By type
2022-04-14 05:26:02,062 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-04-14 05:26:04,544 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-04-14 05:26:05.944 [32m INFO[m [35m1[m [ main] [36mo.s.b.SpringApplication [m : No active profile set, falling back to default profiles: default Apr 14, 2022 5:26:10 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Apr 14, 2022 5:26:10 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Apr 14, 2022 5:26:10 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Apr 14, 2022 5:26:10 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-04-14 05:26:11.812 [32mDEBUG[m [35m1[m [ main] [36mo.j.l.LoggerProviders [m : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-04-14 05:26:12.221 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : Loading initial configuration 2022-04-14 05:26:12.529 [32m INFO[m [35m1[m [ main] [36mo.o.o.c.c.c.CmpServersConfig [m : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-04-14 05:26:14.078 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-04-14 05:26:14.085 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-04-14 05:26:14.090 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-04-14 05:26:14.100 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-04-14 05:26:14.200 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.a.OpenApiResource: {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) 2022-04-14 05:26:14.206 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.AbstractHandlerMethodMapping [m : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-04-14 05:26:14.454 [32mDEBUG[m [35m1[m [ main] [36mw.s.h.AbstractDetectingUrlHandlerMapping[m : 'beanNameHandlerMapping' {} 2022-04-14 05:26:15.463 [32mDEBUG[m [35m1[m [ main] [36mo.s.w.s.h.SimpleUrlHandlerMapping [m : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Apr 14, 2022 5:26:16 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-04-14 05:26:17.348 [32m INFO[m [35m1[m [ main] [36mo.s.b.StartupInfoLogger [m : Started CertServiceApplication in 17.311 seconds (JVM running for 21.409) Apr 14, 2022 5:26:30 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-04-14 05:27:02.168 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-14 05:27:02.182 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-14 05:27:02.281 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-04-14 05:27:02.287 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-14 05:27:02.310 [32m INFO[m [35m1[m [nio-8443-exec-2] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-04-14 05:27:02.314 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-14 05:27:02.316 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-14 05:27:02.317 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-14 05:27:02.318 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-14 05:27:02.336 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-14 05:27:02.344 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-14 05:27:02.349 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-14 05:27:02.420 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-14 05:27:02.434 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-14 05:27:02.435 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-14 05:27:02.443 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 05:27:03.452 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-14 05:27:03.457 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-14 05:27:03.458 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-14 05:27:03.462 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 05:27:03.482 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-14 05:27:03.487 [32m INFO[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-14 05:27:03.490 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 05:27:03.493 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-14 05:27:03.494 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-14 05:27:03.526 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 05:27:03.527 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-14 05:27:03.528 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-14 05:27:03.541 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 05:27:03.543 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-14 05:27:03.543 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-14 05:27:03.547 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-14 05:27:03.598 [32mDEBUG[m [35m1[m [nio-8443-exec-2] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 475972631464779826877858674307339937170790561302 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 14 05:20:19 UTC 2022 Final Date: Tue Apr 13 05:20:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [03:45:76:25:e3:28:ca:3d:66:2c:29:3d:27:b1:e6:8d:d2:da:6f:75] modulus: 99ee77723024687ce7fb901a5bfd25cb4704952dbf031f1d711ed0e8f6b4bb1bdf03792293f98fdf54462962a1b7e99b3d854dad637a500ee56ad77346b022a190500598a9dcd15b5c4ec22ef439c986974f796e574e83cef7c7a38117fbe5c0f710566f667c39fc97523365e15058a9d5bf2403c8ee7e8eb53f5a8384e95e851ea251b249eff89a1e3e97a93db10e51d293db4b01fa95783edda5c6c21f0369518a112a7cfc3c8107a296807f1a577f3fef631233d29800823182f75349f6fe79a8a83cb2165f8c066d7e6552af740b56013338b9ecc824de4d7e55980cf7ad7ba112af0c17ebb289b0ff1b4b1145ed337c6edc1f0eb575227e1ecc849949ed4647dd4a13c40b1eb43a4d32a8c5b78b63ab1b8ce1fcffbd9fd763d4ed22fd839bd8adfecbab11ac77b874f8d3a0c54aac4e62596dfe9476e70a814ec447b1848e3d08f4f6578d651a587c02fcf506b1d83f72aedcffb93f03f73f7eae2cc25f703f7216012cbf95c84f3d0629d3b79f8a18c0f5078acb7bae84d9f0d33d580f public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8e7156ceeb0f30b816d1c6a0c462d153c08fe579 92daf8370b0ea76ab8f9768a02fe214f77728ab7 9036a34fa9ab2709d7175747480e1b4b83a429da 25e7b36b3da72c2e85854c9bddc95158ea141087 707b7f362b916f1302e9a553e572ff2f5825557f d760d96e11da4dfa2d69eaac7d8083f922ce0cba f0888bdb36498f3d2b115e08a4903af1a286b7f1 3f646cb4fad7d3aedd1f625320470785740899d3 2b9692e254f61e5b0a5f3e31fffb35711dfec9d4 d79fd547a869fb4ea3ed6ac3c5ec3b90d2ead7d7 e8bff560910ae43c1670aab44855fb64ed8a4d1d 0ffbe36a5983d6efd2a2189083d34c94af83dec9 086efd384a4965c237553fc416bec954a5f81f45 6b7e027db805cdbde8924880413b17033c7af36f 5c2d7fe465c625b3ae76331febdce236e8caf647 944e9ca40a7d3c5928cc6eb190d35f06f3b44933 068235efb6062e05c9b73111b55d62d6cfb4be9b 65691bf0a6022a40ec9e77cf8c8e5bb1f1e2b845 291ce653bb445563f4b0c4eb43d5a2f63e63cfd4 a7cac1a1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [be:81:bc:7f:0f:6c:b4:b1:c2:cd:55:65:64:a4:2c:77:81:6b:21:e0] modulus: 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 public exponent: 10001 ] 2022-04-14 07:44:42.359 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-14 07:44:42.362 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-14 07:44:42.367 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-04-14 07:44:42.368 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-14 07:44:42.370 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-04-14 07:44:42.375 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-14 07:44:42.376 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-14 07:44:42.377 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-14 07:44:42.379 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-14 07:44:42.381 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-14 07:44:42.416 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-14 07:44:42.417 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-14 07:44:42.418 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-14 07:44:42.420 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 07:44:42.737 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-14 07:44:42.739 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-14 07:44:42.740 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-14 07:44:42.740 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 07:44:42.750 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-14 07:44:42.751 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-14 07:44:42.751 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 07:44:42.755 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-14 07:44:42.755 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-14 07:44:42.758 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 07:44:42.759 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-14 07:44:42.759 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-14 07:44:42.763 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 07:44:42.765 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-14 07:44:42.765 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-14 07:44:42.767 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-14 07:44:42.782 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 475972631464779826877858674307339937170790561302 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 14 05:20:19 UTC 2022 Final Date: Tue Apr 13 05:20:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [03:45:76:25:e3:28:ca:3d:66:2c:29:3d:27:b1:e6:8d:d2:da:6f:75] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8e7156ceeb0f30b816d1c6a0c462d153c08fe579 92daf8370b0ea76ab8f9768a02fe214f77728ab7 9036a34fa9ab2709d7175747480e1b4b83a429da 25e7b36b3da72c2e85854c9bddc95158ea141087 707b7f362b916f1302e9a553e572ff2f5825557f d760d96e11da4dfa2d69eaac7d8083f922ce0cba f0888bdb36498f3d2b115e08a4903af1a286b7f1 3f646cb4fad7d3aedd1f625320470785740899d3 2b9692e254f61e5b0a5f3e31fffb35711dfec9d4 d79fd547a869fb4ea3ed6ac3c5ec3b90d2ead7d7 e8bff560910ae43c1670aab44855fb64ed8a4d1d 0ffbe36a5983d6efd2a2189083d34c94af83dec9 086efd384a4965c237553fc416bec954a5f81f45 6b7e027db805cdbde8924880413b17033c7af36f 5c2d7fe465c625b3ae76331febdce236e8caf647 944e9ca40a7d3c5928cc6eb190d35f06f3b44933 068235efb6062e05c9b73111b55d62d6cfb4be9b 65691bf0a6022a40ec9e77cf8c8e5bb1f1e2b845 291ce653bb445563f4b0c4eb43d5a2f63e63cfd4 a7cac1a1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4d:5b:2a:e0:17:72:63:9d:45:e4:18:ce:56:cd:4c:6a:a8:1e:69:01] modulus: b34830a2a483039f89a014ad92f27617d55059959a10cf6b18501d0bb2003397f8616f9be368404d0e87e99515db0a03bc8c8c72563d81b8c4d99e3f6dc82e18acbfd94cff168e403c6a90eae8ebe7a2aa8e1d9b4403549d169a6e52a1e4d8ca0dbf774a2f02fc57a5991f2be93ef2661a30c0144304ca3edfbcb055f138178ad086e3d34786aaa8ef3e9c32efcf190fef3526570afb1e97343c7d69a4bf2ae9f35537fcfecfc4efb2e46e9309f0abe143887fd03a3f426c41f0bf81c8c0b4f058d1bcc3e2baf5eb33d4dd83ec915663504ac4129eb5175d19982c7e784da03428805890b832e61ec89dc0447b479a453ba0342226c51ea3f73d419c811d0d09 public exponent: 10001 ] 2022-04-14 07:45:04.955 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-14 07:45:04.961 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-14 07:45:04.964 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-14 07:45:04.966 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-14 07:45:04.967 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-14 07:45:04.968 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-14 07:45:04.969 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-14 07:45:04.969 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-14 07:45:04.970 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-14 07:45:04.971 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-14 07:45:04.995 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-14 07:45:04.996 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-14 07:45:04.996 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-14 07:45:04.997 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 07:45:05.190 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-14 07:45:05.192 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-14 07:45:05.192 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-14 07:45:05.193 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 07:45:05.201 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-14 07:45:05.209 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-14 07:45:05.211 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 07:45:05.211 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-14 07:45:05.212 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-14 07:45:05.218 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 07:45:05.219 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-14 07:45:05.220 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-14 07:45:05.222 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 07:45:05.227 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-14 07:45:05.230 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-14 07:45:05.234 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-14 07:45:05.248 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 475972631464779826877858674307339937170790561302 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 14 05:20:19 UTC 2022 Final Date: Tue Apr 13 05:20:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [03:45:76:25:e3:28:ca:3d:66:2c:29:3d:27:b1:e6:8d:d2:da:6f:75] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8e7156ceeb0f30b816d1c6a0c462d153c08fe579 92daf8370b0ea76ab8f9768a02fe214f77728ab7 9036a34fa9ab2709d7175747480e1b4b83a429da 25e7b36b3da72c2e85854c9bddc95158ea141087 707b7f362b916f1302e9a553e572ff2f5825557f d760d96e11da4dfa2d69eaac7d8083f922ce0cba f0888bdb36498f3d2b115e08a4903af1a286b7f1 3f646cb4fad7d3aedd1f625320470785740899d3 2b9692e254f61e5b0a5f3e31fffb35711dfec9d4 d79fd547a869fb4ea3ed6ac3c5ec3b90d2ead7d7 e8bff560910ae43c1670aab44855fb64ed8a4d1d 0ffbe36a5983d6efd2a2189083d34c94af83dec9 086efd384a4965c237553fc416bec954a5f81f45 6b7e027db805cdbde8924880413b17033c7af36f 5c2d7fe465c625b3ae76331febdce236e8caf647 944e9ca40a7d3c5928cc6eb190d35f06f3b44933 068235efb6062e05c9b73111b55d62d6cfb4be9b 65691bf0a6022a40ec9e77cf8c8e5bb1f1e2b845 291ce653bb445563f4b0c4eb43d5a2f63e63cfd4 a7cac1a1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c1:e8:1a:04:cd:6c:1f:b4:c6:c1:10:5a:9e:90:eb:f3:0f:3a:37:92] modulus: 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 public exponent: 10001 ] 2022-04-14 07:46:53.171 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-14 07:46:53.174 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-14 07:46:53.177 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-04-14 07:46:53.178 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-14 07:46:53.179 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-04-14 07:46:53.180 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-14 07:46:53.181 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-14 07:46:53.181 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-14 07:46:53.182 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-14 07:46:53.182 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-14 07:46:53.189 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-14 07:46:53.190 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-14 07:46:53.190 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-14 07:46:53.191 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 07:46:53.390 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-14 07:46:53.391 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-14 07:46:53.407 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-14 07:46:53.408 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 07:46:53.415 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-14 07:46:53.416 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-14 07:46:53.417 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 07:46:53.418 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-14 07:46:53.419 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-14 07:46:53.421 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 07:46:53.422 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-14 07:46:53.422 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-14 07:46:53.424 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 07:46:53.425 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-14 07:46:53.425 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-14 07:46:53.427 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-14 07:46:53.442 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 475972631464779826877858674307339937170790561302 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 14 05:20:19 UTC 2022 Final Date: Tue Apr 13 05:20:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [03:45:76:25:e3:28:ca:3d:66:2c:29:3d:27:b1:e6:8d:d2:da:6f:75] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8e7156ceeb0f30b816d1c6a0c462d153c08fe579 92daf8370b0ea76ab8f9768a02fe214f77728ab7 9036a34fa9ab2709d7175747480e1b4b83a429da 25e7b36b3da72c2e85854c9bddc95158ea141087 707b7f362b916f1302e9a553e572ff2f5825557f d760d96e11da4dfa2d69eaac7d8083f922ce0cba f0888bdb36498f3d2b115e08a4903af1a286b7f1 3f646cb4fad7d3aedd1f625320470785740899d3 2b9692e254f61e5b0a5f3e31fffb35711dfec9d4 d79fd547a869fb4ea3ed6ac3c5ec3b90d2ead7d7 e8bff560910ae43c1670aab44855fb64ed8a4d1d 0ffbe36a5983d6efd2a2189083d34c94af83dec9 086efd384a4965c237553fc416bec954a5f81f45 6b7e027db805cdbde8924880413b17033c7af36f 5c2d7fe465c625b3ae76331febdce236e8caf647 944e9ca40a7d3c5928cc6eb190d35f06f3b44933 068235efb6062e05c9b73111b55d62d6cfb4be9b 65691bf0a6022a40ec9e77cf8c8e5bb1f1e2b845 291ce653bb445563f4b0c4eb43d5a2f63e63cfd4 a7cac1a1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [af:79:ae:68:5c:c8:98:3e:38:56:53:12:60:93:be:95:27:62:13:be] modulus: af1b5aedd53430757c76dde7e82f295ef77ef844d57ca12a0fddf896d48cbcaf2d60551ad574c1eaa77a66d5f71f53e8032d5b5916941ce09646be6b27634afd898afce91512ad7ce2b3b86f43914d8b19df0723aef1887d5ae61c6ee901624716294af84eae5607658fe1f4cc1db33a8355e9798906ab3bc3b41842bacd476bd590ff1f6a041e94c8be6a2a9cc5237706bca51b4c3d65728f3c8edeeec51302b03d300db0a8676cb1f901b21e9188e0acee1cebf053500f903b6d0c077a87edfffa2940ff140aa55f9b7d605f49aadd4267f12606d15032f2c19764f5e45d830ae6dde2ba4c05fd269e6f00ce66d49dd080c20c6ebfac28cd996f3978de780d public exponent: 10001 ] 2022-04-14 07:49:01.845 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-14 07:49:01.847 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-14 07:49:01.851 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-04-14 07:49:01.852 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-14 07:49:01.853 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-04-14 07:49:01.855 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-14 07:49:01.855 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-14 07:49:01.856 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-14 07:49:01.857 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-14 07:49:01.858 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-14 07:49:01.866 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-14 07:49:01.868 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-14 07:49:01.869 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-14 07:49:01.870 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 07:49:02.084 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-14 07:49:02.085 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-14 07:49:02.086 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-14 07:49:02.087 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 07:49:02.090 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-14 07:49:02.092 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-14 07:49:02.096 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 07:49:02.097 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-14 07:49:02.098 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-14 07:49:02.099 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 07:49:02.100 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-14 07:49:02.101 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-14 07:49:02.102 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 07:49:02.103 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-14 07:49:02.104 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-14 07:49:02.105 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-14 07:49:02.112 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 475972631464779826877858674307339937170790561302 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 14 05:20:19 UTC 2022 Final Date: Tue Apr 13 05:20:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [03:45:76:25:e3:28:ca:3d:66:2c:29:3d:27:b1:e6:8d:d2:da:6f:75] modulus: 99ee77723024687ce7fb901a5bfd25cb4704952dbf031f1d711ed0e8f6b4bb1bdf03792293f98fdf54462962a1b7e99b3d854dad637a500ee56ad77346b022a190500598a9dcd15b5c4ec22ef439c986974f796e574e83cef7c7a38117fbe5c0f710566f667c39fc97523365e15058a9d5bf2403c8ee7e8eb53f5a8384e95e851ea251b249eff89a1e3e97a93db10e51d293db4b01fa95783edda5c6c21f0369518a112a7cfc3c8107a296807f1a577f3fef631233d29800823182f75349f6fe79a8a83cb2165f8c066d7e6552af740b56013338b9ecc824de4d7e55980cf7ad7ba112af0c17ebb289b0ff1b4b1145ed337c6edc1f0eb575227e1ecc849949ed4647dd4a13c40b1eb43a4d32a8c5b78b63ab1b8ce1fcffbd9fd763d4ed22fd839bd8adfecbab11ac77b874f8d3a0c54aac4e62596dfe9476e70a814ec447b1848e3d08f4f6578d651a587c02fcf506b1d83f72aedcffb93f03f73f7eae2cc25f703f7216012cbf95c84f3d0629d3b79f8a18c0f5078acb7bae84d9f0d33d580f public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8e7156ceeb0f30b816d1c6a0c462d153c08fe579 92daf8370b0ea76ab8f9768a02fe214f77728ab7 9036a34fa9ab2709d7175747480e1b4b83a429da 25e7b36b3da72c2e85854c9bddc95158ea141087 707b7f362b916f1302e9a553e572ff2f5825557f d760d96e11da4dfa2d69eaac7d8083f922ce0cba f0888bdb36498f3d2b115e08a4903af1a286b7f1 3f646cb4fad7d3aedd1f625320470785740899d3 2b9692e254f61e5b0a5f3e31fffb35711dfec9d4 d79fd547a869fb4ea3ed6ac3c5ec3b90d2ead7d7 e8bff560910ae43c1670aab44855fb64ed8a4d1d 0ffbe36a5983d6efd2a2189083d34c94af83dec9 086efd384a4965c237553fc416bec954a5f81f45 6b7e027db805cdbde8924880413b17033c7af36f 5c2d7fe465c625b3ae76331febdce236e8caf647 944e9ca40a7d3c5928cc6eb190d35f06f3b44933 068235efb6062e05c9b73111b55d62d6cfb4be9b 65691bf0a6022a40ec9e77cf8c8e5bb1f1e2b845 291ce653bb445563f4b0c4eb43d5a2f63e63cfd4 a7cac1a1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3b:f8:81:88:6f:63:ed:c1:4a:f5:83:08:b5:df:dd:c0:b1:76:4e:14] modulus: b2e90b35ac4ec52baea136c6ab0ff798bd6aea476be405bb663494353886ee1630c8b4fb73c13b0cbe88d23e24895237a3b363eb36ae4932a341e3e7f47f6e950b199ba330c8af85aa1dfb218f1f2dbce1a653f2d340ed19b22d4b4adc74ffc16c8d1adc7a0f833e137f325f357dd0bafdb7adee0d01226414b56c627cdc04463ee25f73641e32dab22fda59c45066f6760d6bc1f56785d5f5c6a3dfd1661964ec9feb452d485746247889d770e0b0a40a0f9fb3f13bee72bfe573fa7a3097991dfef10ce02536868edb9291192e43ede4f5cad4aa2f00079fe26c4bd0284337c25da83512704af265b508cbfc5a53be31c0051e87aa30ae3c0c9d4b817e345b public exponent: 10001 ] 2022-04-14 07:51:32.083 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-14 07:51:32.088 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-14 07:51:32.092 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-04-14 07:51:32.093 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-14 07:51:32.094 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-04-14 07:51:32.097 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-14 07:51:32.097 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-14 07:51:32.098 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-14 07:51:32.099 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-14 07:51:32.100 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-14 07:51:32.119 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-14 07:51:32.122 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-14 07:51:32.122 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-14 07:51:32.123 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 07:51:32.166 [31mERROR[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Error encountered while processing response from CA server java.lang.IllegalArgumentException: failed to construct sequence from byte[]: unknown tag 28 encountered at org.bouncycastle.asn1.ASN1Sequence.getInstance(Unknown Source) at org.bouncycastle.asn1.cmp.PKIMessage.getInstance(Unknown Source) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.retrieveCertificates(CmpClientImpl.java:171) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeCmpRequest(CmpClientImpl.java:144) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeInitializationRequest(CmpClientImpl.java:89) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeInitializationRequest(CmpClientImpl.java:95) at org.onap.oom.certservice.certification.CertificationProvider.executeInitializationRequest(CertificationProvider.java:58) at org.onap.oom.certservice.certification.CertificationResponseModelFactory.provideCertificationModelFromInitialRequest(CertificationResponseModelFactory.java:77) at org.onap.oom.certservice.api.CertificationController.signCertificate(CertificationController.java:94) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(Unknown Source) at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(Unknown Source) at java.base/java.lang.reflect.Method.invoke(Unknown Source) at org.springframework.web.method.support.InvocableHandlerMethod.doInvoke(InvocableHandlerMethod.java:205) at org.springframework.web.method.support.InvocableHandlerMethod.invokeForRequest(InvocableHandlerMethod.java:150) at org.springframework.web.servlet.mvc.method.annotation.ServletInvocableHandlerMethod.invokeAndHandle(ServletInvocableHandlerMethod.java:117) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.invokeHandlerMethod(RequestMappingHandlerAdapter.java:895) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.handleInternal(RequestMappingHandlerAdapter.java:808) at org.springframework.web.servlet.mvc.method.AbstractHandlerMethodAdapter.handle(AbstractHandlerMethodAdapter.java:87) at org.springframework.web.servlet.DispatcherServlet.doDispatch(DispatcherServlet.java:1067) at org.springframework.web.servlet.DispatcherServlet.doService(DispatcherServlet.java:963) at org.springframework.web.servlet.FrameworkServlet.processRequest(FrameworkServlet.java:1006) at org.springframework.web.servlet.FrameworkServlet.doGet(FrameworkServlet.java:898) at javax.servlet.http.HttpServlet.service(HttpServlet.java:655) at org.springframework.web.servlet.FrameworkServlet.service(FrameworkServlet.java:883) at javax.servlet.http.HttpServlet.service(HttpServlet.java:764) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:227) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:53) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:100) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.FormContentFilter.doFilterInternal(FormContentFilter.java:93) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.boot.actuate.metrics.web.servlet.WebMvcMetricsFilter.doFilterInternal(WebMvcMetricsFilter.java:96) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:201) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:197) at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:97) at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:540) at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:135) at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:92) at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:78) at org.apache.catalina.valves.RemoteIpValve.invoke(RemoteIpValve.java:769) at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:357) at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:382) at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:65) at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:895) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1732) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at org.apache.tomcat.util.threads.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1191) at org.apache.tomcat.util.threads.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:659) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Unknown Source) 2022-04-14 07:51:32.197 [31mERROR[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.a.CertificationExceptionAdvice[m : Exception occurred calling cmp client: org.onap.oom.certservice.cmpv2client.exceptions.CmpClientException: Error encountered while processing response from CA server at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.retrieveCertificates(CmpClientImpl.java:177) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeCmpRequest(CmpClientImpl.java:144) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeInitializationRequest(CmpClientImpl.java:89) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeInitializationRequest(CmpClientImpl.java:95) at org.onap.oom.certservice.certification.CertificationProvider.executeInitializationRequest(CertificationProvider.java:58) at org.onap.oom.certservice.certification.CertificationResponseModelFactory.provideCertificationModelFromInitialRequest(CertificationResponseModelFactory.java:77) at org.onap.oom.certservice.api.CertificationController.signCertificate(CertificationController.java:94) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(Unknown Source) at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(Unknown Source) at java.base/java.lang.reflect.Method.invoke(Unknown Source) at org.springframework.web.method.support.InvocableHandlerMethod.doInvoke(InvocableHandlerMethod.java:205) at org.springframework.web.method.support.InvocableHandlerMethod.invokeForRequest(InvocableHandlerMethod.java:150) at org.springframework.web.servlet.mvc.method.annotation.ServletInvocableHandlerMethod.invokeAndHandle(ServletInvocableHandlerMethod.java:117) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.invokeHandlerMethod(RequestMappingHandlerAdapter.java:895) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.handleInternal(RequestMappingHandlerAdapter.java:808) at org.springframework.web.servlet.mvc.method.AbstractHandlerMethodAdapter.handle(AbstractHandlerMethodAdapter.java:87) at org.springframework.web.servlet.DispatcherServlet.doDispatch(DispatcherServlet.java:1067) at org.springframework.web.servlet.DispatcherServlet.doService(DispatcherServlet.java:963) at org.springframework.web.servlet.FrameworkServlet.processRequest(FrameworkServlet.java:1006) at org.springframework.web.servlet.FrameworkServlet.doGet(FrameworkServlet.java:898) at javax.servlet.http.HttpServlet.service(HttpServlet.java:655) at org.springframework.web.servlet.FrameworkServlet.service(FrameworkServlet.java:883) at javax.servlet.http.HttpServlet.service(HttpServlet.java:764) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:227) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:53) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:100) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.FormContentFilter.doFilterInternal(FormContentFilter.java:93) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.boot.actuate.metrics.web.servlet.WebMvcMetricsFilter.doFilterInternal(WebMvcMetricsFilter.java:96) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:201) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:197) at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:97) at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:540) at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:135) at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:92) at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:78) at org.apache.catalina.valves.RemoteIpValve.invoke(RemoteIpValve.java:769) at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:357) at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:382) at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:65) at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:895) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1732) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at org.apache.tomcat.util.threads.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1191) at org.apache.tomcat.util.threads.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:659) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Unknown Source) Caused by: java.lang.IllegalArgumentException: failed to construct sequence from byte[]: unknown tag 28 encountered at org.bouncycastle.asn1.ASN1Sequence.getInstance(Unknown Source) at org.bouncycastle.asn1.cmp.PKIMessage.getInstance(Unknown Source) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.retrieveCertificates(CmpClientImpl.java:171) ... 61 more 2022-04-14 07:51:39.509 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-14 07:51:39.510 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-14 07:51:39.512 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-14 07:51:39.513 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-14 07:51:39.513 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-14 07:51:39.514 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-14 07:51:39.514 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-14 07:51:39.515 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-14 07:51:39.515 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-14 07:51:39.516 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-14 07:51:39.526 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-14 07:51:39.527 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-14 07:51:39.528 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-14 07:51:39.529 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 07:51:39.554 [31mERROR[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Error encountered while processing response from CA server java.lang.IllegalArgumentException: failed to construct sequence from byte[]: unknown tag 28 encountered at org.bouncycastle.asn1.ASN1Sequence.getInstance(Unknown Source) at org.bouncycastle.asn1.cmp.PKIMessage.getInstance(Unknown Source) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.retrieveCertificates(CmpClientImpl.java:171) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeCmpRequest(CmpClientImpl.java:144) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeInitializationRequest(CmpClientImpl.java:89) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeInitializationRequest(CmpClientImpl.java:95) at org.onap.oom.certservice.certification.CertificationProvider.executeInitializationRequest(CertificationProvider.java:58) at org.onap.oom.certservice.certification.CertificationResponseModelFactory.provideCertificationModelFromInitialRequest(CertificationResponseModelFactory.java:77) at org.onap.oom.certservice.api.CertificationController.signCertificate(CertificationController.java:94) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(Unknown Source) at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(Unknown Source) at java.base/java.lang.reflect.Method.invoke(Unknown Source) at org.springframework.web.method.support.InvocableHandlerMethod.doInvoke(InvocableHandlerMethod.java:205) at org.springframework.web.method.support.InvocableHandlerMethod.invokeForRequest(InvocableHandlerMethod.java:150) at org.springframework.web.servlet.mvc.method.annotation.ServletInvocableHandlerMethod.invokeAndHandle(ServletInvocableHandlerMethod.java:117) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.invokeHandlerMethod(RequestMappingHandlerAdapter.java:895) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.handleInternal(RequestMappingHandlerAdapter.java:808) at org.springframework.web.servlet.mvc.method.AbstractHandlerMethodAdapter.handle(AbstractHandlerMethodAdapter.java:87) at org.springframework.web.servlet.DispatcherServlet.doDispatch(DispatcherServlet.java:1067) at org.springframework.web.servlet.DispatcherServlet.doService(DispatcherServlet.java:963) at org.springframework.web.servlet.FrameworkServlet.processRequest(FrameworkServlet.java:1006) at org.springframework.web.servlet.FrameworkServlet.doGet(FrameworkServlet.java:898) at javax.servlet.http.HttpServlet.service(HttpServlet.java:655) at org.springframework.web.servlet.FrameworkServlet.service(FrameworkServlet.java:883) at javax.servlet.http.HttpServlet.service(HttpServlet.java:764) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:227) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:53) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:100) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.FormContentFilter.doFilterInternal(FormContentFilter.java:93) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.boot.actuate.metrics.web.servlet.WebMvcMetricsFilter.doFilterInternal(WebMvcMetricsFilter.java:96) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:201) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:197) at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:97) at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:540) at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:135) at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:92) at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:78) at org.apache.catalina.valves.RemoteIpValve.invoke(RemoteIpValve.java:769) at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:357) at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:382) at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:65) at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:895) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1732) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at org.apache.tomcat.util.threads.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1191) at org.apache.tomcat.util.threads.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:659) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Unknown Source) 2022-04-14 07:51:39.560 [31mERROR[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.a.CertificationExceptionAdvice[m : Exception occurred calling cmp client: org.onap.oom.certservice.cmpv2client.exceptions.CmpClientException: Error encountered while processing response from CA server at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.retrieveCertificates(CmpClientImpl.java:177) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeCmpRequest(CmpClientImpl.java:144) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeInitializationRequest(CmpClientImpl.java:89) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeInitializationRequest(CmpClientImpl.java:95) at org.onap.oom.certservice.certification.CertificationProvider.executeInitializationRequest(CertificationProvider.java:58) at org.onap.oom.certservice.certification.CertificationResponseModelFactory.provideCertificationModelFromInitialRequest(CertificationResponseModelFactory.java:77) at org.onap.oom.certservice.api.CertificationController.signCertificate(CertificationController.java:94) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(Unknown Source) at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(Unknown Source) at java.base/java.lang.reflect.Method.invoke(Unknown Source) at org.springframework.web.method.support.InvocableHandlerMethod.doInvoke(InvocableHandlerMethod.java:205) at org.springframework.web.method.support.InvocableHandlerMethod.invokeForRequest(InvocableHandlerMethod.java:150) at org.springframework.web.servlet.mvc.method.annotation.ServletInvocableHandlerMethod.invokeAndHandle(ServletInvocableHandlerMethod.java:117) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.invokeHandlerMethod(RequestMappingHandlerAdapter.java:895) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.handleInternal(RequestMappingHandlerAdapter.java:808) at org.springframework.web.servlet.mvc.method.AbstractHandlerMethodAdapter.handle(AbstractHandlerMethodAdapter.java:87) at org.springframework.web.servlet.DispatcherServlet.doDispatch(DispatcherServlet.java:1067) at org.springframework.web.servlet.DispatcherServlet.doService(DispatcherServlet.java:963) at org.springframework.web.servlet.FrameworkServlet.processRequest(FrameworkServlet.java:1006) at org.springframework.web.servlet.FrameworkServlet.doGet(FrameworkServlet.java:898) at javax.servlet.http.HttpServlet.service(HttpServlet.java:655) at org.springframework.web.servlet.FrameworkServlet.service(FrameworkServlet.java:883) at javax.servlet.http.HttpServlet.service(HttpServlet.java:764) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:227) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:53) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:100) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.FormContentFilter.doFilterInternal(FormContentFilter.java:93) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.boot.actuate.metrics.web.servlet.WebMvcMetricsFilter.doFilterInternal(WebMvcMetricsFilter.java:96) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:201) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:197) at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:97) at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:540) at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:135) at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:92) at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:78) at org.apache.catalina.valves.RemoteIpValve.invoke(RemoteIpValve.java:769) at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:357) at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:382) at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:65) at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:895) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1732) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at org.apache.tomcat.util.threads.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1191) at org.apache.tomcat.util.threads.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:659) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Unknown Source) Caused by: java.lang.IllegalArgumentException: failed to construct sequence from byte[]: unknown tag 28 encountered at org.bouncycastle.asn1.ASN1Sequence.getInstance(Unknown Source) at org.bouncycastle.asn1.cmp.PKIMessage.getInstance(Unknown Source) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.retrieveCertificates(CmpClientImpl.java:171) ... 61 more 2022-04-14 07:55:17.301 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-14 07:55:17.303 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-14 07:55:17.305 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-14 07:55:17.306 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-14 07:55:17.307 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-14 07:55:17.308 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-14 07:55:17.308 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-14 07:55:17.309 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-14 07:55:17.310 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-14 07:55:17.311 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-14 07:55:17.318 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-14 07:55:17.320 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-14 07:55:17.321 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-14 07:55:17.322 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 07:55:17.555 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-14 07:55:17.556 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-14 07:55:17.557 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-14 07:55:17.557 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 07:55:17.559 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-14 07:55:17.559 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-14 07:55:17.560 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 07:55:17.560 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-14 07:55:17.561 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-14 07:55:17.562 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 07:55:17.563 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-14 07:55:17.564 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-14 07:55:17.565 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 07:55:17.566 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-14 07:55:17.566 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-14 07:55:17.568 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-14 07:55:17.578 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 475972631464779826877858674307339937170790561302 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 14 05:20:19 UTC 2022 Final Date: Tue Apr 13 05:20:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [03:45:76:25:e3:28:ca:3d:66:2c:29:3d:27:b1:e6:8d:d2:da:6f:75] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8e7156ceeb0f30b816d1c6a0c462d153c08fe579 92daf8370b0ea76ab8f9768a02fe214f77728ab7 9036a34fa9ab2709d7175747480e1b4b83a429da 25e7b36b3da72c2e85854c9bddc95158ea141087 707b7f362b916f1302e9a553e572ff2f5825557f d760d96e11da4dfa2d69eaac7d8083f922ce0cba f0888bdb36498f3d2b115e08a4903af1a286b7f1 3f646cb4fad7d3aedd1f625320470785740899d3 2b9692e254f61e5b0a5f3e31fffb35711dfec9d4 d79fd547a869fb4ea3ed6ac3c5ec3b90d2ead7d7 e8bff560910ae43c1670aab44855fb64ed8a4d1d 0ffbe36a5983d6efd2a2189083d34c94af83dec9 086efd384a4965c237553fc416bec954a5f81f45 6b7e027db805cdbde8924880413b17033c7af36f 5c2d7fe465c625b3ae76331febdce236e8caf647 944e9ca40a7d3c5928cc6eb190d35f06f3b44933 068235efb6062e05c9b73111b55d62d6cfb4be9b 65691bf0a6022a40ec9e77cf8c8e5bb1f1e2b845 291ce653bb445563f4b0c4eb43d5a2f63e63cfd4 a7cac1a1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [00:1f:1a:85:98:ce:39:56:4a:97:ee:e9:c3:ab:f4:36:58:55:38:c2] modulus: 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 public exponent: 10001 ] 2022-04-14 08:00:51.813 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-14 08:00:51.821 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-14 08:00:51.829 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-14 08:00:51.833 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-14 08:00:51.834 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-14 08:00:51.834 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-14 08:00:51.835 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-14 08:00:51.835 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-14 08:00:51.836 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-14 08:00:51.836 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-14 08:00:51.844 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-14 08:00:51.846 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-14 08:00:51.846 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-14 08:00:51.847 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 08:00:52.116 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-14 08:00:52.117 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-14 08:00:52.118 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-14 08:00:52.118 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 08:00:52.122 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-14 08:00:52.124 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-14 08:00:52.124 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:00:52.125 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:00:52.125 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:00:52.126 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:00:52.129 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:00:52.129 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:00:52.131 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:00:52.131 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:00:52.131 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:00:52.133 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-14 08:00:52.138 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 475972631464779826877858674307339937170790561302 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 14 05:20:19 UTC 2022 Final Date: Tue Apr 13 05:20:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [03:45:76:25:e3:28:ca:3d:66:2c:29:3d:27:b1:e6:8d:d2:da:6f:75] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8e7156ceeb0f30b816d1c6a0c462d153c08fe579 92daf8370b0ea76ab8f9768a02fe214f77728ab7 9036a34fa9ab2709d7175747480e1b4b83a429da 25e7b36b3da72c2e85854c9bddc95158ea141087 707b7f362b916f1302e9a553e572ff2f5825557f d760d96e11da4dfa2d69eaac7d8083f922ce0cba f0888bdb36498f3d2b115e08a4903af1a286b7f1 3f646cb4fad7d3aedd1f625320470785740899d3 2b9692e254f61e5b0a5f3e31fffb35711dfec9d4 d79fd547a869fb4ea3ed6ac3c5ec3b90d2ead7d7 e8bff560910ae43c1670aab44855fb64ed8a4d1d 0ffbe36a5983d6efd2a2189083d34c94af83dec9 086efd384a4965c237553fc416bec954a5f81f45 6b7e027db805cdbde8924880413b17033c7af36f 5c2d7fe465c625b3ae76331febdce236e8caf647 944e9ca40a7d3c5928cc6eb190d35f06f3b44933 068235efb6062e05c9b73111b55d62d6cfb4be9b 65691bf0a6022a40ec9e77cf8c8e5bb1f1e2b845 291ce653bb445563f4b0c4eb43d5a2f63e63cfd4 a7cac1a1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ac:2e:1f:2e:73:1b:68:be:32:ed:8a:14:55:a7:c4:2f:4c:a8:4b:09] modulus: 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 public exponent: 10001 ] 2022-04-14 08:05:16.552 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-14 08:05:16.555 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-14 08:05:16.557 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-14 08:05:16.558 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-14 08:05:16.559 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-14 08:05:16.559 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-14 08:05:16.560 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-14 08:05:16.560 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-14 08:05:16.561 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-14 08:05:16.561 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-14 08:05:16.566 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-14 08:05:16.567 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-14 08:05:16.568 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-14 08:05:16.568 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 08:05:16.633 [31mERROR[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Error encountered while processing response from CA server java.lang.IllegalArgumentException: failed to construct sequence from byte[]: unknown tag 28 encountered at org.bouncycastle.asn1.ASN1Sequence.getInstance(Unknown Source) at org.bouncycastle.asn1.cmp.PKIMessage.getInstance(Unknown Source) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.retrieveCertificates(CmpClientImpl.java:171) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeCmpRequest(CmpClientImpl.java:144) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeInitializationRequest(CmpClientImpl.java:89) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeInitializationRequest(CmpClientImpl.java:95) at org.onap.oom.certservice.certification.CertificationProvider.executeInitializationRequest(CertificationProvider.java:58) at org.onap.oom.certservice.certification.CertificationResponseModelFactory.provideCertificationModelFromInitialRequest(CertificationResponseModelFactory.java:77) at org.onap.oom.certservice.api.CertificationController.signCertificate(CertificationController.java:94) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(Unknown Source) at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(Unknown Source) at java.base/java.lang.reflect.Method.invoke(Unknown Source) at org.springframework.web.method.support.InvocableHandlerMethod.doInvoke(InvocableHandlerMethod.java:205) at org.springframework.web.method.support.InvocableHandlerMethod.invokeForRequest(InvocableHandlerMethod.java:150) at org.springframework.web.servlet.mvc.method.annotation.ServletInvocableHandlerMethod.invokeAndHandle(ServletInvocableHandlerMethod.java:117) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.invokeHandlerMethod(RequestMappingHandlerAdapter.java:895) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.handleInternal(RequestMappingHandlerAdapter.java:808) at org.springframework.web.servlet.mvc.method.AbstractHandlerMethodAdapter.handle(AbstractHandlerMethodAdapter.java:87) at org.springframework.web.servlet.DispatcherServlet.doDispatch(DispatcherServlet.java:1067) at org.springframework.web.servlet.DispatcherServlet.doService(DispatcherServlet.java:963) at org.springframework.web.servlet.FrameworkServlet.processRequest(FrameworkServlet.java:1006) at org.springframework.web.servlet.FrameworkServlet.doGet(FrameworkServlet.java:898) at javax.servlet.http.HttpServlet.service(HttpServlet.java:655) at org.springframework.web.servlet.FrameworkServlet.service(FrameworkServlet.java:883) at javax.servlet.http.HttpServlet.service(HttpServlet.java:764) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:227) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:53) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:100) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.FormContentFilter.doFilterInternal(FormContentFilter.java:93) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.boot.actuate.metrics.web.servlet.WebMvcMetricsFilter.doFilterInternal(WebMvcMetricsFilter.java:96) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:201) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:197) at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:97) at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:540) at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:135) at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:92) at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:78) at org.apache.catalina.valves.RemoteIpValve.invoke(RemoteIpValve.java:769) at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:357) at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:382) at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:65) at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:895) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1732) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at org.apache.tomcat.util.threads.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1191) at org.apache.tomcat.util.threads.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:659) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Unknown Source) 2022-04-14 08:05:16.640 [31mERROR[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.a.CertificationExceptionAdvice[m : Exception occurred calling cmp client: org.onap.oom.certservice.cmpv2client.exceptions.CmpClientException: Error encountered while processing response from CA server at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.retrieveCertificates(CmpClientImpl.java:177) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeCmpRequest(CmpClientImpl.java:144) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeInitializationRequest(CmpClientImpl.java:89) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeInitializationRequest(CmpClientImpl.java:95) at org.onap.oom.certservice.certification.CertificationProvider.executeInitializationRequest(CertificationProvider.java:58) at org.onap.oom.certservice.certification.CertificationResponseModelFactory.provideCertificationModelFromInitialRequest(CertificationResponseModelFactory.java:77) at org.onap.oom.certservice.api.CertificationController.signCertificate(CertificationController.java:94) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(Unknown Source) at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(Unknown Source) at java.base/java.lang.reflect.Method.invoke(Unknown Source) at org.springframework.web.method.support.InvocableHandlerMethod.doInvoke(InvocableHandlerMethod.java:205) at org.springframework.web.method.support.InvocableHandlerMethod.invokeForRequest(InvocableHandlerMethod.java:150) at org.springframework.web.servlet.mvc.method.annotation.ServletInvocableHandlerMethod.invokeAndHandle(ServletInvocableHandlerMethod.java:117) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.invokeHandlerMethod(RequestMappingHandlerAdapter.java:895) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.handleInternal(RequestMappingHandlerAdapter.java:808) at org.springframework.web.servlet.mvc.method.AbstractHandlerMethodAdapter.handle(AbstractHandlerMethodAdapter.java:87) at org.springframework.web.servlet.DispatcherServlet.doDispatch(DispatcherServlet.java:1067) at org.springframework.web.servlet.DispatcherServlet.doService(DispatcherServlet.java:963) at org.springframework.web.servlet.FrameworkServlet.processRequest(FrameworkServlet.java:1006) at org.springframework.web.servlet.FrameworkServlet.doGet(FrameworkServlet.java:898) at javax.servlet.http.HttpServlet.service(HttpServlet.java:655) at org.springframework.web.servlet.FrameworkServlet.service(FrameworkServlet.java:883) at javax.servlet.http.HttpServlet.service(HttpServlet.java:764) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:227) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:53) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:100) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.FormContentFilter.doFilterInternal(FormContentFilter.java:93) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.boot.actuate.metrics.web.servlet.WebMvcMetricsFilter.doFilterInternal(WebMvcMetricsFilter.java:96) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:201) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:197) at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:97) at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:540) at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:135) at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:92) at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:78) at org.apache.catalina.valves.RemoteIpValve.invoke(RemoteIpValve.java:769) at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:357) at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:382) at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:65) at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:895) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1732) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at org.apache.tomcat.util.threads.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1191) at org.apache.tomcat.util.threads.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:659) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Unknown Source) Caused by: java.lang.IllegalArgumentException: failed to construct sequence from byte[]: unknown tag 28 encountered at org.bouncycastle.asn1.ASN1Sequence.getInstance(Unknown Source) at org.bouncycastle.asn1.cmp.PKIMessage.getInstance(Unknown Source) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.retrieveCertificates(CmpClientImpl.java:171) ... 61 more 2022-04-14 08:06:07.505 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-14 08:06:07.507 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-14 08:06:07.509 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-04-14 08:06:07.528 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-14 08:06:07.528 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-04-14 08:06:07.529 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-14 08:06:07.529 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-14 08:06:07.530 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-14 08:06:07.530 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-14 08:06:07.531 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-14 08:06:07.556 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-14 08:06:07.557 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-14 08:06:07.557 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-14 08:06:07.558 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 08:06:07.739 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-14 08:06:07.740 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-14 08:06:07.741 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-14 08:06:07.741 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 08:06:07.743 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-14 08:06:07.744 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-14 08:06:07.744 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:06:07.744 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:06:07.745 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:06:07.746 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:06:07.746 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:06:07.747 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:06:07.748 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:06:07.748 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:06:07.749 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:06:07.750 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-14 08:06:07.757 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 475972631464779826877858674307339937170790561302 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 14 05:20:19 UTC 2022 Final Date: Tue Apr 13 05:20:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [03:45:76:25:e3:28:ca:3d:66:2c:29:3d:27:b1:e6:8d:d2:da:6f:75] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8e7156ceeb0f30b816d1c6a0c462d153c08fe579 92daf8370b0ea76ab8f9768a02fe214f77728ab7 9036a34fa9ab2709d7175747480e1b4b83a429da 25e7b36b3da72c2e85854c9bddc95158ea141087 707b7f362b916f1302e9a553e572ff2f5825557f d760d96e11da4dfa2d69eaac7d8083f922ce0cba f0888bdb36498f3d2b115e08a4903af1a286b7f1 3f646cb4fad7d3aedd1f625320470785740899d3 2b9692e254f61e5b0a5f3e31fffb35711dfec9d4 d79fd547a869fb4ea3ed6ac3c5ec3b90d2ead7d7 e8bff560910ae43c1670aab44855fb64ed8a4d1d 0ffbe36a5983d6efd2a2189083d34c94af83dec9 086efd384a4965c237553fc416bec954a5f81f45 6b7e027db805cdbde8924880413b17033c7af36f 5c2d7fe465c625b3ae76331febdce236e8caf647 944e9ca40a7d3c5928cc6eb190d35f06f3b44933 068235efb6062e05c9b73111b55d62d6cfb4be9b 65691bf0a6022a40ec9e77cf8c8e5bb1f1e2b845 291ce653bb445563f4b0c4eb43d5a2f63e63cfd4 a7cac1a1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ec:79:db:59:95:00:db:f5:01:c7:e0:7d:86:61:a1:ad:a0:16:13:97] modulus: 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 public exponent: 10001 ] 2022-04-14 08:07:07.902 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-14 08:07:07.903 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-14 08:07:07.905 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-04-14 08:07:07.906 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-14 08:07:07.906 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-04-14 08:07:07.907 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-14 08:07:07.907 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-14 08:07:07.907 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-14 08:07:07.908 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-14 08:07:07.908 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-14 08:07:07.919 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-14 08:07:07.920 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-14 08:07:07.921 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-14 08:07:07.922 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 08:07:08.136 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-14 08:07:08.137 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-14 08:07:08.137 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-14 08:07:08.138 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 08:07:08.142 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-14 08:07:08.143 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-14 08:07:08.144 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:07:08.145 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:07:08.145 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:07:08.146 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:07:08.147 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:07:08.147 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:07:08.149 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:07:08.149 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:07:08.149 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:07:08.150 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-14 08:07:08.154 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 475972631464779826877858674307339937170790561302 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 14 05:20:19 UTC 2022 Final Date: Tue Apr 13 05:20:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [03:45:76:25:e3:28:ca:3d:66:2c:29:3d:27:b1:e6:8d:d2:da:6f:75] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8e7156ceeb0f30b816d1c6a0c462d153c08fe579 92daf8370b0ea76ab8f9768a02fe214f77728ab7 9036a34fa9ab2709d7175747480e1b4b83a429da 25e7b36b3da72c2e85854c9bddc95158ea141087 707b7f362b916f1302e9a553e572ff2f5825557f d760d96e11da4dfa2d69eaac7d8083f922ce0cba f0888bdb36498f3d2b115e08a4903af1a286b7f1 3f646cb4fad7d3aedd1f625320470785740899d3 2b9692e254f61e5b0a5f3e31fffb35711dfec9d4 d79fd547a869fb4ea3ed6ac3c5ec3b90d2ead7d7 e8bff560910ae43c1670aab44855fb64ed8a4d1d 0ffbe36a5983d6efd2a2189083d34c94af83dec9 086efd384a4965c237553fc416bec954a5f81f45 6b7e027db805cdbde8924880413b17033c7af36f 5c2d7fe465c625b3ae76331febdce236e8caf647 944e9ca40a7d3c5928cc6eb190d35f06f3b44933 068235efb6062e05c9b73111b55d62d6cfb4be9b 65691bf0a6022a40ec9e77cf8c8e5bb1f1e2b845 291ce653bb445563f4b0c4eb43d5a2f63e63cfd4 a7cac1a1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [93:a8:c4:f4:0f:db:37:1d:80:d2:d9:e0:c6:c9:bb:8c:5d:50:04:9b] modulus: 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 public exponent: 10001 ] 2022-04-14 08:09:04.387 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-14 08:09:04.390 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-14 08:09:04.394 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-14 08:09:04.395 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-14 08:09:04.396 [32m INFO[m [35m1[m [nio-8443-exec-6] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-14 08:09:04.396 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-14 08:09:04.397 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-14 08:09:04.398 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-14 08:09:04.398 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-14 08:09:04.398 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-14 08:09:04.405 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-14 08:09:04.407 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-14 08:09:04.407 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-14 08:09:04.407 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 08:09:04.574 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-14 08:09:04.575 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-14 08:09:04.576 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-14 08:09:04.576 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 08:09:04.578 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-14 08:09:04.579 [32m INFO[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-14 08:09:04.579 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:09:04.580 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:09:04.580 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:09:04.581 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:09:04.581 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:09:04.581 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:09:04.582 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:09:04.582 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:09:04.582 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:09:04.583 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-14 08:09:04.588 [32mDEBUG[m [35m1[m [nio-8443-exec-6] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 475972631464779826877858674307339937170790561302 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 14 05:20:19 UTC 2022 Final Date: Tue Apr 13 05:20:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [03:45:76:25:e3:28:ca:3d:66:2c:29:3d:27:b1:e6:8d:d2:da:6f:75] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8e7156ceeb0f30b816d1c6a0c462d153c08fe579 92daf8370b0ea76ab8f9768a02fe214f77728ab7 9036a34fa9ab2709d7175747480e1b4b83a429da 25e7b36b3da72c2e85854c9bddc95158ea141087 707b7f362b916f1302e9a553e572ff2f5825557f d760d96e11da4dfa2d69eaac7d8083f922ce0cba f0888bdb36498f3d2b115e08a4903af1a286b7f1 3f646cb4fad7d3aedd1f625320470785740899d3 2b9692e254f61e5b0a5f3e31fffb35711dfec9d4 d79fd547a869fb4ea3ed6ac3c5ec3b90d2ead7d7 e8bff560910ae43c1670aab44855fb64ed8a4d1d 0ffbe36a5983d6efd2a2189083d34c94af83dec9 086efd384a4965c237553fc416bec954a5f81f45 6b7e027db805cdbde8924880413b17033c7af36f 5c2d7fe465c625b3ae76331febdce236e8caf647 944e9ca40a7d3c5928cc6eb190d35f06f3b44933 068235efb6062e05c9b73111b55d62d6cfb4be9b 65691bf0a6022a40ec9e77cf8c8e5bb1f1e2b845 291ce653bb445563f4b0c4eb43d5a2f63e63cfd4 a7cac1a1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d6:a6:12:38:3a:1a:d2:38:5f:2f:7e:8b:8e:56:b5:10:83:68:27:ed] modulus: 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 public exponent: 10001 ] 2022-04-14 08:15:47.941 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-14 08:15:47.944 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-14 08:15:47.947 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-14 08:15:47.948 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-14 08:15:47.949 [32m INFO[m [35m1[m [nio-8443-exec-8] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-14 08:15:47.950 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-14 08:15:47.950 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-14 08:15:47.951 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-14 08:15:47.951 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-14 08:15:47.952 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-14 08:15:47.958 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-14 08:15:47.961 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-14 08:15:47.961 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-14 08:15:47.962 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 08:15:48.189 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-14 08:15:48.190 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-14 08:15:48.190 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-14 08:15:48.191 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 08:15:48.193 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-14 08:15:48.194 [32m INFO[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-14 08:15:48.194 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:15:48.194 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:15:48.195 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:15:48.196 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:15:48.197 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:15:48.197 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:15:48.198 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:15:48.199 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:15:48.199 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:15:48.200 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-14 08:15:48.206 [32mDEBUG[m [35m1[m [nio-8443-exec-8] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 475972631464779826877858674307339937170790561302 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 14 05:20:19 UTC 2022 Final Date: Tue Apr 13 05:20:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [03:45:76:25:e3:28:ca:3d:66:2c:29:3d:27:b1:e6:8d:d2:da:6f:75] modulus: 99ee77723024687ce7fb901a5bfd25cb4704952dbf031f1d711ed0e8f6b4bb1bdf03792293f98fdf54462962a1b7e99b3d854dad637a500ee56ad77346b022a190500598a9dcd15b5c4ec22ef439c986974f796e574e83cef7c7a38117fbe5c0f710566f667c39fc97523365e15058a9d5bf2403c8ee7e8eb53f5a8384e95e851ea251b249eff89a1e3e97a93db10e51d293db4b01fa95783edda5c6c21f0369518a112a7cfc3c8107a296807f1a577f3fef631233d29800823182f75349f6fe79a8a83cb2165f8c066d7e6552af740b56013338b9ecc824de4d7e55980cf7ad7ba112af0c17ebb289b0ff1b4b1145ed337c6edc1f0eb575227e1ecc849949ed4647dd4a13c40b1eb43a4d32a8c5b78b63ab1b8ce1fcffbd9fd763d4ed22fd839bd8adfecbab11ac77b874f8d3a0c54aac4e62596dfe9476e70a814ec447b1848e3d08f4f6578d651a587c02fcf506b1d83f72aedcffb93f03f73f7eae2cc25f703f7216012cbf95c84f3d0629d3b79f8a18c0f5078acb7bae84d9f0d33d580f public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8e7156ceeb0f30b816d1c6a0c462d153c08fe579 92daf8370b0ea76ab8f9768a02fe214f77728ab7 9036a34fa9ab2709d7175747480e1b4b83a429da 25e7b36b3da72c2e85854c9bddc95158ea141087 707b7f362b916f1302e9a553e572ff2f5825557f d760d96e11da4dfa2d69eaac7d8083f922ce0cba f0888bdb36498f3d2b115e08a4903af1a286b7f1 3f646cb4fad7d3aedd1f625320470785740899d3 2b9692e254f61e5b0a5f3e31fffb35711dfec9d4 d79fd547a869fb4ea3ed6ac3c5ec3b90d2ead7d7 e8bff560910ae43c1670aab44855fb64ed8a4d1d 0ffbe36a5983d6efd2a2189083d34c94af83dec9 086efd384a4965c237553fc416bec954a5f81f45 6b7e027db805cdbde8924880413b17033c7af36f 5c2d7fe465c625b3ae76331febdce236e8caf647 944e9ca40a7d3c5928cc6eb190d35f06f3b44933 068235efb6062e05c9b73111b55d62d6cfb4be9b 65691bf0a6022a40ec9e77cf8c8e5bb1f1e2b845 291ce653bb445563f4b0c4eb43d5a2f63e63cfd4 a7cac1a1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e6:98:64:d4:f4:e5:2f:bd:dd:d2:c5:10:11:ce:eb:c7:31:1f:2b:e4] modulus: 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 public exponent: 10001 ] 2022-04-14 08:18:10.092 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-14 08:18:10.094 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-14 08:18:10.102 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-04-14 08:18:10.105 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-14 08:18:10.105 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-04-14 08:18:10.106 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-14 08:18:10.107 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-14 08:18:10.107 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-14 08:18:10.107 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-14 08:18:10.108 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-14 08:18:10.114 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-14 08:18:10.115 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-14 08:18:10.115 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-14 08:18:10.115 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 08:18:10.263 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-14 08:18:10.264 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-14 08:18:10.264 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-14 08:18:10.265 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 08:18:10.266 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-14 08:18:10.267 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-14 08:18:10.267 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:18:10.267 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:18:10.267 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:18:10.268 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:18:10.268 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:18:10.269 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:18:10.269 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:18:10.269 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:18:10.270 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:18:10.271 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-14 08:18:10.275 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 475972631464779826877858674307339937170790561302 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 14 05:20:19 UTC 2022 Final Date: Tue Apr 13 05:20:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [03:45:76:25:e3:28:ca:3d:66:2c:29:3d:27:b1:e6:8d:d2:da:6f:75] modulus: 99ee77723024687ce7fb901a5bfd25cb4704952dbf031f1d711ed0e8f6b4bb1bdf03792293f98fdf54462962a1b7e99b3d854dad637a500ee56ad77346b022a190500598a9dcd15b5c4ec22ef439c986974f796e574e83cef7c7a38117fbe5c0f710566f667c39fc97523365e15058a9d5bf2403c8ee7e8eb53f5a8384e95e851ea251b249eff89a1e3e97a93db10e51d293db4b01fa95783edda5c6c21f0369518a112a7cfc3c8107a296807f1a577f3fef631233d29800823182f75349f6fe79a8a83cb2165f8c066d7e6552af740b56013338b9ecc824de4d7e55980cf7ad7ba112af0c17ebb289b0ff1b4b1145ed337c6edc1f0eb575227e1ecc849949ed4647dd4a13c40b1eb43a4d32a8c5b78b63ab1b8ce1fcffbd9fd763d4ed22fd839bd8adfecbab11ac77b874f8d3a0c54aac4e62596dfe9476e70a814ec447b1848e3d08f4f6578d651a587c02fcf506b1d83f72aedcffb93f03f73f7eae2cc25f703f7216012cbf95c84f3d0629d3b79f8a18c0f5078acb7bae84d9f0d33d580f public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8e7156ceeb0f30b816d1c6a0c462d153c08fe579 92daf8370b0ea76ab8f9768a02fe214f77728ab7 9036a34fa9ab2709d7175747480e1b4b83a429da 25e7b36b3da72c2e85854c9bddc95158ea141087 707b7f362b916f1302e9a553e572ff2f5825557f d760d96e11da4dfa2d69eaac7d8083f922ce0cba f0888bdb36498f3d2b115e08a4903af1a286b7f1 3f646cb4fad7d3aedd1f625320470785740899d3 2b9692e254f61e5b0a5f3e31fffb35711dfec9d4 d79fd547a869fb4ea3ed6ac3c5ec3b90d2ead7d7 e8bff560910ae43c1670aab44855fb64ed8a4d1d 0ffbe36a5983d6efd2a2189083d34c94af83dec9 086efd384a4965c237553fc416bec954a5f81f45 6b7e027db805cdbde8924880413b17033c7af36f 5c2d7fe465c625b3ae76331febdce236e8caf647 944e9ca40a7d3c5928cc6eb190d35f06f3b44933 068235efb6062e05c9b73111b55d62d6cfb4be9b 65691bf0a6022a40ec9e77cf8c8e5bb1f1e2b845 291ce653bb445563f4b0c4eb43d5a2f63e63cfd4 a7cac1a1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7e:c4:cb:34:0f:c6:c5:01:c0:41:b4:86:48:6a:a4:7c:aa:0d:64:7b] modulus: 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 public exponent: 10001 ] 2022-04-14 08:18:15.015 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-14 08:18:15.016 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-14 08:18:15.018 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-04-14 08:18:15.019 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-14 08:18:15.019 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-04-14 08:18:15.020 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-14 08:18:15.020 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-14 08:18:15.020 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-14 08:18:15.021 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-14 08:18:15.021 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-14 08:18:15.026 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-14 08:18:15.027 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-14 08:18:15.027 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-14 08:18:15.028 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 08:18:15.132 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-14 08:18:15.133 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-14 08:18:15.134 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-14 08:18:15.134 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 08:18:15.136 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-14 08:18:15.137 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-14 08:18:15.137 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:18:15.137 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:18:15.138 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:18:15.139 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:18:15.139 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:18:15.139 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:18:15.140 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:18:15.141 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:18:15.141 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:18:15.142 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-14 08:18:15.147 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 475972631464779826877858674307339937170790561302 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 14 05:20:19 UTC 2022 Final Date: Tue Apr 13 05:20:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [03:45:76:25:e3:28:ca:3d:66:2c:29:3d:27:b1:e6:8d:d2:da:6f:75] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8e7156ceeb0f30b816d1c6a0c462d153c08fe579 92daf8370b0ea76ab8f9768a02fe214f77728ab7 9036a34fa9ab2709d7175747480e1b4b83a429da 25e7b36b3da72c2e85854c9bddc95158ea141087 707b7f362b916f1302e9a553e572ff2f5825557f d760d96e11da4dfa2d69eaac7d8083f922ce0cba f0888bdb36498f3d2b115e08a4903af1a286b7f1 3f646cb4fad7d3aedd1f625320470785740899d3 2b9692e254f61e5b0a5f3e31fffb35711dfec9d4 d79fd547a869fb4ea3ed6ac3c5ec3b90d2ead7d7 e8bff560910ae43c1670aab44855fb64ed8a4d1d 0ffbe36a5983d6efd2a2189083d34c94af83dec9 086efd384a4965c237553fc416bec954a5f81f45 6b7e027db805cdbde8924880413b17033c7af36f 5c2d7fe465c625b3ae76331febdce236e8caf647 944e9ca40a7d3c5928cc6eb190d35f06f3b44933 068235efb6062e05c9b73111b55d62d6cfb4be9b 65691bf0a6022a40ec9e77cf8c8e5bb1f1e2b845 291ce653bb445563f4b0c4eb43d5a2f63e63cfd4 a7cac1a1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [85:cc:5d:67:62:77:5e:e7:b5:2a:1e:e7:6c:64:7b:e2:4e:ae:7a:a8] modulus: d0b6dda75340849b8f6b544d335a1435ebb19804bb23a0384d81aeea7fa2cd453bafa3f691ae25eb03fb9f979b7eb7360ee206b5620f061eaaf1e92b10147f7490391b014a9a47b6389d34e182e33e3260e7e9a009e7197a9752fbd16e7a3fdc269dad70c6586489d8e959012fb5e1c5d7f904efd68718f436282adc8689a2ae32eb231f4e86541c04719c253692ffbc3eac366ef12e89cd7c1c0264de62e20c07a0836038d46c486da3750babd5183a4a046336d9d4f0f67eb61c43654fd4d1e123db440225bb03abe58316f200bca0d7993fa245c9f4fe6acd0a1af8e906e27084f81a58bfb444e773386b0ffefe0b989479b82ad12a438db4b65735a4b4d7 public exponent: 10001 ] 2022-04-14 08:19:50.066 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-14 08:19:50.068 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-14 08:19:50.070 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-14 08:19:50.071 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-14 08:19:50.071 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-14 08:19:50.072 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-14 08:19:50.073 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-14 08:19:50.073 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-14 08:19:50.074 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-14 08:19:50.074 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-14 08:19:50.085 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-14 08:19:50.087 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-14 08:19:50.087 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-14 08:19:50.088 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 08:19:50.335 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-14 08:19:50.336 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-14 08:19:50.336 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-14 08:19:50.337 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 08:19:50.342 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-14 08:19:50.343 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-14 08:19:50.343 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:19:50.344 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:19:50.344 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:19:50.345 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:19:50.345 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:19:50.346 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:19:50.347 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:19:50.347 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:19:50.348 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:19:50.349 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-14 08:19:50.354 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 475972631464779826877858674307339937170790561302 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 14 05:20:19 UTC 2022 Final Date: Tue Apr 13 05:20:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [03:45:76:25:e3:28:ca:3d:66:2c:29:3d:27:b1:e6:8d:d2:da:6f:75] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8e7156ceeb0f30b816d1c6a0c462d153c08fe579 92daf8370b0ea76ab8f9768a02fe214f77728ab7 9036a34fa9ab2709d7175747480e1b4b83a429da 25e7b36b3da72c2e85854c9bddc95158ea141087 707b7f362b916f1302e9a553e572ff2f5825557f d760d96e11da4dfa2d69eaac7d8083f922ce0cba f0888bdb36498f3d2b115e08a4903af1a286b7f1 3f646cb4fad7d3aedd1f625320470785740899d3 2b9692e254f61e5b0a5f3e31fffb35711dfec9d4 d79fd547a869fb4ea3ed6ac3c5ec3b90d2ead7d7 e8bff560910ae43c1670aab44855fb64ed8a4d1d 0ffbe36a5983d6efd2a2189083d34c94af83dec9 086efd384a4965c237553fc416bec954a5f81f45 6b7e027db805cdbde8924880413b17033c7af36f 5c2d7fe465c625b3ae76331febdce236e8caf647 944e9ca40a7d3c5928cc6eb190d35f06f3b44933 068235efb6062e05c9b73111b55d62d6cfb4be9b 65691bf0a6022a40ec9e77cf8c8e5bb1f1e2b845 291ce653bb445563f4b0c4eb43d5a2f63e63cfd4 a7cac1a1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7e:ff:b9:97:a8:90:fc:ff:91:a7:22:16:00:9f:64:6c:55:c6:fd:41] modulus: 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 public exponent: 10001 ] 2022-04-14 08:24:20.900 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-14 08:24:20.903 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-14 08:24:20.905 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-14 08:24:20.906 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-14 08:24:20.907 [32m INFO[m [35m1[m [nio-8443-exec-3] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-14 08:24:20.907 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-14 08:24:20.908 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-14 08:24:20.908 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-14 08:24:20.909 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-14 08:24:20.909 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-14 08:24:20.915 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-14 08:24:20.916 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-14 08:24:20.917 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-14 08:24:20.917 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 08:24:21.101 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-14 08:24:21.102 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-14 08:24:21.102 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-14 08:24:21.103 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 08:24:21.105 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-14 08:24:21.105 [32m INFO[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-14 08:24:21.105 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:24:21.106 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:24:21.106 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:24:21.107 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:24:21.107 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:24:21.107 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:24:21.108 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:24:21.108 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:24:21.108 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:24:21.109 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-14 08:24:21.113 [32mDEBUG[m [35m1[m [nio-8443-exec-3] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 475972631464779826877858674307339937170790561302 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 14 05:20:19 UTC 2022 Final Date: Tue Apr 13 05:20:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [03:45:76:25:e3:28:ca:3d:66:2c:29:3d:27:b1:e6:8d:d2:da:6f:75] modulus: 99ee77723024687ce7fb901a5bfd25cb4704952dbf031f1d711ed0e8f6b4bb1bdf03792293f98fdf54462962a1b7e99b3d854dad637a500ee56ad77346b022a190500598a9dcd15b5c4ec22ef439c986974f796e574e83cef7c7a38117fbe5c0f710566f667c39fc97523365e15058a9d5bf2403c8ee7e8eb53f5a8384e95e851ea251b249eff89a1e3e97a93db10e51d293db4b01fa95783edda5c6c21f0369518a112a7cfc3c8107a296807f1a577f3fef631233d29800823182f75349f6fe79a8a83cb2165f8c066d7e6552af740b56013338b9ecc824de4d7e55980cf7ad7ba112af0c17ebb289b0ff1b4b1145ed337c6edc1f0eb575227e1ecc849949ed4647dd4a13c40b1eb43a4d32a8c5b78b63ab1b8ce1fcffbd9fd763d4ed22fd839bd8adfecbab11ac77b874f8d3a0c54aac4e62596dfe9476e70a814ec447b1848e3d08f4f6578d651a587c02fcf506b1d83f72aedcffb93f03f73f7eae2cc25f703f7216012cbf95c84f3d0629d3b79f8a18c0f5078acb7bae84d9f0d33d580f public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8e7156ceeb0f30b816d1c6a0c462d153c08fe579 92daf8370b0ea76ab8f9768a02fe214f77728ab7 9036a34fa9ab2709d7175747480e1b4b83a429da 25e7b36b3da72c2e85854c9bddc95158ea141087 707b7f362b916f1302e9a553e572ff2f5825557f d760d96e11da4dfa2d69eaac7d8083f922ce0cba f0888bdb36498f3d2b115e08a4903af1a286b7f1 3f646cb4fad7d3aedd1f625320470785740899d3 2b9692e254f61e5b0a5f3e31fffb35711dfec9d4 d79fd547a869fb4ea3ed6ac3c5ec3b90d2ead7d7 e8bff560910ae43c1670aab44855fb64ed8a4d1d 0ffbe36a5983d6efd2a2189083d34c94af83dec9 086efd384a4965c237553fc416bec954a5f81f45 6b7e027db805cdbde8924880413b17033c7af36f 5c2d7fe465c625b3ae76331febdce236e8caf647 944e9ca40a7d3c5928cc6eb190d35f06f3b44933 068235efb6062e05c9b73111b55d62d6cfb4be9b 65691bf0a6022a40ec9e77cf8c8e5bb1f1e2b845 291ce653bb445563f4b0c4eb43d5a2f63e63cfd4 a7cac1a1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [24:74:ee:d2:c2:4d:44:27:bc:08:65:0c:99:b0:f8:1c:4b:61:3a:3c] modulus: ce5e0191c6cc825570765bed7366f69808b99caaf8519339e9df1092c9e8918bc1d1ae2244ce80c47e06e4d9287a048f60b919ba965a12090044f3f80704d290749e18d933691a5824ce9137a46531f8ca6c1a7808745e9569a007eef5cee553d053eaa8a644d84e62687bd5a0f83ac6b178386ba2b2230a3e05a4502820706153c2af7256643c8655eb89bbe8c762439f642d3796bc5a76b6fc4aaecd65d1dd2684ada2ef9c236cc914b8739ad1c1817c6dbd1969eaf8847c405fc6a0df869408706dea482d97b8a98aa68db199dc75ee367e64df2ad42115710168e923e06d42341a02a147a061757a889871b0b26d5eeafba6733d7d06c6264d978b29386f public exponent: 10001 ] 2022-04-14 08:28:42.331 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-14 08:28:42.332 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-14 08:28:42.334 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-14 08:28:42.335 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-14 08:28:42.335 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-14 08:28:42.336 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-14 08:28:42.336 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-14 08:28:42.336 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-14 08:28:42.337 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-14 08:28:42.337 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-14 08:28:42.363 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-14 08:28:42.364 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-14 08:28:42.364 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-14 08:28:42.364 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 08:28:42.609 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-14 08:28:42.610 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-14 08:28:42.611 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-14 08:28:42.611 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 08:28:42.613 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-14 08:28:42.613 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-14 08:28:42.613 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:28:42.614 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:28:42.614 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:28:42.615 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:28:42.615 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:28:42.615 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:28:42.616 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:28:42.616 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:28:42.617 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:28:42.618 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-14 08:28:42.624 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 475972631464779826877858674307339937170790561302 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 14 05:20:19 UTC 2022 Final Date: Tue Apr 13 05:20:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [03:45:76:25:e3:28:ca:3d:66:2c:29:3d:27:b1:e6:8d:d2:da:6f:75] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8e7156ceeb0f30b816d1c6a0c462d153c08fe579 92daf8370b0ea76ab8f9768a02fe214f77728ab7 9036a34fa9ab2709d7175747480e1b4b83a429da 25e7b36b3da72c2e85854c9bddc95158ea141087 707b7f362b916f1302e9a553e572ff2f5825557f d760d96e11da4dfa2d69eaac7d8083f922ce0cba f0888bdb36498f3d2b115e08a4903af1a286b7f1 3f646cb4fad7d3aedd1f625320470785740899d3 2b9692e254f61e5b0a5f3e31fffb35711dfec9d4 d79fd547a869fb4ea3ed6ac3c5ec3b90d2ead7d7 e8bff560910ae43c1670aab44855fb64ed8a4d1d 0ffbe36a5983d6efd2a2189083d34c94af83dec9 086efd384a4965c237553fc416bec954a5f81f45 6b7e027db805cdbde8924880413b17033c7af36f 5c2d7fe465c625b3ae76331febdce236e8caf647 944e9ca40a7d3c5928cc6eb190d35f06f3b44933 068235efb6062e05c9b73111b55d62d6cfb4be9b 65691bf0a6022a40ec9e77cf8c8e5bb1f1e2b845 291ce653bb445563f4b0c4eb43d5a2f63e63cfd4 a7cac1a1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [11:24:c6:cd:d6:b2:d9:21:de:e4:80:99:61:49:5f:c6:5e:f3:2d:40] modulus: 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 public exponent: 10001 ] 2022-04-14 08:33:06.810 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-14 08:33:06.813 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-14 08:33:06.816 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-14 08:33:06.817 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-14 08:33:06.817 [32m INFO[m [35m1[m [nio-8443-exec-5] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-14 08:33:06.822 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-14 08:33:06.823 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-14 08:33:06.823 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-14 08:33:06.824 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-14 08:33:06.825 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-14 08:33:06.832 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-14 08:33:06.833 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-14 08:33:06.833 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-14 08:33:06.834 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 08:33:07.049 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-14 08:33:07.050 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-14 08:33:07.050 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-14 08:33:07.050 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 08:33:07.052 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-14 08:33:07.052 [32m INFO[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-14 08:33:07.053 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:33:07.053 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:33:07.053 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:33:07.054 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:33:07.054 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:33:07.055 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:33:07.055 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:33:07.056 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:33:07.056 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:33:07.057 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-14 08:33:07.061 [32mDEBUG[m [35m1[m [nio-8443-exec-5] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 475972631464779826877858674307339937170790561302 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 14 05:20:19 UTC 2022 Final Date: Tue Apr 13 05:20:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [03:45:76:25:e3:28:ca:3d:66:2c:29:3d:27:b1:e6:8d:d2:da:6f:75] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8e7156ceeb0f30b816d1c6a0c462d153c08fe579 92daf8370b0ea76ab8f9768a02fe214f77728ab7 9036a34fa9ab2709d7175747480e1b4b83a429da 25e7b36b3da72c2e85854c9bddc95158ea141087 707b7f362b916f1302e9a553e572ff2f5825557f d760d96e11da4dfa2d69eaac7d8083f922ce0cba f0888bdb36498f3d2b115e08a4903af1a286b7f1 3f646cb4fad7d3aedd1f625320470785740899d3 2b9692e254f61e5b0a5f3e31fffb35711dfec9d4 d79fd547a869fb4ea3ed6ac3c5ec3b90d2ead7d7 e8bff560910ae43c1670aab44855fb64ed8a4d1d 0ffbe36a5983d6efd2a2189083d34c94af83dec9 086efd384a4965c237553fc416bec954a5f81f45 6b7e027db805cdbde8924880413b17033c7af36f 5c2d7fe465c625b3ae76331febdce236e8caf647 944e9ca40a7d3c5928cc6eb190d35f06f3b44933 068235efb6062e05c9b73111b55d62d6cfb4be9b 65691bf0a6022a40ec9e77cf8c8e5bb1f1e2b845 291ce653bb445563f4b0c4eb43d5a2f63e63cfd4 a7cac1a1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e9:98:60:af:aa:94:87:3c:1d:bb:fa:18:eb:e2:d3:58:13:16:ff:69] modulus: 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 public exponent: 10001 ] 2022-04-14 08:39:26.679 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-14 08:39:26.683 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-14 08:39:26.687 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-14 08:39:26.688 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-14 08:39:26.688 [32m INFO[m [35m1[m [nio-8443-exec-4] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-14 08:39:26.689 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-14 08:39:26.689 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-14 08:39:26.689 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-14 08:39:26.690 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-14 08:39:26.690 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-14 08:39:26.696 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-14 08:39:26.697 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-14 08:39:26.697 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-14 08:39:26.697 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 08:39:26.876 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-14 08:39:26.877 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-14 08:39:26.877 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-14 08:39:26.878 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 08:39:26.880 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-14 08:39:26.880 [32m INFO[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-14 08:39:26.881 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:39:26.881 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:39:26.881 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:39:26.882 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:39:26.883 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:39:26.883 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:39:26.885 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:39:26.885 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:39:26.885 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:39:26.900 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-14 08:39:26.907 [32mDEBUG[m [35m1[m [nio-8443-exec-4] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 475972631464779826877858674307339937170790561302 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 14 05:20:19 UTC 2022 Final Date: Tue Apr 13 05:20:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [03:45:76:25:e3:28:ca:3d:66:2c:29:3d:27:b1:e6:8d:d2:da:6f:75] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8e7156ceeb0f30b816d1c6a0c462d153c08fe579 92daf8370b0ea76ab8f9768a02fe214f77728ab7 9036a34fa9ab2709d7175747480e1b4b83a429da 25e7b36b3da72c2e85854c9bddc95158ea141087 707b7f362b916f1302e9a553e572ff2f5825557f d760d96e11da4dfa2d69eaac7d8083f922ce0cba f0888bdb36498f3d2b115e08a4903af1a286b7f1 3f646cb4fad7d3aedd1f625320470785740899d3 2b9692e254f61e5b0a5f3e31fffb35711dfec9d4 d79fd547a869fb4ea3ed6ac3c5ec3b90d2ead7d7 e8bff560910ae43c1670aab44855fb64ed8a4d1d 0ffbe36a5983d6efd2a2189083d34c94af83dec9 086efd384a4965c237553fc416bec954a5f81f45 6b7e027db805cdbde8924880413b17033c7af36f 5c2d7fe465c625b3ae76331febdce236e8caf647 944e9ca40a7d3c5928cc6eb190d35f06f3b44933 068235efb6062e05c9b73111b55d62d6cfb4be9b 65691bf0a6022a40ec9e77cf8c8e5bb1f1e2b845 291ce653bb445563f4b0c4eb43d5a2f63e63cfd4 a7cac1a1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [de:09:16:ab:33:f0:47:32:34:d2:ce:ae:74:fe:57:7c:a9:19:12:57] modulus: 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 public exponent: 10001 ] 2022-04-14 08:43:52.152 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-14 08:43:52.154 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-14 08:43:52.155 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-14 08:43:52.156 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-14 08:43:52.156 [32m INFO[m [35m1[m [nio-8443-exec-9] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-14 08:43:52.157 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-14 08:43:52.157 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-14 08:43:52.158 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-14 08:43:52.158 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-14 08:43:52.159 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-14 08:43:52.164 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-14 08:43:52.165 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-14 08:43:52.165 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-14 08:43:52.166 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 08:43:52.321 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-14 08:43:52.321 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-14 08:43:52.322 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-14 08:43:52.322 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 08:43:52.323 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-14 08:43:52.325 [32m INFO[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-14 08:43:52.326 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:43:52.326 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:43:52.326 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:43:52.328 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:43:52.328 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:43:52.328 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:43:52.329 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:43:52.329 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:43:52.330 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:43:52.331 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-14 08:43:52.334 [32mDEBUG[m [35m1[m [nio-8443-exec-9] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 475972631464779826877858674307339937170790561302 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 14 05:20:19 UTC 2022 Final Date: Tue Apr 13 05:20:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [03:45:76:25:e3:28:ca:3d:66:2c:29:3d:27:b1:e6:8d:d2:da:6f:75] modulus: 99ee77723024687ce7fb901a5bfd25cb4704952dbf031f1d711ed0e8f6b4bb1bdf03792293f98fdf54462962a1b7e99b3d854dad637a500ee56ad77346b022a190500598a9dcd15b5c4ec22ef439c986974f796e574e83cef7c7a38117fbe5c0f710566f667c39fc97523365e15058a9d5bf2403c8ee7e8eb53f5a8384e95e851ea251b249eff89a1e3e97a93db10e51d293db4b01fa95783edda5c6c21f0369518a112a7cfc3c8107a296807f1a577f3fef631233d29800823182f75349f6fe79a8a83cb2165f8c066d7e6552af740b56013338b9ecc824de4d7e55980cf7ad7ba112af0c17ebb289b0ff1b4b1145ed337c6edc1f0eb575227e1ecc849949ed4647dd4a13c40b1eb43a4d32a8c5b78b63ab1b8ce1fcffbd9fd763d4ed22fd839bd8adfecbab11ac77b874f8d3a0c54aac4e62596dfe9476e70a814ec447b1848e3d08f4f6578d651a587c02fcf506b1d83f72aedcffb93f03f73f7eae2cc25f703f7216012cbf95c84f3d0629d3b79f8a18c0f5078acb7bae84d9f0d33d580f public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8e7156ceeb0f30b816d1c6a0c462d153c08fe579 92daf8370b0ea76ab8f9768a02fe214f77728ab7 9036a34fa9ab2709d7175747480e1b4b83a429da 25e7b36b3da72c2e85854c9bddc95158ea141087 707b7f362b916f1302e9a553e572ff2f5825557f d760d96e11da4dfa2d69eaac7d8083f922ce0cba f0888bdb36498f3d2b115e08a4903af1a286b7f1 3f646cb4fad7d3aedd1f625320470785740899d3 2b9692e254f61e5b0a5f3e31fffb35711dfec9d4 d79fd547a869fb4ea3ed6ac3c5ec3b90d2ead7d7 e8bff560910ae43c1670aab44855fb64ed8a4d1d 0ffbe36a5983d6efd2a2189083d34c94af83dec9 086efd384a4965c237553fc416bec954a5f81f45 6b7e027db805cdbde8924880413b17033c7af36f 5c2d7fe465c625b3ae76331febdce236e8caf647 944e9ca40a7d3c5928cc6eb190d35f06f3b44933 068235efb6062e05c9b73111b55d62d6cfb4be9b 65691bf0a6022a40ec9e77cf8c8e5bb1f1e2b845 291ce653bb445563f4b0c4eb43d5a2f63e63cfd4 a7cac1a1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [74:99:9e:9e:fe:b3:2f:c5:df:31:63:94:15:ea:f9:86:3e:b2:f7:d8] modulus: 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 public exponent: 10001 ] 2022-04-14 08:53:26.430 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-14 08:53:26.434 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-14 08:53:26.437 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-14 08:53:26.439 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-14 08:53:26.440 [32m INFO[m [35m1[m [nio-8443-exec-7] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-14 08:53:26.441 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-14 08:53:26.442 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-14 08:53:26.442 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-14 08:53:26.442 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-14 08:53:26.443 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-14 08:53:26.450 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-14 08:53:26.452 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-14 08:53:26.452 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-14 08:53:26.453 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 08:53:26.605 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Received response from Server 2022-04-14 08:53:26.606 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Response type is: INIT_REP 2022-04-14 08:53:26.606 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Verifying signature of the response. 2022-04-14 08:53:26.606 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 08:53:26.608 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Response status code: 0 2022-04-14 08:53:26.608 [32m INFO[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpClientImpl [m : Verifying certificates returned as part of CertResponse. 2022-04-14 08:53:26.608 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:53:26.609 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:53:26.609 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:53:26.609 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:53:26.610 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:53:26.610 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:53:26.610 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:53:26.611 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:53:26.611 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:53:26.612 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-14 08:53:26.615 [32mDEBUG[m [35m1[m [nio-8443-exec-7] [36mo.o.o.c.c.i.CmpResponseHelper [m : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 475972631464779826877858674307339937170790561302 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 14 05:20:19 UTC 2022 Final Date: Tue Apr 13 05:20:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [03:45:76:25:e3:28:ca:3d:66:2c:29:3d:27:b1:e6:8d:d2:da:6f:75] modulus: 99ee77723024687ce7fb901a5bfd25cb4704952dbf031f1d711ed0e8f6b4bb1bdf03792293f98fdf54462962a1b7e99b3d854dad637a500ee56ad77346b022a190500598a9dcd15b5c4ec22ef439c986974f796e574e83cef7c7a38117fbe5c0f710566f667c39fc97523365e15058a9d5bf2403c8ee7e8eb53f5a8384e95e851ea251b249eff89a1e3e97a93db10e51d293db4b01fa95783edda5c6c21f0369518a112a7cfc3c8107a296807f1a577f3fef631233d29800823182f75349f6fe79a8a83cb2165f8c066d7e6552af740b56013338b9ecc824de4d7e55980cf7ad7ba112af0c17ebb289b0ff1b4b1145ed337c6edc1f0eb575227e1ecc849949ed4647dd4a13c40b1eb43a4d32a8c5b78b63ab1b8ce1fcffbd9fd763d4ed22fd839bd8adfecbab11ac77b874f8d3a0c54aac4e62596dfe9476e70a814ec447b1848e3d08f4f6578d651a587c02fcf506b1d83f72aedcffb93f03f73f7eae2cc25f703f7216012cbf95c84f3d0629d3b79f8a18c0f5078acb7bae84d9f0d33d580f public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8e7156ceeb0f30b816d1c6a0c462d153c08fe579 92daf8370b0ea76ab8f9768a02fe214f77728ab7 9036a34fa9ab2709d7175747480e1b4b83a429da 25e7b36b3da72c2e85854c9bddc95158ea141087 707b7f362b916f1302e9a553e572ff2f5825557f d760d96e11da4dfa2d69eaac7d8083f922ce0cba f0888bdb36498f3d2b115e08a4903af1a286b7f1 3f646cb4fad7d3aedd1f625320470785740899d3 2b9692e254f61e5b0a5f3e31fffb35711dfec9d4 d79fd547a869fb4ea3ed6ac3c5ec3b90d2ead7d7 e8bff560910ae43c1670aab44855fb64ed8a4d1d 0ffbe36a5983d6efd2a2189083d34c94af83dec9 086efd384a4965c237553fc416bec954a5f81f45 6b7e027db805cdbde8924880413b17033c7af36f 5c2d7fe465c625b3ae76331febdce236e8caf647 944e9ca40a7d3c5928cc6eb190d35f06f3b44933 068235efb6062e05c9b73111b55d62d6cfb4be9b 65691bf0a6022a40ec9e77cf8c8e5bb1f1e2b845 291ce653bb445563f4b0c4eb43d5a2f63e63cfd4 a7cac1a1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [49:ae:f6:57:65:b3:df:50:dc:97:6c:3d:b7:f7:45:34:78:11:7e:73] modulus: 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 public exponent: 10001 ] 2022-04-14 08:58:06.131 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.CertificationController [m : Received certificate initialization request for CA named: RA 2022-04-14 08:58:06.132 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.c.c.c.Pkcs10CertificationRequestFactory[m : Creating certification request from pem object 2022-04-14 08:58:06.134 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-14 08:58:06.134 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-14 08:58:06.140 [32m INFO[m [35m1[m [io-8443-exec-10] [36m.o.c.c.CertificationResponseModelFactory[m : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-14 08:58:06.141 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validate before creating Certificate Request for CA: RA 2022-04-14 08:58:06.142 [32m INFO[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.v.CmpCertificationValidator [m : Validation completed successfully. 2022-04-14 08:58:06.142 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random integer 2022-04-14 08:58:06.143 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Extensions from Subject Alternative Names 2022-04-14 08:58:06.143 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpMessageHelper [m : Generating Optional Validity from Date objects 2022-04-14 08:58:06.155 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating a Pki Header Builder 2022-04-14 08:58:06.156 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-14 08:58:06.156 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating random array of bytes 2022-04-14 08:58:06.156 [32mDEBUG[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpUtil [m : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 08:58:06.366 [31mERROR[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.c.i.CmpClientImpl [m : Error encountered while processing response from CA server java.lang.IllegalArgumentException: failed to construct sequence from byte[]: unknown tag 28 encountered at org.bouncycastle.asn1.ASN1Sequence.getInstance(Unknown Source) at org.bouncycastle.asn1.cmp.PKIMessage.getInstance(Unknown Source) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.retrieveCertificates(CmpClientImpl.java:171) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeCmpRequest(CmpClientImpl.java:144) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeInitializationRequest(CmpClientImpl.java:89) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeInitializationRequest(CmpClientImpl.java:95) at org.onap.oom.certservice.certification.CertificationProvider.executeInitializationRequest(CertificationProvider.java:58) at org.onap.oom.certservice.certification.CertificationResponseModelFactory.provideCertificationModelFromInitialRequest(CertificationResponseModelFactory.java:77) at org.onap.oom.certservice.api.CertificationController.signCertificate(CertificationController.java:94) at jdk.internal.reflect.GeneratedMethodAccessor69.invoke(Unknown Source) at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(Unknown Source) at java.base/java.lang.reflect.Method.invoke(Unknown Source) at org.springframework.web.method.support.InvocableHandlerMethod.doInvoke(InvocableHandlerMethod.java:205) at org.springframework.web.method.support.InvocableHandlerMethod.invokeForRequest(InvocableHandlerMethod.java:150) at org.springframework.web.servlet.mvc.method.annotation.ServletInvocableHandlerMethod.invokeAndHandle(ServletInvocableHandlerMethod.java:117) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.invokeHandlerMethod(RequestMappingHandlerAdapter.java:895) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.handleInternal(RequestMappingHandlerAdapter.java:808) at org.springframework.web.servlet.mvc.method.AbstractHandlerMethodAdapter.handle(AbstractHandlerMethodAdapter.java:87) at org.springframework.web.servlet.DispatcherServlet.doDispatch(DispatcherServlet.java:1067) at org.springframework.web.servlet.DispatcherServlet.doService(DispatcherServlet.java:963) at org.springframework.web.servlet.FrameworkServlet.processRequest(FrameworkServlet.java:1006) at org.springframework.web.servlet.FrameworkServlet.doGet(FrameworkServlet.java:898) at javax.servlet.http.HttpServlet.service(HttpServlet.java:655) at org.springframework.web.servlet.FrameworkServlet.service(FrameworkServlet.java:883) at javax.servlet.http.HttpServlet.service(HttpServlet.java:764) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:227) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:53) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:100) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.FormContentFilter.doFilterInternal(FormContentFilter.java:93) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.boot.actuate.metrics.web.servlet.WebMvcMetricsFilter.doFilterInternal(WebMvcMetricsFilter.java:96) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:201) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:197) at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:97) at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:540) at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:135) at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:92) at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:78) at org.apache.catalina.valves.RemoteIpValve.invoke(RemoteIpValve.java:769) at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:357) at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:382) at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:65) at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:895) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1732) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at org.apache.tomcat.util.threads.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1191) at org.apache.tomcat.util.threads.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:659) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Unknown Source) 2022-04-14 08:58:06.378 [31mERROR[m [35m1[m [io-8443-exec-10] [36mo.o.o.c.a.a.CertificationExceptionAdvice[m : Exception occurred calling cmp client: org.onap.oom.certservice.cmpv2client.exceptions.CmpClientException: Error encountered while processing response from CA server at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.retrieveCertificates(CmpClientImpl.java:177) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeCmpRequest(CmpClientImpl.java:144) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeInitializationRequest(CmpClientImpl.java:89) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeInitializationRequest(CmpClientImpl.java:95) at org.onap.oom.certservice.certification.CertificationProvider.executeInitializationRequest(CertificationProvider.java:58) at org.onap.oom.certservice.certification.CertificationResponseModelFactory.provideCertificationModelFromInitialRequest(CertificationResponseModelFactory.java:77) at org.onap.oom.certservice.api.CertificationController.signCertificate(CertificationController.java:94) at jdk.internal.reflect.GeneratedMethodAccessor69.invoke(Unknown Source) at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(Unknown Source) at java.base/java.lang.reflect.Method.invoke(Unknown Source) at org.springframework.web.method.support.InvocableHandlerMethod.doInvoke(InvocableHandlerMethod.java:205) at org.springframework.web.method.support.InvocableHandlerMethod.invokeForRequest(InvocableHandlerMethod.java:150) at org.springframework.web.servlet.mvc.method.annotation.ServletInvocableHandlerMethod.invokeAndHandle(ServletInvocableHandlerMethod.java:117) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.invokeHandlerMethod(RequestMappingHandlerAdapter.java:895) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.handleInternal(RequestMappingHandlerAdapter.java:808) at org.springframework.web.servlet.mvc.method.AbstractHandlerMethodAdapter.handle(AbstractHandlerMethodAdapter.java:87) at org.springframework.web.servlet.DispatcherServlet.doDispatch(DispatcherServlet.java:1067) at org.springframework.web.servlet.DispatcherServlet.doService(DispatcherServlet.java:963) at org.springframework.web.servlet.FrameworkServlet.processRequest(FrameworkServlet.java:1006) at org.springframework.web.servlet.FrameworkServlet.doGet(FrameworkServlet.java:898) at javax.servlet.http.HttpServlet.service(HttpServlet.java:655) at org.springframework.web.servlet.FrameworkServlet.service(FrameworkServlet.java:883) at javax.servlet.http.HttpServlet.service(HttpServlet.java:764) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:227) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:53) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:100) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.FormContentFilter.doFilterInternal(FormContentFilter.java:93) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.boot.actuate.metrics.web.servlet.WebMvcMetricsFilter.doFilterInternal(WebMvcMetricsFilter.java:96) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:201) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:197) at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:97) at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:540) at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:135) at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:92) at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:78) at org.apache.catalina.valves.RemoteIpValve.invoke(RemoteIpValve.java:769) at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:357) at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:382) at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:65) at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:895) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1732) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at org.apache.tomcat.util.threads.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1191) at org.apache.tomcat.util.threads.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:659) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Unknown Source) Caused by: java.lang.IllegalArgumentException: failed to construct sequence from byte[]: unknown tag 28 encountered at org.bouncycastle.asn1.ASN1Sequence.getInstance(Unknown Source) at org.bouncycastle.asn1.cmp.PKIMessage.getInstance(Unknown Source) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.retrieveCertificates(CmpClientImpl.java:171) ... 60 more