2022-04-06 05:11:49,462 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-04-06 05:11:51,250 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-04-06 05:11:52.309  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Apr 06, 2022 5:11:54 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Apr 06, 2022 5:11:54 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Apr 06, 2022 5:11:54 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Apr 06, 2022 5:11:54 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-04-06 05:11:55.663 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-04-06 05:11:56.080  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-04-06 05:11:56.308  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-04-06 05:11:57.262 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-04-06 05:11:57.266 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-04-06 05:11:57.267 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-04-06 05:11:57.273 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-04-06 05:11:57.341 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-04-06 05:11:57.346 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-04-06 05:11:57.506 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-04-06 05:11:58.224 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Apr 06, 2022 5:11:59 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-04-06 05:11:59.404  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 10.939 seconds (JVM running for 13.227) Apr 06, 2022 5:12:26 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-04-06 05:12:55.759  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-06 05:12:55.771 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-06 05:12:55.856 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-04-06 05:12:55.866 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-06 05:12:55.890  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-04-06 05:12:55.896  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-06 05:12:55.899  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-06 05:12:55.903 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-06 05:12:55.904 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-06 05:12:55.909 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-06 05:12:55.916 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-06 05:12:55.920 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-06 05:12:55.999 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-06 05:12:56.013 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-06 05:12:56.014 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-06 05:12:56.020 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-06 05:12:57.074  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-06 05:12:57.078  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-06 05:12:57.079 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-06 05:12:57.081 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-06 05:12:57.095  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-06 05:12:57.097  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-06 05:12:57.098 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-06 05:12:57.099 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-06 05:12:57.100 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-06 05:12:57.115 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-06 05:12:57.116 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-06 05:12:57.116 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-06 05:12:57.125 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-06 05:12:57.126 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-06 05:12:57.127 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-06 05:12:57.129 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-06 05:12:57.172 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 286500132127456462077644110966318802653803337020 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Apr 06 05:07:42 UTC 2022 Final Date: Mon Apr 05 05:07:41 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3b:57:38:cd:cd:20:a9:b0:15:46:3a:28:60:dd:e9:57:51:ec:44:24] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5cfd7e63fb5a5593484c9db74bcd466f7a8ee62d 6063ef8aa2296a3be8121f17ac387d82eb496d02 2fcf3fe2d1f74ee9c51475cc026d737d78e81a8c 3c30ef256eb7341cb984f66d3efc2377172bfab7 1538cef5255b44c8aeede9ee31772955501fff4c 153d510c57f099f1673cfa840f523144f6845e5e 7038ed5e7e98dd5b7f557868bbfc53faf92c9908 1feb47b90c019268e445ffcd18be13a870d9c75e 484aeff3a2c517aaa86fcf7725d1aa4cfd677939 15497ea443b0e5ad17ae8f5c80b72b5e787293cc 0e89915c8681e04a469a5147e2d2fd29b87bc952 e7d5206e972afff9fe7570feb669228f39e363fc a4ee4a2ef26632a83ccd8545c4fa1efb86cc9ad9 2e43c328f4bf610bd2da4a0460e70f014cdf1474 cc7cbcbc9e6ccfaeb2aa3965f645ca1c8a9fadc6 41c8358e75e2d640519f2e2cee471d056154f2ce ce65f1c74d6b7776562c3ec8af8d3b8f1fac438a a042af7d0d4f05cf7ec898a1598e024c95e5e551 81f4221b71209e631747d0debc564c23ebaed7ec 4f4683f6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3e:bd:6d:5b:1d:cd:09:f3:56:bb:70:cf:af:45:2a:12:0e:a6:be:32] modulus: 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 public exponent: 10001 ] 2022-04-06 06:33:36.358  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-06 06:33:36.360 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-06 06:33:36.363 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-04-06 06:33:36.364 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-06 06:33:36.365  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-04-06 06:33:36.366  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-06 06:33:36.366  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-06 06:33:36.367 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-06 06:33:36.367 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-06 06:33:36.368 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-06 06:33:36.374 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-06 06:33:36.375 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-06 06:33:36.376 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-06 06:33:36.376 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-06 06:33:36.681  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-06 06:33:36.682  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-06 06:33:36.683 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-06 06:33:36.683 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-06 06:33:36.686  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-06 06:33:36.687  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-06 06:33:36.688 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-06 06:33:36.688 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-06 06:33:36.688 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-06 06:33:36.690 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-06 06:33:36.690 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-06 06:33:36.690 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-06 06:33:36.692 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-06 06:33:36.692 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-06 06:33:36.693 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-06 06:33:36.694 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-06 06:33:36.721 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 286500132127456462077644110966318802653803337020 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Apr 06 05:07:42 UTC 2022 Final Date: Mon Apr 05 05:07:41 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3b:57:38:cd:cd:20:a9:b0:15:46:3a:28:60:dd:e9:57:51:ec:44:24] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5cfd7e63fb5a5593484c9db74bcd466f7a8ee62d 6063ef8aa2296a3be8121f17ac387d82eb496d02 2fcf3fe2d1f74ee9c51475cc026d737d78e81a8c 3c30ef256eb7341cb984f66d3efc2377172bfab7 1538cef5255b44c8aeede9ee31772955501fff4c 153d510c57f099f1673cfa840f523144f6845e5e 7038ed5e7e98dd5b7f557868bbfc53faf92c9908 1feb47b90c019268e445ffcd18be13a870d9c75e 484aeff3a2c517aaa86fcf7725d1aa4cfd677939 15497ea443b0e5ad17ae8f5c80b72b5e787293cc 0e89915c8681e04a469a5147e2d2fd29b87bc952 e7d5206e972afff9fe7570feb669228f39e363fc a4ee4a2ef26632a83ccd8545c4fa1efb86cc9ad9 2e43c328f4bf610bd2da4a0460e70f014cdf1474 cc7cbcbc9e6ccfaeb2aa3965f645ca1c8a9fadc6 41c8358e75e2d640519f2e2cee471d056154f2ce ce65f1c74d6b7776562c3ec8af8d3b8f1fac438a a042af7d0d4f05cf7ec898a1598e024c95e5e551 81f4221b71209e631747d0debc564c23ebaed7ec 4f4683f6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [aa:62:73:fe:bd:4a:36:fe:be:e7:f9:f8:6c:d7:87:22:cb:06:63:68] modulus: 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 public exponent: 10001 ] 2022-04-06 06:34:20.030  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-06 06:34:20.032 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-06 06:34:20.034 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-06 06:34:20.035 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-06 06:34:20.036  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-06 06:34:20.037  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-06 06:34:20.038  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-06 06:34:20.039 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-06 06:34:20.039 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-06 06:34:20.040 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-06 06:34:20.056 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-06 06:34:20.057 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-06 06:34:20.057 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-06 06:34:20.057 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-06 06:34:20.356  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-06 06:34:20.357  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-06 06:34:20.358 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-06 06:34:20.358 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-06 06:34:20.362  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-06 06:34:20.363  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-06 06:34:20.364 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-06 06:34:20.364 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-06 06:34:20.367 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-06 06:34:20.374 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-06 06:34:20.375 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-06 06:34:20.376 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-06 06:34:20.377 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-06 06:34:20.378 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-06 06:34:20.378 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-06 06:34:20.379 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-06 06:34:20.385 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 286500132127456462077644110966318802653803337020 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Apr 06 05:07:42 UTC 2022 Final Date: Mon Apr 05 05:07:41 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3b:57:38:cd:cd:20:a9:b0:15:46:3a:28:60:dd:e9:57:51:ec:44:24] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5cfd7e63fb5a5593484c9db74bcd466f7a8ee62d 6063ef8aa2296a3be8121f17ac387d82eb496d02 2fcf3fe2d1f74ee9c51475cc026d737d78e81a8c 3c30ef256eb7341cb984f66d3efc2377172bfab7 1538cef5255b44c8aeede9ee31772955501fff4c 153d510c57f099f1673cfa840f523144f6845e5e 7038ed5e7e98dd5b7f557868bbfc53faf92c9908 1feb47b90c019268e445ffcd18be13a870d9c75e 484aeff3a2c517aaa86fcf7725d1aa4cfd677939 15497ea443b0e5ad17ae8f5c80b72b5e787293cc 0e89915c8681e04a469a5147e2d2fd29b87bc952 e7d5206e972afff9fe7570feb669228f39e363fc a4ee4a2ef26632a83ccd8545c4fa1efb86cc9ad9 2e43c328f4bf610bd2da4a0460e70f014cdf1474 cc7cbcbc9e6ccfaeb2aa3965f645ca1c8a9fadc6 41c8358e75e2d640519f2e2cee471d056154f2ce ce65f1c74d6b7776562c3ec8af8d3b8f1fac438a a042af7d0d4f05cf7ec898a1598e024c95e5e551 81f4221b71209e631747d0debc564c23ebaed7ec 4f4683f6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [00:21:70:cb:da:74:10:8b:87:9d:6f:4a:68:07:a1:0a:6b:4f:1e:b5] modulus: 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 public exponent: 10001 ] 2022-04-06 06:36:09.187  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-06 06:36:09.189 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-06 06:36:09.192 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-04-06 06:36:09.193 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-06 06:36:09.194  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-04-06 06:36:09.196  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-06 06:36:09.209  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-06 06:36:09.210 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-06 06:36:09.211 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-06 06:36:09.212 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-06 06:36:09.235 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-06 06:36:09.236 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-06 06:36:09.236 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-06 06:36:09.237 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-06 06:36:09.606  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-06 06:36:09.607  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-06 06:36:09.611 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-06 06:36:09.612 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-06 06:36:09.618  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-06 06:36:09.619  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-06 06:36:09.619 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-06 06:36:09.620 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-06 06:36:09.620 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-06 06:36:09.626 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-06 06:36:09.626 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-06 06:36:09.627 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-06 06:36:09.628 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-06 06:36:09.629 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-06 06:36:09.629 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-06 06:36:09.631 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-06 06:36:09.640 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 286500132127456462077644110966318802653803337020 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Apr 06 05:07:42 UTC 2022 Final Date: Mon Apr 05 05:07:41 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3b:57:38:cd:cd:20:a9:b0:15:46:3a:28:60:dd:e9:57:51:ec:44:24] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5cfd7e63fb5a5593484c9db74bcd466f7a8ee62d 6063ef8aa2296a3be8121f17ac387d82eb496d02 2fcf3fe2d1f74ee9c51475cc026d737d78e81a8c 3c30ef256eb7341cb984f66d3efc2377172bfab7 1538cef5255b44c8aeede9ee31772955501fff4c 153d510c57f099f1673cfa840f523144f6845e5e 7038ed5e7e98dd5b7f557868bbfc53faf92c9908 1feb47b90c019268e445ffcd18be13a870d9c75e 484aeff3a2c517aaa86fcf7725d1aa4cfd677939 15497ea443b0e5ad17ae8f5c80b72b5e787293cc 0e89915c8681e04a469a5147e2d2fd29b87bc952 e7d5206e972afff9fe7570feb669228f39e363fc a4ee4a2ef26632a83ccd8545c4fa1efb86cc9ad9 2e43c328f4bf610bd2da4a0460e70f014cdf1474 cc7cbcbc9e6ccfaeb2aa3965f645ca1c8a9fadc6 41c8358e75e2d640519f2e2cee471d056154f2ce ce65f1c74d6b7776562c3ec8af8d3b8f1fac438a a042af7d0d4f05cf7ec898a1598e024c95e5e551 81f4221b71209e631747d0debc564c23ebaed7ec 4f4683f6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [68:81:8c:09:6c:7c:76:82:e9:34:b1:8a:4a:92:ee:07:ee:98:f3:cf] modulus: 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 public exponent: 10001 ] 2022-04-06 06:37:52.179  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-06 06:37:52.182 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-06 06:37:52.192 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-04-06 06:37:52.194 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-06 06:37:52.194  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-04-06 06:37:52.195  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-06 06:37:52.196  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-06 06:37:52.197 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-06 06:37:52.197 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-06 06:37:52.198 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-06 06:37:52.210 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-06 06:37:52.211 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-06 06:37:52.212 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-06 06:37:52.212 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-06 06:37:52.552  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-06 06:37:52.553  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-06 06:37:52.554 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-06 06:37:52.554 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-06 06:37:52.557  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-06 06:37:52.558  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-06 06:37:52.559 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-06 06:37:52.560 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-06 06:37:52.560 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-06 06:37:52.561 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-06 06:37:52.562 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-06 06:37:52.562 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-06 06:37:52.564 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-06 06:37:52.564 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-06 06:37:52.565 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-06 06:37:52.566 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-06 06:37:52.577 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 286500132127456462077644110966318802653803337020 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Apr 06 05:07:42 UTC 2022 Final Date: Mon Apr 05 05:07:41 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3b:57:38:cd:cd:20:a9:b0:15:46:3a:28:60:dd:e9:57:51:ec:44:24] modulus: 996f2b04d532f1810a18c10f954e6f19965747b20e03d86fa4a9acb3b05a47e9bc1663cf9333a15d72980fa6eac29739675bd1258293b59f7c401e1cba1a44aafb649eb87c6ac38229ad807b4e0f478ffd2031b6418814b297d6072d9c786d0fe51b485dfdc75a7c43430374948353fc212642b79627b9f8fac39eae352f4c92a11d5f44349206f50bee38a442bfb295a242db66e912747c6aad86da030642e737ec25ba0bd35d6f162d10a373cf43dad313198ab2caca1d78a967327984536a18f3001977c71f1530e3a1407950662b26a6cb17d3ed3bcce14e9e8eac14c741068498cfb4d1efdcda2ae94474ad980d16ed7a1b0cc86ccefa60e2ed9fe4838f716bc26ff5b06a2223997851ba027d2eaa1f3ca2b125cc0bbb11e04f53a578ed5efcd1bd3d22bb0a9a82e3430be856e0b64bf49c34dabaf2087fc6d7de75189111e453160429393044f621d6f94a26daca1373663019bcb6a8d35571b0a2fe98da78d425b20a192a5d16bf250a60d8a2c10e03784efe42bb545ae77397129e91 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5cfd7e63fb5a5593484c9db74bcd466f7a8ee62d 6063ef8aa2296a3be8121f17ac387d82eb496d02 2fcf3fe2d1f74ee9c51475cc026d737d78e81a8c 3c30ef256eb7341cb984f66d3efc2377172bfab7 1538cef5255b44c8aeede9ee31772955501fff4c 153d510c57f099f1673cfa840f523144f6845e5e 7038ed5e7e98dd5b7f557868bbfc53faf92c9908 1feb47b90c019268e445ffcd18be13a870d9c75e 484aeff3a2c517aaa86fcf7725d1aa4cfd677939 15497ea443b0e5ad17ae8f5c80b72b5e787293cc 0e89915c8681e04a469a5147e2d2fd29b87bc952 e7d5206e972afff9fe7570feb669228f39e363fc a4ee4a2ef26632a83ccd8545c4fa1efb86cc9ad9 2e43c328f4bf610bd2da4a0460e70f014cdf1474 cc7cbcbc9e6ccfaeb2aa3965f645ca1c8a9fadc6 41c8358e75e2d640519f2e2cee471d056154f2ce ce65f1c74d6b7776562c3ec8af8d3b8f1fac438a a042af7d0d4f05cf7ec898a1598e024c95e5e551 81f4221b71209e631747d0debc564c23ebaed7ec 4f4683f6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [10:1a:02:60:38:53:cd:1e:95:69:9b:72:a3:e0:55:8b:54:3b:ab:78] modulus: cabda7644a957d0d724d7fa403395f18a32af0b340afddfd1bbc6797b02c75b348eaa00cb44bc2fc96052da4c05d8d42fe8738620cf6146396ff08515d18bcaecd49b2a3c89f928ac74fff79da94eab00444acea2cb92f40a06a71fe57c803e8fa4d646ea9042052292341ffe37274124446699882ea0633907ce27535be202fc0b7aca9d579e8915cca29f05e1c53b3b1f4e04c0e353d6af52f2fc37c8bcfe4bd9731cca07bfa7009fb14cb11b22186816f7948b9fb5f0b0709eefa297921b1092a7c804d4c27b9fe52719bdda3e5aa750f605bcbfc255780da61921b97ed266011a71ff7c2bb6639dfca38d8016d2e0b709b085ccd83be5531b63646923a3b public exponent: 10001 ] 2022-04-06 06:40:06.618  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-06 06:40:06.621 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-06 06:40:06.624 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-04-06 06:40:06.624 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-06 06:40:06.625  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-04-06 06:40:06.626  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-06 06:40:06.626  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-06 06:40:06.627 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-06 06:40:06.627 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-06 06:40:06.628 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-06 06:40:06.635 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-06 06:40:06.636 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-06 06:40:06.636 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-06 06:40:06.637 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-06 06:40:06.951  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-06 06:40:06.952  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-06 06:40:06.953 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-06 06:40:06.953 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-06 06:40:06.954  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-06 06:40:06.955  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-06 06:40:06.955 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-06 06:40:06.956 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-06 06:40:06.956 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-06 06:40:06.957 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-06 06:40:06.957 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-06 06:40:06.957 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-06 06:40:06.958 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-06 06:40:06.959 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-06 06:40:06.959 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-06 06:40:06.960 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-06 06:40:06.964 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 286500132127456462077644110966318802653803337020 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Apr 06 05:07:42 UTC 2022 Final Date: Mon Apr 05 05:07:41 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3b:57:38:cd:cd:20:a9:b0:15:46:3a:28:60:dd:e9:57:51:ec:44:24] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5cfd7e63fb5a5593484c9db74bcd466f7a8ee62d 6063ef8aa2296a3be8121f17ac387d82eb496d02 2fcf3fe2d1f74ee9c51475cc026d737d78e81a8c 3c30ef256eb7341cb984f66d3efc2377172bfab7 1538cef5255b44c8aeede9ee31772955501fff4c 153d510c57f099f1673cfa840f523144f6845e5e 7038ed5e7e98dd5b7f557868bbfc53faf92c9908 1feb47b90c019268e445ffcd18be13a870d9c75e 484aeff3a2c517aaa86fcf7725d1aa4cfd677939 15497ea443b0e5ad17ae8f5c80b72b5e787293cc 0e89915c8681e04a469a5147e2d2fd29b87bc952 e7d5206e972afff9fe7570feb669228f39e363fc a4ee4a2ef26632a83ccd8545c4fa1efb86cc9ad9 2e43c328f4bf610bd2da4a0460e70f014cdf1474 cc7cbcbc9e6ccfaeb2aa3965f645ca1c8a9fadc6 41c8358e75e2d640519f2e2cee471d056154f2ce ce65f1c74d6b7776562c3ec8af8d3b8f1fac438a a042af7d0d4f05cf7ec898a1598e024c95e5e551 81f4221b71209e631747d0debc564c23ebaed7ec 4f4683f6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6d:50:28:a7:ae:f8:fe:a4:d0:bf:16:10:a0:17:b0:3a:b8:ff:53:29] modulus: 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 public exponent: 10001 ] 2022-04-06 06:40:38.436  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-06 06:40:38.437 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-06 06:40:38.440 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-06 06:40:38.441 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-06 06:40:38.442  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-06 06:40:38.442  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-06 06:40:38.443  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-06 06:40:38.443 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-06 06:40:38.444 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-06 06:40:38.445 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-06 06:40:38.452 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-06 06:40:38.453 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-06 06:40:38.454 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-06 06:40:38.455 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-06 06:40:43.648  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-06 06:40:43.649  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-06 06:40:43.649 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-06 06:40:43.650 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-06 06:40:43.651  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-06 06:40:43.652  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-06 06:40:43.653 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-06 06:40:43.653 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-06 06:40:43.654 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-06 06:40:43.655 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-06 06:40:43.655 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-06 06:40:43.656 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-06 06:40:43.657 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-06 06:40:43.657 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-06 06:40:43.658 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-06 06:40:43.659 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-06 06:40:43.663 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 286500132127456462077644110966318802653803337020 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Apr 06 05:07:42 UTC 2022 Final Date: Mon Apr 05 05:07:41 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3b:57:38:cd:cd:20:a9:b0:15:46:3a:28:60:dd:e9:57:51:ec:44:24] modulus: 996f2b04d532f1810a18c10f954e6f19965747b20e03d86fa4a9acb3b05a47e9bc1663cf9333a15d72980fa6eac29739675bd1258293b59f7c401e1cba1a44aafb649eb87c6ac38229ad807b4e0f478ffd2031b6418814b297d6072d9c786d0fe51b485dfdc75a7c43430374948353fc212642b79627b9f8fac39eae352f4c92a11d5f44349206f50bee38a442bfb295a242db66e912747c6aad86da030642e737ec25ba0bd35d6f162d10a373cf43dad313198ab2caca1d78a967327984536a18f3001977c71f1530e3a1407950662b26a6cb17d3ed3bcce14e9e8eac14c741068498cfb4d1efdcda2ae94474ad980d16ed7a1b0cc86ccefa60e2ed9fe4838f716bc26ff5b06a2223997851ba027d2eaa1f3ca2b125cc0bbb11e04f53a578ed5efcd1bd3d22bb0a9a82e3430be856e0b64bf49c34dabaf2087fc6d7de75189111e453160429393044f621d6f94a26daca1373663019bcb6a8d35571b0a2fe98da78d425b20a192a5d16bf250a60d8a2c10e03784efe42bb545ae77397129e91 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5cfd7e63fb5a5593484c9db74bcd466f7a8ee62d 6063ef8aa2296a3be8121f17ac387d82eb496d02 2fcf3fe2d1f74ee9c51475cc026d737d78e81a8c 3c30ef256eb7341cb984f66d3efc2377172bfab7 1538cef5255b44c8aeede9ee31772955501fff4c 153d510c57f099f1673cfa840f523144f6845e5e 7038ed5e7e98dd5b7f557868bbfc53faf92c9908 1feb47b90c019268e445ffcd18be13a870d9c75e 484aeff3a2c517aaa86fcf7725d1aa4cfd677939 15497ea443b0e5ad17ae8f5c80b72b5e787293cc 0e89915c8681e04a469a5147e2d2fd29b87bc952 e7d5206e972afff9fe7570feb669228f39e363fc a4ee4a2ef26632a83ccd8545c4fa1efb86cc9ad9 2e43c328f4bf610bd2da4a0460e70f014cdf1474 cc7cbcbc9e6ccfaeb2aa3965f645ca1c8a9fadc6 41c8358e75e2d640519f2e2cee471d056154f2ce ce65f1c74d6b7776562c3ec8af8d3b8f1fac438a a042af7d0d4f05cf7ec898a1598e024c95e5e551 81f4221b71209e631747d0debc564c23ebaed7ec 4f4683f6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7e:63:96:18:25:60:da:33:0f:2d:41:58:8c:6d:9a:c7:fd:7a:6f:d4] modulus: d9379641f1ae53304955252bbdc625bdb59b323fbdc7be5727ab474d227a1211e002a636fb48854fbbe7b840a7cd995f4a4000a1e12d5cbfd2b4c5c6315117c46f3573120d97b0b792a020b3380adddac9962663196382cd796bba64f42673d3e88362f5d6103f2a0c8bbceabff1bb3be4fcd27b3666fe3432484a5cab1707be2f2a79886dd96358cd866c69578ffe6269657a53a9c0cabc11f01443bd03e7478052e79fdd50cad700d4077d7658725bc7916cdf1c8951476f00f9b40be1ac37798b93d07dd8391607da16f2649f13f314323a9e221f982a2182681da87893b74987412812e03da34480a61b178919ea64f3def8aaa9699535912e180c8ecf13 public exponent: 10001 ] 2022-04-06 06:40:45.429  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-06 06:40:45.433 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-06 06:40:45.436 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-04-06 06:40:45.437 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-06 06:40:45.438  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-04-06 06:40:45.438  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-06 06:40:45.439  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-06 06:40:45.439 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-06 06:40:45.439 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-06 06:40:45.440 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-06 06:40:45.455 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-06 06:40:45.456 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-06 06:40:45.457 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-06 06:40:45.457 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-06 06:40:45.768  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-06 06:40:45.769  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-06 06:40:45.769 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-06 06:40:45.770 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-06 06:40:45.771  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-06 06:40:45.771  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-06 06:40:45.772 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-06 06:40:45.772 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-06 06:40:45.773 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-06 06:40:45.774 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-06 06:40:45.774 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-06 06:40:45.774 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-06 06:40:45.775 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-06 06:40:45.776 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-06 06:40:45.776 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-06 06:40:45.777 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-06 06:40:45.782 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 286500132127456462077644110966318802653803337020 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Apr 06 05:07:42 UTC 2022 Final Date: Mon Apr 05 05:07:41 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3b:57:38:cd:cd:20:a9:b0:15:46:3a:28:60:dd:e9:57:51:ec:44:24] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5cfd7e63fb5a5593484c9db74bcd466f7a8ee62d 6063ef8aa2296a3be8121f17ac387d82eb496d02 2fcf3fe2d1f74ee9c51475cc026d737d78e81a8c 3c30ef256eb7341cb984f66d3efc2377172bfab7 1538cef5255b44c8aeede9ee31772955501fff4c 153d510c57f099f1673cfa840f523144f6845e5e 7038ed5e7e98dd5b7f557868bbfc53faf92c9908 1feb47b90c019268e445ffcd18be13a870d9c75e 484aeff3a2c517aaa86fcf7725d1aa4cfd677939 15497ea443b0e5ad17ae8f5c80b72b5e787293cc 0e89915c8681e04a469a5147e2d2fd29b87bc952 e7d5206e972afff9fe7570feb669228f39e363fc a4ee4a2ef26632a83ccd8545c4fa1efb86cc9ad9 2e43c328f4bf610bd2da4a0460e70f014cdf1474 cc7cbcbc9e6ccfaeb2aa3965f645ca1c8a9fadc6 41c8358e75e2d640519f2e2cee471d056154f2ce ce65f1c74d6b7776562c3ec8af8d3b8f1fac438a a042af7d0d4f05cf7ec898a1598e024c95e5e551 81f4221b71209e631747d0debc564c23ebaed7ec 4f4683f6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6f:21:4a:14:94:2a:20:b2:63:0f:09:e7:1c:fd:ce:e5:38:03:4c:8f] modulus: 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 public exponent: 10001 ] 2022-04-06 06:45:14.960  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-06 06:45:14.964 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-06 06:45:14.967 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-06 06:45:14.968 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-06 06:45:14.969  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-06 06:45:14.970  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-06 06:45:14.970  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-06 06:45:14.971 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-06 06:45:14.972 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-06 06:45:14.973 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-06 06:45:14.987 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-06 06:45:14.989 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-06 06:45:14.990 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-06 06:45:14.990 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-06 06:45:15.721  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-06 06:45:15.723  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-06 06:45:15.724 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-06 06:45:15.724 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-06 06:45:15.727  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-06 06:45:15.728  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-06 06:45:15.742 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-06 06:45:15.745 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-06 06:45:15.746 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-06 06:45:15.750 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-06 06:45:15.751 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-06 06:45:15.752 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-06 06:45:15.753 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-06 06:45:15.754 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-06 06:45:15.754 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-06 06:45:15.757 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-06 06:45:15.769 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 286500132127456462077644110966318802653803337020 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Apr 06 05:07:42 UTC 2022 Final Date: Mon Apr 05 05:07:41 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3b:57:38:cd:cd:20:a9:b0:15:46:3a:28:60:dd:e9:57:51:ec:44:24] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5cfd7e63fb5a5593484c9db74bcd466f7a8ee62d 6063ef8aa2296a3be8121f17ac387d82eb496d02 2fcf3fe2d1f74ee9c51475cc026d737d78e81a8c 3c30ef256eb7341cb984f66d3efc2377172bfab7 1538cef5255b44c8aeede9ee31772955501fff4c 153d510c57f099f1673cfa840f523144f6845e5e 7038ed5e7e98dd5b7f557868bbfc53faf92c9908 1feb47b90c019268e445ffcd18be13a870d9c75e 484aeff3a2c517aaa86fcf7725d1aa4cfd677939 15497ea443b0e5ad17ae8f5c80b72b5e787293cc 0e89915c8681e04a469a5147e2d2fd29b87bc952 e7d5206e972afff9fe7570feb669228f39e363fc a4ee4a2ef26632a83ccd8545c4fa1efb86cc9ad9 2e43c328f4bf610bd2da4a0460e70f014cdf1474 cc7cbcbc9e6ccfaeb2aa3965f645ca1c8a9fadc6 41c8358e75e2d640519f2e2cee471d056154f2ce ce65f1c74d6b7776562c3ec8af8d3b8f1fac438a a042af7d0d4f05cf7ec898a1598e024c95e5e551 81f4221b71209e631747d0debc564c23ebaed7ec 4f4683f6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [51:0c:3f:1a:8f:ad:21:66:bf:08:ec:bd:07:e1:aa:bb:3b:03:6b:49] modulus: f3537829a67c819108bac6eba7e1adb4625f8bdc742a6bd8260673822b03ccc6f93f57c452bd7a2c6d927caef957615c63357efb890b070d885d410f6f622da9573a225d8bef12c65e7d5de8d5c4981dfff7e39617c8f4a20f6529b83c6c8c0d66ff559f73608cd17280f29b853ef945351a53fab8e2c0da6274e798030df0ea092db5b4b44b71f19d67f19e3d69cb7d99761b7709c3debf977520329ee762b4c16524f6cbdcb02dc84d2b7fc233acfa6d09ec633053b4c817555267a1204043bcac207b33edcd275385f7a4d7fbfd5289d3dc81ff199e0d5eb114a95cb5a4525e3997c20a4a6f9579e2b1cc369c745711decd5b50a9ef335fe79fb9e74478b5 public exponent: 10001 ] 2022-04-06 06:50:43.267  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-06 06:50:43.269 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-06 06:50:43.272 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-06 06:50:43.273 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-06 06:50:43.274  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-06 06:50:43.275  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-06 06:50:43.276  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-06 06:50:43.276 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-06 06:50:43.277 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-06 06:50:43.277 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-06 06:50:43.285 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-06 06:50:43.289 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-06 06:50:43.290 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-06 06:50:43.290 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-06 06:50:43.817  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-06 06:50:43.819  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-06 06:50:43.820 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-06 06:50:43.821 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-06 06:50:43.825  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-06 06:50:43.827  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-06 06:50:43.828 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-06 06:50:43.829 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-06 06:50:43.829 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-06 06:50:43.831 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-06 06:50:43.831 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-06 06:50:43.832 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-06 06:50:43.834 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-06 06:50:43.834 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-06 06:50:43.835 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-06 06:50:43.836 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-06 06:50:43.841 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 286500132127456462077644110966318802653803337020 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Apr 06 05:07:42 UTC 2022 Final Date: Mon Apr 05 05:07:41 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3b:57:38:cd:cd:20:a9:b0:15:46:3a:28:60:dd:e9:57:51:ec:44:24] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5cfd7e63fb5a5593484c9db74bcd466f7a8ee62d 6063ef8aa2296a3be8121f17ac387d82eb496d02 2fcf3fe2d1f74ee9c51475cc026d737d78e81a8c 3c30ef256eb7341cb984f66d3efc2377172bfab7 1538cef5255b44c8aeede9ee31772955501fff4c 153d510c57f099f1673cfa840f523144f6845e5e 7038ed5e7e98dd5b7f557868bbfc53faf92c9908 1feb47b90c019268e445ffcd18be13a870d9c75e 484aeff3a2c517aaa86fcf7725d1aa4cfd677939 15497ea443b0e5ad17ae8f5c80b72b5e787293cc 0e89915c8681e04a469a5147e2d2fd29b87bc952 e7d5206e972afff9fe7570feb669228f39e363fc a4ee4a2ef26632a83ccd8545c4fa1efb86cc9ad9 2e43c328f4bf610bd2da4a0460e70f014cdf1474 cc7cbcbc9e6ccfaeb2aa3965f645ca1c8a9fadc6 41c8358e75e2d640519f2e2cee471d056154f2ce ce65f1c74d6b7776562c3ec8af8d3b8f1fac438a a042af7d0d4f05cf7ec898a1598e024c95e5e551 81f4221b71209e631747d0debc564c23ebaed7ec 4f4683f6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [05:82:e4:39:93:77:14:a4:2f:93:ac:3a:47:35:f3:25:b7:1f:e9:c2] modulus: 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 public exponent: 10001 ] 2022-04-06 06:55:14.400  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-06 06:55:14.402 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-06 06:55:14.404 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-06 06:55:14.405 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-06 06:55:14.406  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-06 06:55:14.407  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-06 06:55:14.407  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-06 06:55:14.408 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-06 06:55:14.408 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-06 06:55:14.409 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-06 06:55:14.416 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-06 06:55:14.418 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-06 06:55:14.418 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-06 06:55:14.419 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-06 06:55:14.725  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-06 06:55:14.726  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-06 06:55:14.726 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-06 06:55:14.727 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-06 06:55:14.728  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-06 06:55:14.728  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-06 06:55:14.729 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-06 06:55:14.729 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-06 06:55:14.729 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-06 06:55:14.730 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-06 06:55:14.730 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-06 06:55:14.731 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-06 06:55:14.731 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-06 06:55:14.732 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-06 06:55:14.732 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-06 06:55:14.733 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-06 06:55:14.737 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 286500132127456462077644110966318802653803337020 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Apr 06 05:07:42 UTC 2022 Final Date: Mon Apr 05 05:07:41 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3b:57:38:cd:cd:20:a9:b0:15:46:3a:28:60:dd:e9:57:51:ec:44:24] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5cfd7e63fb5a5593484c9db74bcd466f7a8ee62d 6063ef8aa2296a3be8121f17ac387d82eb496d02 2fcf3fe2d1f74ee9c51475cc026d737d78e81a8c 3c30ef256eb7341cb984f66d3efc2377172bfab7 1538cef5255b44c8aeede9ee31772955501fff4c 153d510c57f099f1673cfa840f523144f6845e5e 7038ed5e7e98dd5b7f557868bbfc53faf92c9908 1feb47b90c019268e445ffcd18be13a870d9c75e 484aeff3a2c517aaa86fcf7725d1aa4cfd677939 15497ea443b0e5ad17ae8f5c80b72b5e787293cc 0e89915c8681e04a469a5147e2d2fd29b87bc952 e7d5206e972afff9fe7570feb669228f39e363fc a4ee4a2ef26632a83ccd8545c4fa1efb86cc9ad9 2e43c328f4bf610bd2da4a0460e70f014cdf1474 cc7cbcbc9e6ccfaeb2aa3965f645ca1c8a9fadc6 41c8358e75e2d640519f2e2cee471d056154f2ce ce65f1c74d6b7776562c3ec8af8d3b8f1fac438a a042af7d0d4f05cf7ec898a1598e024c95e5e551 81f4221b71209e631747d0debc564c23ebaed7ec 4f4683f6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f2:3d:64:93:c0:cc:17:ce:c9:e8:a2:25:f8:b8:31:89:eb:34:d6:c4] modulus: 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 public exponent: 10001 ] 2022-04-06 06:59:12.050  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-06 06:59:12.053 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-06 06:59:12.056 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-06 06:59:12.058 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-06 06:59:12.058  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-06 06:59:12.059  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-06 06:59:12.060  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-06 06:59:12.060 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-06 06:59:12.061 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-06 06:59:12.062 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-06 06:59:12.069 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-06 06:59:12.070 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-06 06:59:12.071 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-06 06:59:12.071 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-06 06:59:12.449  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-06 06:59:12.449  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-06 06:59:12.450 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-06 06:59:12.450 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-06 06:59:12.451  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-06 06:59:12.452  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-06 06:59:12.452 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-06 06:59:12.453 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-06 06:59:12.453 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-06 06:59:12.453 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-06 06:59:12.454 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-06 06:59:12.455 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-06 06:59:12.456 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-06 06:59:12.456 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-06 06:59:12.457 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-06 06:59:12.458 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-06 06:59:12.461 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 286500132127456462077644110966318802653803337020 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Apr 06 05:07:42 UTC 2022 Final Date: Mon Apr 05 05:07:41 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3b:57:38:cd:cd:20:a9:b0:15:46:3a:28:60:dd:e9:57:51:ec:44:24] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5cfd7e63fb5a5593484c9db74bcd466f7a8ee62d 6063ef8aa2296a3be8121f17ac387d82eb496d02 2fcf3fe2d1f74ee9c51475cc026d737d78e81a8c 3c30ef256eb7341cb984f66d3efc2377172bfab7 1538cef5255b44c8aeede9ee31772955501fff4c 153d510c57f099f1673cfa840f523144f6845e5e 7038ed5e7e98dd5b7f557868bbfc53faf92c9908 1feb47b90c019268e445ffcd18be13a870d9c75e 484aeff3a2c517aaa86fcf7725d1aa4cfd677939 15497ea443b0e5ad17ae8f5c80b72b5e787293cc 0e89915c8681e04a469a5147e2d2fd29b87bc952 e7d5206e972afff9fe7570feb669228f39e363fc a4ee4a2ef26632a83ccd8545c4fa1efb86cc9ad9 2e43c328f4bf610bd2da4a0460e70f014cdf1474 cc7cbcbc9e6ccfaeb2aa3965f645ca1c8a9fadc6 41c8358e75e2d640519f2e2cee471d056154f2ce ce65f1c74d6b7776562c3ec8af8d3b8f1fac438a a042af7d0d4f05cf7ec898a1598e024c95e5e551 81f4221b71209e631747d0debc564c23ebaed7ec 4f4683f6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [11:15:b9:4f:8c:29:0e:96:58:a7:60:5f:78:a6:bb:15:99:a8:3c:a7] modulus: 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 public exponent: 10001 ] 2022-04-06 07:03:28.667  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-06 07:03:28.670 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-06 07:03:28.674 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-06 07:03:28.675 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-06 07:03:28.675  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-06 07:03:28.676  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-06 07:03:28.677  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-06 07:03:28.677 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-06 07:03:28.678 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-06 07:03:28.678 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-06 07:03:28.685 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-06 07:03:28.686 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-06 07:03:28.687 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-06 07:03:28.687 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-06 07:03:28.932  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-06 07:03:28.933  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-06 07:03:28.934 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-06 07:03:28.934 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-06 07:03:28.937  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-06 07:03:28.938  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-06 07:03:28.938 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-06 07:03:28.939 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-06 07:03:28.939 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-06 07:03:28.940 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-06 07:03:28.940 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-06 07:03:28.941 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-06 07:03:28.942 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-06 07:03:28.942 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-06 07:03:28.942 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-06 07:03:28.944 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-06 07:03:28.948 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 286500132127456462077644110966318802653803337020 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Apr 06 05:07:42 UTC 2022 Final Date: Mon Apr 05 05:07:41 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3b:57:38:cd:cd:20:a9:b0:15:46:3a:28:60:dd:e9:57:51:ec:44:24] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5cfd7e63fb5a5593484c9db74bcd466f7a8ee62d 6063ef8aa2296a3be8121f17ac387d82eb496d02 2fcf3fe2d1f74ee9c51475cc026d737d78e81a8c 3c30ef256eb7341cb984f66d3efc2377172bfab7 1538cef5255b44c8aeede9ee31772955501fff4c 153d510c57f099f1673cfa840f523144f6845e5e 7038ed5e7e98dd5b7f557868bbfc53faf92c9908 1feb47b90c019268e445ffcd18be13a870d9c75e 484aeff3a2c517aaa86fcf7725d1aa4cfd677939 15497ea443b0e5ad17ae8f5c80b72b5e787293cc 0e89915c8681e04a469a5147e2d2fd29b87bc952 e7d5206e972afff9fe7570feb669228f39e363fc a4ee4a2ef26632a83ccd8545c4fa1efb86cc9ad9 2e43c328f4bf610bd2da4a0460e70f014cdf1474 cc7cbcbc9e6ccfaeb2aa3965f645ca1c8a9fadc6 41c8358e75e2d640519f2e2cee471d056154f2ce ce65f1c74d6b7776562c3ec8af8d3b8f1fac438a a042af7d0d4f05cf7ec898a1598e024c95e5e551 81f4221b71209e631747d0debc564c23ebaed7ec 4f4683f6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [be:e0:79:9d:1e:cf:9c:75:b7:10:47:30:20:a7:f3:93:3b:0c:b5:aa] modulus: cd4ce6755713d441d2ae6774c67d078653fecced67d3e49861e56c933e7b1610291c46e911f43fe10d8c40f66e04bd9a6c6952d58040c132a5406896ebc5eefac09c9b84487562101d7dfe48fb85940af87854f9a35356d776206ca14fc4e22f0bb16a0aa379535c3362238e89ec7676a5b192545532e19bf42305b1f37824c5005588f6e6feea742877c3a1e388c30e56520ef8635d8ba01f90a637fe3d53fa22cfc6e8e317c773d73984f20ba14b123480e4527095faa5134c4ad7be6f27651a99bb4dd9f719e91a1913b335d00c83c6c041a0c4882a993357a1e024ac5826df0e1c5b1387277c28213bb38805c084aac84900f7bb7221bddf2433c4586127 public exponent: 10001 ] 2022-04-06 07:07:52.249  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-06 07:07:52.251 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-06 07:07:52.253 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-06 07:07:52.259 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-06 07:07:52.260  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-06 07:07:52.261  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-06 07:07:52.261  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-06 07:07:52.262 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-06 07:07:52.263 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-06 07:07:52.264 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-06 07:07:52.271 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-06 07:07:52.271 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-06 07:07:52.272 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-06 07:07:52.272 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-06 07:07:52.502  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-06 07:07:52.502  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-06 07:07:52.502 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-06 07:07:52.503 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-06 07:07:52.504  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-06 07:07:52.504  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-06 07:07:52.504 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-06 07:07:52.505 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-06 07:07:52.505 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-06 07:07:52.506 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-06 07:07:52.506 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-06 07:07:52.506 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-06 07:07:52.507 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-06 07:07:52.507 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-06 07:07:52.507 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-06 07:07:52.508 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-06 07:07:52.511 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 286500132127456462077644110966318802653803337020 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Apr 06 05:07:42 UTC 2022 Final Date: Mon Apr 05 05:07:41 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3b:57:38:cd:cd:20:a9:b0:15:46:3a:28:60:dd:e9:57:51:ec:44:24] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5cfd7e63fb5a5593484c9db74bcd466f7a8ee62d 6063ef8aa2296a3be8121f17ac387d82eb496d02 2fcf3fe2d1f74ee9c51475cc026d737d78e81a8c 3c30ef256eb7341cb984f66d3efc2377172bfab7 1538cef5255b44c8aeede9ee31772955501fff4c 153d510c57f099f1673cfa840f523144f6845e5e 7038ed5e7e98dd5b7f557868bbfc53faf92c9908 1feb47b90c019268e445ffcd18be13a870d9c75e 484aeff3a2c517aaa86fcf7725d1aa4cfd677939 15497ea443b0e5ad17ae8f5c80b72b5e787293cc 0e89915c8681e04a469a5147e2d2fd29b87bc952 e7d5206e972afff9fe7570feb669228f39e363fc a4ee4a2ef26632a83ccd8545c4fa1efb86cc9ad9 2e43c328f4bf610bd2da4a0460e70f014cdf1474 cc7cbcbc9e6ccfaeb2aa3965f645ca1c8a9fadc6 41c8358e75e2d640519f2e2cee471d056154f2ce ce65f1c74d6b7776562c3ec8af8d3b8f1fac438a a042af7d0d4f05cf7ec898a1598e024c95e5e551 81f4221b71209e631747d0debc564c23ebaed7ec 4f4683f6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0d:18:43:64:71:47:d8:14:38:c7:a5:47:51:65:29:06:4f:a5:67:d2] modulus: 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 public exponent: 10001 ] 2022-04-06 07:11:20.612  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-06 07:11:20.614 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-06 07:11:20.616 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-04-06 07:11:20.617 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-06 07:11:20.617  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-04-06 07:11:20.618  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-06 07:11:20.619  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-06 07:11:20.619 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-06 07:11:20.619 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-06 07:11:20.619 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-06 07:11:20.625 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-06 07:11:20.626 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-06 07:11:20.626 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-06 07:11:20.626 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-06 07:11:20.853  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-06 07:11:20.854  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-06 07:11:20.855 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-06 07:11:20.855 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-06 07:11:20.857  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-06 07:11:20.857  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-06 07:11:20.858 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-06 07:11:20.858 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-06 07:11:20.858 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-06 07:11:20.859 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-06 07:11:20.859 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-06 07:11:20.860 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-06 07:11:20.860 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-06 07:11:20.861 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-06 07:11:20.861 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-06 07:11:20.862 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-06 07:11:20.867 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 286500132127456462077644110966318802653803337020 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Apr 06 05:07:42 UTC 2022 Final Date: Mon Apr 05 05:07:41 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3b:57:38:cd:cd:20:a9:b0:15:46:3a:28:60:dd:e9:57:51:ec:44:24] modulus: 996f2b04d532f1810a18c10f954e6f19965747b20e03d86fa4a9acb3b05a47e9bc1663cf9333a15d72980fa6eac29739675bd1258293b59f7c401e1cba1a44aafb649eb87c6ac38229ad807b4e0f478ffd2031b6418814b297d6072d9c786d0fe51b485dfdc75a7c43430374948353fc212642b79627b9f8fac39eae352f4c92a11d5f44349206f50bee38a442bfb295a242db66e912747c6aad86da030642e737ec25ba0bd35d6f162d10a373cf43dad313198ab2caca1d78a967327984536a18f3001977c71f1530e3a1407950662b26a6cb17d3ed3bcce14e9e8eac14c741068498cfb4d1efdcda2ae94474ad980d16ed7a1b0cc86ccefa60e2ed9fe4838f716bc26ff5b06a2223997851ba027d2eaa1f3ca2b125cc0bbb11e04f53a578ed5efcd1bd3d22bb0a9a82e3430be856e0b64bf49c34dabaf2087fc6d7de75189111e453160429393044f621d6f94a26daca1373663019bcb6a8d35571b0a2fe98da78d425b20a192a5d16bf250a60d8a2c10e03784efe42bb545ae77397129e91 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5cfd7e63fb5a5593484c9db74bcd466f7a8ee62d 6063ef8aa2296a3be8121f17ac387d82eb496d02 2fcf3fe2d1f74ee9c51475cc026d737d78e81a8c 3c30ef256eb7341cb984f66d3efc2377172bfab7 1538cef5255b44c8aeede9ee31772955501fff4c 153d510c57f099f1673cfa840f523144f6845e5e 7038ed5e7e98dd5b7f557868bbfc53faf92c9908 1feb47b90c019268e445ffcd18be13a870d9c75e 484aeff3a2c517aaa86fcf7725d1aa4cfd677939 15497ea443b0e5ad17ae8f5c80b72b5e787293cc 0e89915c8681e04a469a5147e2d2fd29b87bc952 e7d5206e972afff9fe7570feb669228f39e363fc a4ee4a2ef26632a83ccd8545c4fa1efb86cc9ad9 2e43c328f4bf610bd2da4a0460e70f014cdf1474 cc7cbcbc9e6ccfaeb2aa3965f645ca1c8a9fadc6 41c8358e75e2d640519f2e2cee471d056154f2ce ce65f1c74d6b7776562c3ec8af8d3b8f1fac438a a042af7d0d4f05cf7ec898a1598e024c95e5e551 81f4221b71209e631747d0debc564c23ebaed7ec 4f4683f6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [90:66:1b:ff:0f:e6:e1:15:e5:7f:16:0c:4b:d5:4a:be:4a:a6:0c:24] modulus: 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 public exponent: 10001 ] 2022-04-06 07:11:25.875  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-06 07:11:25.875 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-06 07:11:25.876 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-04-06 07:11:25.877 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-06 07:11:25.878  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-04-06 07:11:25.878  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-06 07:11:25.879  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-06 07:11:25.879 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-06 07:11:25.879 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-06 07:11:25.880 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-06 07:11:25.885 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-06 07:11:25.885 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-06 07:11:25.886 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-06 07:11:25.886 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-06 07:11:26.056  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-06 07:11:26.056  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-06 07:11:26.057 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-06 07:11:26.057 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-06 07:11:26.059  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-06 07:11:26.059  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-06 07:11:26.060 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-06 07:11:26.060 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-06 07:11:26.060 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-06 07:11:26.061 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-06 07:11:26.061 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-06 07:11:26.062 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-06 07:11:26.064 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-06 07:11:26.064 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-06 07:11:26.066 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-06 07:11:26.068 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-06 07:11:26.078 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 286500132127456462077644110966318802653803337020 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Apr 06 05:07:42 UTC 2022 Final Date: Mon Apr 05 05:07:41 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3b:57:38:cd:cd:20:a9:b0:15:46:3a:28:60:dd:e9:57:51:ec:44:24] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5cfd7e63fb5a5593484c9db74bcd466f7a8ee62d 6063ef8aa2296a3be8121f17ac387d82eb496d02 2fcf3fe2d1f74ee9c51475cc026d737d78e81a8c 3c30ef256eb7341cb984f66d3efc2377172bfab7 1538cef5255b44c8aeede9ee31772955501fff4c 153d510c57f099f1673cfa840f523144f6845e5e 7038ed5e7e98dd5b7f557868bbfc53faf92c9908 1feb47b90c019268e445ffcd18be13a870d9c75e 484aeff3a2c517aaa86fcf7725d1aa4cfd677939 15497ea443b0e5ad17ae8f5c80b72b5e787293cc 0e89915c8681e04a469a5147e2d2fd29b87bc952 e7d5206e972afff9fe7570feb669228f39e363fc a4ee4a2ef26632a83ccd8545c4fa1efb86cc9ad9 2e43c328f4bf610bd2da4a0460e70f014cdf1474 cc7cbcbc9e6ccfaeb2aa3965f645ca1c8a9fadc6 41c8358e75e2d640519f2e2cee471d056154f2ce ce65f1c74d6b7776562c3ec8af8d3b8f1fac438a a042af7d0d4f05cf7ec898a1598e024c95e5e551 81f4221b71209e631747d0debc564c23ebaed7ec 4f4683f6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [14:7b:a7:92:e6:2c:73:2a:ec:b7:4b:13:6e:02:3c:31:2f:1d:3f:f7] modulus: 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 public exponent: 10001 ] 2022-04-06 07:12:10.191  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-06 07:12:10.192 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-06 07:12:10.194 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-06 07:12:10.195 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-06 07:12:10.195  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-06 07:12:10.196  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-06 07:12:10.196  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-06 07:12:10.196 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-06 07:12:10.197 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-06 07:12:10.197 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-06 07:12:10.202 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-06 07:12:10.202 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-06 07:12:10.203 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-06 07:12:10.203 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-06 07:12:10.345  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-06 07:12:10.346  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-06 07:12:10.346 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-06 07:12:10.346 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-06 07:12:10.348  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-06 07:12:10.348  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-06 07:12:10.349 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-06 07:12:10.349 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-06 07:12:10.349 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-06 07:12:10.350 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-06 07:12:10.351 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-06 07:12:10.351 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-06 07:12:10.352 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-06 07:12:10.352 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-06 07:12:10.352 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-06 07:12:10.353 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-06 07:12:10.357 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 286500132127456462077644110966318802653803337020 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Apr 06 05:07:42 UTC 2022 Final Date: Mon Apr 05 05:07:41 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [3b:57:38:cd:cd:20:a9:b0:15:46:3a:28:60:dd:e9:57:51:ec:44:24] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 5cfd7e63fb5a5593484c9db74bcd466f7a8ee62d 6063ef8aa2296a3be8121f17ac387d82eb496d02 2fcf3fe2d1f74ee9c51475cc026d737d78e81a8c 3c30ef256eb7341cb984f66d3efc2377172bfab7 1538cef5255b44c8aeede9ee31772955501fff4c 153d510c57f099f1673cfa840f523144f6845e5e 7038ed5e7e98dd5b7f557868bbfc53faf92c9908 1feb47b90c019268e445ffcd18be13a870d9c75e 484aeff3a2c517aaa86fcf7725d1aa4cfd677939 15497ea443b0e5ad17ae8f5c80b72b5e787293cc 0e89915c8681e04a469a5147e2d2fd29b87bc952 e7d5206e972afff9fe7570feb669228f39e363fc a4ee4a2ef26632a83ccd8545c4fa1efb86cc9ad9 2e43c328f4bf610bd2da4a0460e70f014cdf1474 cc7cbcbc9e6ccfaeb2aa3965f645ca1c8a9fadc6 41c8358e75e2d640519f2e2cee471d056154f2ce ce65f1c74d6b7776562c3ec8af8d3b8f1fac438a a042af7d0d4f05cf7ec898a1598e024c95e5e551 81f4221b71209e631747d0debc564c23ebaed7ec 4f4683f6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f5:10:b5:a1:1a:08:ca:5d:ae:f6:ac:0a:6b:6c:b3:b5:61:65:c3:6e] modulus: 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 public exponent: 10001 ]