50:10.568 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-05 09:50:10.568 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-05 09:50:10.569  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-05 09:50:10.569  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-05 09:50:10.570  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-05 09:50:10.571 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-05 09:50:10.571 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-05 09:50:10.572 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-05 09:50:10.582 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-05 09:50:10.583 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-05 09:50:10.584 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-05 09:50:10.584 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-05 09:50:10.832  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-05 09:50:10.833  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-05 09:50:10.833 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-05 09:50:10.833 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-05 09:50:10.836  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-05 09:50:10.836  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-05 09:50:10.837 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-05 09:50:10.837 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-05 09:50:10.838 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-05 09:50:10.839 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-05 09:50:10.839 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-05 09:50:10.839 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-05 09:50:10.841 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-05 09:50:10.841 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-05 09:50:10.841 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-05 09:50:10.842 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-05 09:50:10.847 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 468351180683128442763011284744861227675351475670 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Apr 05 08:23:32 UTC 2022 Final Date: Sun Apr 04 08:23:31 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ec:7e:1e:64:a8:96:f4:0b:63:2b:61:e2:06:6a:f9:7b:53:bb:36:0a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8b66a9363ba2c2aac6abe430bdbaebafbc66a736 3c914f6aa9f5c972a31c72cc9eb9c5040e4a0880 02d871cd0a80175ee75fb1364b0fa7e2f3304a76 7ebd29b330ab14075bd6059001e21e977296bb66 7278f4ec7e98a59ee85a96cf72912dcbe2d44f1f b9fda29811567ce46439730935e62de2b9e030bb a8e8c5815c21bcb6409b02f9843f3ce2f7ecd8e3 d018e28c7a38941879e9a645328e7178edfeb388 0ee2478883fc49c67e31f85613f390254486b561 bbb4588e09d0be30f04354e4a52dd4291d914dbc e532b2bd69fb82ad5dab0a8cccd4f4db5c29a2cd d2ebaf1e3a53b2123e1b300ed0af3eb1fa539139 1896e9722f5daea6b064685d48c70731b7c67e04 67d38c68ebc40f1424946c7895cd9df202f0c763 d11218dda215a45fb51bf55e1c7c67cf7d315e55 b5fb602b59f099f84f5a1fc6d9c15911f02cc717 ba289fa71fb5623766b3f5a43e4b2f00d0aafa69 1066194f1a6ba66615aeb7caa4a8f285cc37fce1 53979b361bc91b85161d7a43ab2243abe44a1b3e ef3d1dab Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [20:4f:14:11:b6:f4:d8:0f:20:42:11:f9:3f:6f:26:16:c5:94:83:a4] modulus: e1fb21ea4c5b061109250502ddb946bf12d672a11b1a8ff0d6e57d0ca4a5e6b11ccfece1b7eee3fff0deb35d2b37821e439be2da7ca2e8256cd757e3c1fb7c4bfe9cafb9bffd21cffe0e3b31f0212c18f0ead9dedb9ddf668fea5e7de47709c5d0d4d9b7cb901f8c4d6d52965e1403821d7a8827c322482e8cea6c303db7d7e7c129d51ffbfad8a6d5098c0753840c77aff38d263bd4ef85d359c64e5f72d45ab4d760d4621240498f2f65c4ef2c1f210dc6f97ff4a3760a89a35e1f5a71d1b02fed6f84aace69372304debb1b447ee87993f9d1dae38556f3f5edf59b1abc9c2b6d910334992d7756f3d6caeee2f6b4b08a244a2f5d66503e21ce141f1c3ba1 public exponent: 10001 ] 2022-04-05 09:54:29.770  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-05 09:54:29.776 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-05 09:54:29.780 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-05 09:54:29.781 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-05 09:54:29.782  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-05 09:54:29.783  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-05 09:54:29.783  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-05 09:54:29.793 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-05 09:54:29.794 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-05 09:54:29.794 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-05 09:54:29.804 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-05 09:54:29.805 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-05 09:54:29.805 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-05 09:54:29.807 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-05 09:54:29.998  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-05 09:54:30.002  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-05 09:54:30.003 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-05 09:54:30.003 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-05 09:54:30.005  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-05 09:54:30.007  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-05 09:54:30.007 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-05 09:54:30.007 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-05 09:54:30.008 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-05 09:54:30.009 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-05 09:54:30.009 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-05 09:54:30.010 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-05 09:54:30.010 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-05 09:54:30.011 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-05 09:54:30.011 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-05 09:54:30.012 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-05 09:54:30.017 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 468351180683128442763011284744861227675351475670 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Apr 05 08:23:32 UTC 2022 Final Date: Sun Apr 04 08:23:31 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ec:7e:1e:64:a8:96:f4:0b:63:2b:61:e2:06:6a:f9:7b:53:bb:36:0a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8b66a9363ba2c2aac6abe430bdbaebafbc66a736 3c914f6aa9f5c972a31c72cc9eb9c5040e4a0880 02d871cd0a80175ee75fb1364b0fa7e2f3304a76 7ebd29b330ab14075bd6059001e21e977296bb66 7278f4ec7e98a59ee85a96cf72912dcbe2d44f1f b9fda29811567ce46439730935e62de2b9e030bb a8e8c5815c21bcb6409b02f9843f3ce2f7ecd8e3 d018e28c7a38941879e9a645328e7178edfeb388 0ee2478883fc49c67e31f85613f390254486b561 bbb4588e09d0be30f04354e4a52dd4291d914dbc e532b2bd69fb82ad5dab0a8cccd4f4db5c29a2cd d2ebaf1e3a53b2123e1b300ed0af3eb1fa539139 1896e9722f5daea6b064685d48c70731b7c67e04 67d38c68ebc40f1424946c7895cd9df202f0c763 d11218dda215a45fb51bf55e1c7c67cf7d315e55 b5fb602b59f099f84f5a1fc6d9c15911f02cc717 ba289fa71fb5623766b3f5a43e4b2f00d0aafa69 1066194f1a6ba66615aeb7caa4a8f285cc37fce1 53979b361bc91b85161d7a43ab2243abe44a1b3e ef3d1dab Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [46:2e:d8:ca:7d:da:40:55:b0:87:59:94:d6:fd:76:54:1f:16:92:d9] modulus: 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 public exponent: 10001 ] 2022-04-05 09:57:01.624  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-05 09:57:01.625 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-05 09:57:01.627 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-05 09:57:01.628 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-05 09:57:01.628  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-05 09:57:01.629  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-05 09:57:01.629  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-05 09:57:01.630 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-05 09:57:01.630 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-05 09:57:01.630 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-05 09:57:01.641 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-05 09:57:01.642 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-05 09:57:01.643 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-05 09:57:01.643 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-05 09:57:01.912  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-05 09:57:01.913  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-05 09:57:01.913 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-05 09:57:01.913 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-05 09:57:01.915  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-05 09:57:01.916  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-05 09:57:01.917 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-05 09:57:01.917 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-05 09:57:01.917 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-05 09:57:01.918 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-05 09:57:01.919 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-05 09:57:01.919 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-05 09:57:01.920 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-05 09:57:01.920 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-05 09:57:01.920 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-05 09:57:01.921 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-05 09:57:01.925 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 468351180683128442763011284744861227675351475670 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Apr 05 08:23:32 UTC 2022 Final Date: Sun Apr 04 08:23:31 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ec:7e:1e:64:a8:96:f4:0b:63:2b:61:e2:06:6a:f9:7b:53:bb:36:0a] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8b66a9363ba2c2aac6abe430bdbaebafbc66a736 3c914f6aa9f5c972a31c72cc9eb9c5040e4a0880 02d871cd0a80175ee75fb1364b0fa7e2f3304a76 7ebd29b330ab14075bd6059001e21e977296bb66 7278f4ec7e98a59ee85a96cf72912dcbe2d44f1f b9fda29811567ce46439730935e62de2b9e030bb a8e8c5815c21bcb6409b02f9843f3ce2f7ecd8e3 d018e28c7a38941879e9a645328e7178edfeb388 0ee2478883fc49c67e31f85613f390254486b561 bbb4588e09d0be30f04354e4a52dd4291d914dbc e532b2bd69fb82ad5dab0a8cccd4f4db5c29a2cd d2ebaf1e3a53b2123e1b300ed0af3eb1fa539139 1896e9722f5daea6b064685d48c70731b7c67e04 67d38c68ebc40f1424946c7895cd9df202f0c763 d11218dda215a45fb51bf55e1c7c67cf7d315e55 b5fb602b59f099f84f5a1fc6d9c15911f02cc717 ba289fa71fb5623766b3f5a43e4b2f00d0aafa69 1066194f1a6ba66615aeb7caa4a8f285cc37fce1 53979b361bc91b85161d7a43ab2243abe44a1b3e ef3d1dab Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a6:20:ba:55:2f:dd:2c:50:a9:77:3d:5f:d5:d5:ec:c2:99:c3:e7:3a] modulus: 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 public exponent: 10001 ] 2022-04-05 10:00:38.434  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-05 10:00:38.436 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-05 10:00:38.438 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-05 10:00:38.439 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-05 10:00:38.439  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-05 10:00:38.440  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-05 10:00:38.440  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-05 10:00:38.441 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-05 10:00:38.441 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-05 10:00:38.441 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-05 10:00:38.446 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-05 10:00:38.447 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-05 10:00:38.447 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-05 10:00:38.447 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-05 10:00:38.666  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-05 10:00:38.667  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-05 10:00:38.667 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-05 10:00:38.668 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-05 10:00:38.670  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-05 10:00:38.671  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-05 10:00:38.672 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-05 10:00:38.672 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-05 10:00:38.672 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-05 10:00:38.673 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-05 10:00:38.673 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-05 10:00:38.674 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-05 10:00:38.675 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-05 10:00:38.675 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-05 10:00:38.675 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-05 10:00:38.677 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-05 10:00:38.681 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 468351180683128442763011284744861227675351475670 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Apr 05 08:23:32 UTC 2022 Final Date: Sun Apr 04 08:23:31 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ec:7e:1e:64:a8:96:f4:0b:63:2b:61:e2:06:6a:f9:7b:53:bb:36:0a] modulus: a00ae9107a02194bbac5bb933cbcc64d316f1b09030df62932aad9287cd0d8958553a729fcec920ac8a0d701fb8033b77038d22c8cc24709196bc83ac1cfc6d1e1b3d0cac7377070e91482cca4e8db1a3af3806c0ae9523972ca7c441633b7b0156cc7d34a38f3196ee722ca4a91496fc80fa27075efae5d3e10f5e029dfa9198bb4021405ac0731b661e05f5381f89d5da95caac16c5b9d94f3540b029ca03d113dd0cddc46c422839a909f2f9e0351ec838f322283eeb71e6ee6734559cc695b5df8a6662c5ae097f7229db4d23adbcad6ac843ed0234f34bd5dd961da1b95c09f29bb2302f700b25c5b982491675e5ef305b647e81a3cb9056c6aada826def05dbd540f3473fd09f5f8da8d8ca7e8f6cb6ae0cdc554987d9e145d2c47e9ac10d853e549f67d0aed7950426f401d374e1b11cdab58f067f5b3162b59c706282eecdb526dc1d2211f9dd12f2dec856a3c89515f744596b5ac2c657b5455dd8c4ff77edde1dda64e1f9119cf699548e12e8785fcebf47be6cf6c323d8ad243a3 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8b66a9363ba2c2aac6abe430bdbaebafbc66a736 3c914f6aa9f5c972a31c72cc9eb9c5040e4a0880 02d871cd0a80175ee75fb1364b0fa7e2f3304a76 7ebd29b330ab14075bd6059001e21e977296bb66 7278f4ec7e98a59ee85a96cf72912dcbe2d44f1f b9fda29811567ce46439730935e62de2b9e030bb a8e8c5815c21bcb6409b02f9843f3ce2f7ecd8e3 d018e28c7a38941879e9a645328e7178edfeb388 0ee2478883fc49c67e31f85613f390254486b561 bbb4588e09d0be30f04354e4a52dd4291d914dbc e532b2bd69fb82ad5dab0a8cccd4f4db5c29a2cd d2ebaf1e3a53b2123e1b300ed0af3eb1fa539139 1896e9722f5daea6b064685d48c70731b7c67e04 67d38c68ebc40f1424946c7895cd9df202f0c763 d11218dda215a45fb51bf55e1c7c67cf7d315e55 b5fb602b59f099f84f5a1fc6d9c15911f02cc717 ba289fa71fb5623766b3f5a43e4b2f00d0aafa69 1066194f1a6ba66615aeb7caa4a8f285cc37fce1 53979b361bc91b85161d7a43ab2243abe44a1b3e ef3d1dab Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6a:47:f8:57:8d:cf:c3:b2:5e:09:1c:3e:0c:c8:dd:0d:e7:78:b1:bb] modulus: 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 public exponent: 10001 ]