2022-04-14 05:26:02,062 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-04-14 05:26:04,544 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-04-14 05:26:05.944  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Apr 14, 2022 5:26:10 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Apr 14, 2022 5:26:10 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Apr 14, 2022 5:26:10 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Apr 14, 2022 5:26:10 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-04-14 05:26:11.812 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-04-14 05:26:12.221  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-04-14 05:26:12.529  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-04-14 05:26:14.078 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-04-14 05:26:14.085 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-04-14 05:26:14.090 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-04-14 05:26:14.100 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-04-14 05:26:14.200 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) 2022-04-14 05:26:14.206 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-04-14 05:26:14.454 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-04-14 05:26:15.463 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Apr 14, 2022 5:26:16 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-04-14 05:26:17.348  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 17.311 seconds (JVM running for 21.409) Apr 14, 2022 5:26:30 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-04-14 05:27:02.168  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-14 05:27:02.182 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-14 05:27:02.281 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-04-14 05:27:02.287 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-14 05:27:02.310  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-04-14 05:27:02.314  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-14 05:27:02.316  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-14 05:27:02.317 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-14 05:27:02.318 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-14 05:27:02.336 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-14 05:27:02.344 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-14 05:27:02.349 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-14 05:27:02.420 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-14 05:27:02.434 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-14 05:27:02.435 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-14 05:27:02.443 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 05:27:03.452  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-14 05:27:03.457  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-14 05:27:03.458 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-14 05:27:03.462 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 05:27:03.482  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-14 05:27:03.487  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-14 05:27:03.490 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 05:27:03.493 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-14 05:27:03.494 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-14 05:27:03.526 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 05:27:03.527 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-14 05:27:03.528 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-14 05:27:03.541 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 05:27:03.543 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-14 05:27:03.543 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-14 05:27:03.547 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-14 05:27:03.598 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 475972631464779826877858674307339937170790561302 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 14 05:20:19 UTC 2022 Final Date: Tue Apr 13 05:20:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [03:45:76:25:e3:28:ca:3d:66:2c:29:3d:27:b1:e6:8d:d2:da:6f:75] modulus: 99ee77723024687ce7fb901a5bfd25cb4704952dbf031f1d711ed0e8f6b4bb1bdf03792293f98fdf54462962a1b7e99b3d854dad637a500ee56ad77346b022a190500598a9dcd15b5c4ec22ef439c986974f796e574e83cef7c7a38117fbe5c0f710566f667c39fc97523365e15058a9d5bf2403c8ee7e8eb53f5a8384e95e851ea251b249eff89a1e3e97a93db10e51d293db4b01fa95783edda5c6c21f0369518a112a7cfc3c8107a296807f1a577f3fef631233d29800823182f75349f6fe79a8a83cb2165f8c066d7e6552af740b56013338b9ecc824de4d7e55980cf7ad7ba112af0c17ebb289b0ff1b4b1145ed337c6edc1f0eb575227e1ecc849949ed4647dd4a13c40b1eb43a4d32a8c5b78b63ab1b8ce1fcffbd9fd763d4ed22fd839bd8adfecbab11ac77b874f8d3a0c54aac4e62596dfe9476e70a814ec447b1848e3d08f4f6578d651a587c02fcf506b1d83f72aedcffb93f03f73f7eae2cc25f703f7216012cbf95c84f3d0629d3b79f8a18c0f5078acb7bae84d9f0d33d580f public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8e7156ceeb0f30b816d1c6a0c462d153c08fe579 92daf8370b0ea76ab8f9768a02fe214f77728ab7 9036a34fa9ab2709d7175747480e1b4b83a429da 25e7b36b3da72c2e85854c9bddc95158ea141087 707b7f362b916f1302e9a553e572ff2f5825557f d760d96e11da4dfa2d69eaac7d8083f922ce0cba f0888bdb36498f3d2b115e08a4903af1a286b7f1 3f646cb4fad7d3aedd1f625320470785740899d3 2b9692e254f61e5b0a5f3e31fffb35711dfec9d4 d79fd547a869fb4ea3ed6ac3c5ec3b90d2ead7d7 e8bff560910ae43c1670aab44855fb64ed8a4d1d 0ffbe36a5983d6efd2a2189083d34c94af83dec9 086efd384a4965c237553fc416bec954a5f81f45 6b7e027db805cdbde8924880413b17033c7af36f 5c2d7fe465c625b3ae76331febdce236e8caf647 944e9ca40a7d3c5928cc6eb190d35f06f3b44933 068235efb6062e05c9b73111b55d62d6cfb4be9b 65691bf0a6022a40ec9e77cf8c8e5bb1f1e2b845 291ce653bb445563f4b0c4eb43d5a2f63e63cfd4 a7cac1a1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [be:81:bc:7f:0f:6c:b4:b1:c2:cd:55:65:64:a4:2c:77:81:6b:21:e0] modulus: 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 public exponent: 10001 ] 2022-04-14 07:44:42.359  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-14 07:44:42.362 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-14 07:44:42.367 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-04-14 07:44:42.368 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-14 07:44:42.370  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-04-14 07:44:42.375  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-14 07:44:42.376  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-14 07:44:42.377 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-14 07:44:42.379 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-14 07:44:42.381 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-14 07:44:42.416 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-14 07:44:42.417 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-14 07:44:42.418 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-14 07:44:42.420 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 07:44:42.737  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-14 07:44:42.739  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-14 07:44:42.740 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-14 07:44:42.740 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 07:44:42.750  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-14 07:44:42.751  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-14 07:44:42.751 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 07:44:42.755 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-14 07:44:42.755 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-14 07:44:42.758 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 07:44:42.759 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-14 07:44:42.759 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-14 07:44:42.763 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 07:44:42.765 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-14 07:44:42.765 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-14 07:44:42.767 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-14 07:44:42.782 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 475972631464779826877858674307339937170790561302 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 14 05:20:19 UTC 2022 Final Date: Tue Apr 13 05:20:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [03:45:76:25:e3:28:ca:3d:66:2c:29:3d:27:b1:e6:8d:d2:da:6f:75] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8e7156ceeb0f30b816d1c6a0c462d153c08fe579 92daf8370b0ea76ab8f9768a02fe214f77728ab7 9036a34fa9ab2709d7175747480e1b4b83a429da 25e7b36b3da72c2e85854c9bddc95158ea141087 707b7f362b916f1302e9a553e572ff2f5825557f d760d96e11da4dfa2d69eaac7d8083f922ce0cba f0888bdb36498f3d2b115e08a4903af1a286b7f1 3f646cb4fad7d3aedd1f625320470785740899d3 2b9692e254f61e5b0a5f3e31fffb35711dfec9d4 d79fd547a869fb4ea3ed6ac3c5ec3b90d2ead7d7 e8bff560910ae43c1670aab44855fb64ed8a4d1d 0ffbe36a5983d6efd2a2189083d34c94af83dec9 086efd384a4965c237553fc416bec954a5f81f45 6b7e027db805cdbde8924880413b17033c7af36f 5c2d7fe465c625b3ae76331febdce236e8caf647 944e9ca40a7d3c5928cc6eb190d35f06f3b44933 068235efb6062e05c9b73111b55d62d6cfb4be9b 65691bf0a6022a40ec9e77cf8c8e5bb1f1e2b845 291ce653bb445563f4b0c4eb43d5a2f63e63cfd4 a7cac1a1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4d:5b:2a:e0:17:72:63:9d:45:e4:18:ce:56:cd:4c:6a:a8:1e:69:01] modulus: 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 public exponent: 10001 ] 2022-04-14 07:45:04.955  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-14 07:45:04.961 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-14 07:45:04.964 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-14 07:45:04.966 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-14 07:45:04.967  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-14 07:45:04.968  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-14 07:45:04.969  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-14 07:45:04.969 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-14 07:45:04.970 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-14 07:45:04.971 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-14 07:45:04.995 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-14 07:45:04.996 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-14 07:45:04.996 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-14 07:45:04.997 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 07:45:05.190  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-14 07:45:05.192  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-14 07:45:05.192 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-14 07:45:05.193 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 07:45:05.201  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-14 07:45:05.209  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-14 07:45:05.211 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 07:45:05.211 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-14 07:45:05.212 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-14 07:45:05.218 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 07:45:05.219 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-14 07:45:05.220 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-14 07:45:05.222 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 07:45:05.227 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-14 07:45:05.230 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-14 07:45:05.234 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-14 07:45:05.248 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 475972631464779826877858674307339937170790561302 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 14 05:20:19 UTC 2022 Final Date: Tue Apr 13 05:20:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [03:45:76:25:e3:28:ca:3d:66:2c:29:3d:27:b1:e6:8d:d2:da:6f:75] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8e7156ceeb0f30b816d1c6a0c462d153c08fe579 92daf8370b0ea76ab8f9768a02fe214f77728ab7 9036a34fa9ab2709d7175747480e1b4b83a429da 25e7b36b3da72c2e85854c9bddc95158ea141087 707b7f362b916f1302e9a553e572ff2f5825557f d760d96e11da4dfa2d69eaac7d8083f922ce0cba f0888bdb36498f3d2b115e08a4903af1a286b7f1 3f646cb4fad7d3aedd1f625320470785740899d3 2b9692e254f61e5b0a5f3e31fffb35711dfec9d4 d79fd547a869fb4ea3ed6ac3c5ec3b90d2ead7d7 e8bff560910ae43c1670aab44855fb64ed8a4d1d 0ffbe36a5983d6efd2a2189083d34c94af83dec9 086efd384a4965c237553fc416bec954a5f81f45 6b7e027db805cdbde8924880413b17033c7af36f 5c2d7fe465c625b3ae76331febdce236e8caf647 944e9ca40a7d3c5928cc6eb190d35f06f3b44933 068235efb6062e05c9b73111b55d62d6cfb4be9b 65691bf0a6022a40ec9e77cf8c8e5bb1f1e2b845 291ce653bb445563f4b0c4eb43d5a2f63e63cfd4 a7cac1a1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c1:e8:1a:04:cd:6c:1f:b4:c6:c1:10:5a:9e:90:eb:f3:0f:3a:37:92] modulus: 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 public exponent: 10001 ] 2022-04-14 07:46:53.171  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-14 07:46:53.174 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-14 07:46:53.177 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-04-14 07:46:53.178 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-14 07:46:53.179  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-04-14 07:46:53.180  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-14 07:46:53.181  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-14 07:46:53.181 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-14 07:46:53.182 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-14 07:46:53.182 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-14 07:46:53.189 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-14 07:46:53.190 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-14 07:46:53.190 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-14 07:46:53.191 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 07:46:53.390  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-14 07:46:53.391  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-14 07:46:53.407 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-14 07:46:53.408 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 07:46:53.415  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-14 07:46:53.416  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-14 07:46:53.417 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 07:46:53.418 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-14 07:46:53.419 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-14 07:46:53.421 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 07:46:53.422 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-14 07:46:53.422 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-14 07:46:53.424 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 07:46:53.425 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-14 07:46:53.425 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-14 07:46:53.427 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-14 07:46:53.442 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 475972631464779826877858674307339937170790561302 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 14 05:20:19 UTC 2022 Final Date: Tue Apr 13 05:20:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [03:45:76:25:e3:28:ca:3d:66:2c:29:3d:27:b1:e6:8d:d2:da:6f:75] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8e7156ceeb0f30b816d1c6a0c462d153c08fe579 92daf8370b0ea76ab8f9768a02fe214f77728ab7 9036a34fa9ab2709d7175747480e1b4b83a429da 25e7b36b3da72c2e85854c9bddc95158ea141087 707b7f362b916f1302e9a553e572ff2f5825557f d760d96e11da4dfa2d69eaac7d8083f922ce0cba f0888bdb36498f3d2b115e08a4903af1a286b7f1 3f646cb4fad7d3aedd1f625320470785740899d3 2b9692e254f61e5b0a5f3e31fffb35711dfec9d4 d79fd547a869fb4ea3ed6ac3c5ec3b90d2ead7d7 e8bff560910ae43c1670aab44855fb64ed8a4d1d 0ffbe36a5983d6efd2a2189083d34c94af83dec9 086efd384a4965c237553fc416bec954a5f81f45 6b7e027db805cdbde8924880413b17033c7af36f 5c2d7fe465c625b3ae76331febdce236e8caf647 944e9ca40a7d3c5928cc6eb190d35f06f3b44933 068235efb6062e05c9b73111b55d62d6cfb4be9b 65691bf0a6022a40ec9e77cf8c8e5bb1f1e2b845 291ce653bb445563f4b0c4eb43d5a2f63e63cfd4 a7cac1a1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [af:79:ae:68:5c:c8:98:3e:38:56:53:12:60:93:be:95:27:62:13:be] modulus: af1b5aedd53430757c76dde7e82f295ef77ef844d57ca12a0fddf896d48cbcaf2d60551ad574c1eaa77a66d5f71f53e8032d5b5916941ce09646be6b27634afd898afce91512ad7ce2b3b86f43914d8b19df0723aef1887d5ae61c6ee901624716294af84eae5607658fe1f4cc1db33a8355e9798906ab3bc3b41842bacd476bd590ff1f6a041e94c8be6a2a9cc5237706bca51b4c3d65728f3c8edeeec51302b03d300db0a8676cb1f901b21e9188e0acee1cebf053500f903b6d0c077a87edfffa2940ff140aa55f9b7d605f49aadd4267f12606d15032f2c19764f5e45d830ae6dde2ba4c05fd269e6f00ce66d49dd080c20c6ebfac28cd996f3978de780d public exponent: 10001 ] 2022-04-14 07:49:01.845  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-14 07:49:01.847 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-14 07:49:01.851 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-04-14 07:49:01.852 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-14 07:49:01.853  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-04-14 07:49:01.855  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-14 07:49:01.855  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-14 07:49:01.856 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-14 07:49:01.857 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-14 07:49:01.858 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-14 07:49:01.866 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-14 07:49:01.868 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-14 07:49:01.869 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-14 07:49:01.870 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 07:49:02.084  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-14 07:49:02.085  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-14 07:49:02.086 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-14 07:49:02.087 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 07:49:02.090  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-14 07:49:02.092  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-14 07:49:02.096 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 07:49:02.097 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-14 07:49:02.098 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-14 07:49:02.099 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 07:49:02.100 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-14 07:49:02.101 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-14 07:49:02.102 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 07:49:02.103 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-14 07:49:02.104 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-14 07:49:02.105 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-14 07:49:02.112 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 475972631464779826877858674307339937170790561302 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 14 05:20:19 UTC 2022 Final Date: Tue Apr 13 05:20:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [03:45:76:25:e3:28:ca:3d:66:2c:29:3d:27:b1:e6:8d:d2:da:6f:75] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8e7156ceeb0f30b816d1c6a0c462d153c08fe579 92daf8370b0ea76ab8f9768a02fe214f77728ab7 9036a34fa9ab2709d7175747480e1b4b83a429da 25e7b36b3da72c2e85854c9bddc95158ea141087 707b7f362b916f1302e9a553e572ff2f5825557f d760d96e11da4dfa2d69eaac7d8083f922ce0cba f0888bdb36498f3d2b115e08a4903af1a286b7f1 3f646cb4fad7d3aedd1f625320470785740899d3 2b9692e254f61e5b0a5f3e31fffb35711dfec9d4 d79fd547a869fb4ea3ed6ac3c5ec3b90d2ead7d7 e8bff560910ae43c1670aab44855fb64ed8a4d1d 0ffbe36a5983d6efd2a2189083d34c94af83dec9 086efd384a4965c237553fc416bec954a5f81f45 6b7e027db805cdbde8924880413b17033c7af36f 5c2d7fe465c625b3ae76331febdce236e8caf647 944e9ca40a7d3c5928cc6eb190d35f06f3b44933 068235efb6062e05c9b73111b55d62d6cfb4be9b 65691bf0a6022a40ec9e77cf8c8e5bb1f1e2b845 291ce653bb445563f4b0c4eb43d5a2f63e63cfd4 a7cac1a1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3b:f8:81:88:6f:63:ed:c1:4a:f5:83:08:b5:df:dd:c0:b1:76:4e:14] modulus: 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 public exponent: 10001 ] 2022-04-14 07:51:32.083  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-14 07:51:32.088 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-14 07:51:32.092 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-04-14 07:51:32.093 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-14 07:51:32.094  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-04-14 07:51:32.097  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-14 07:51:32.097  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-14 07:51:32.098 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-14 07:51:32.099 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-14 07:51:32.100 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-14 07:51:32.119 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-14 07:51:32.122 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-14 07:51:32.122 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-14 07:51:32.123 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 07:51:32.166 ERROR 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Error encountered while processing response from CA server java.lang.IllegalArgumentException: failed to construct sequence from byte[]: unknown tag 28 encountered at org.bouncycastle.asn1.ASN1Sequence.getInstance(Unknown Source) at org.bouncycastle.asn1.cmp.PKIMessage.getInstance(Unknown Source) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.retrieveCertificates(CmpClientImpl.java:171) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeCmpRequest(CmpClientImpl.java:144) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeInitializationRequest(CmpClientImpl.java:89) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeInitializationRequest(CmpClientImpl.java:95) at org.onap.oom.certservice.certification.CertificationProvider.executeInitializationRequest(CertificationProvider.java:58) at org.onap.oom.certservice.certification.CertificationResponseModelFactory.provideCertificationModelFromInitialRequest(CertificationResponseModelFactory.java:77) at org.onap.oom.certservice.api.CertificationController.signCertificate(CertificationController.java:94) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(Unknown Source) at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(Unknown Source) at java.base/java.lang.reflect.Method.invoke(Unknown Source) at org.springframework.web.method.support.InvocableHandlerMethod.doInvoke(InvocableHandlerMethod.java:205) at org.springframework.web.method.support.InvocableHandlerMethod.invokeForRequest(InvocableHandlerMethod.java:150) at org.springframework.web.servlet.mvc.method.annotation.ServletInvocableHandlerMethod.invokeAndHandle(ServletInvocableHandlerMethod.java:117) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.invokeHandlerMethod(RequestMappingHandlerAdapter.java:895) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.handleInternal(RequestMappingHandlerAdapter.java:808) at org.springframework.web.servlet.mvc.method.AbstractHandlerMethodAdapter.handle(AbstractHandlerMethodAdapter.java:87) at org.springframework.web.servlet.DispatcherServlet.doDispatch(DispatcherServlet.java:1067) at org.springframework.web.servlet.DispatcherServlet.doService(DispatcherServlet.java:963) at org.springframework.web.servlet.FrameworkServlet.processRequest(FrameworkServlet.java:1006) at org.springframework.web.servlet.FrameworkServlet.doGet(FrameworkServlet.java:898) at javax.servlet.http.HttpServlet.service(HttpServlet.java:655) at org.springframework.web.servlet.FrameworkServlet.service(FrameworkServlet.java:883) at javax.servlet.http.HttpServlet.service(HttpServlet.java:764) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:227) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:53) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:100) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.FormContentFilter.doFilterInternal(FormContentFilter.java:93) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.boot.actuate.metrics.web.servlet.WebMvcMetricsFilter.doFilterInternal(WebMvcMetricsFilter.java:96) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:201) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:197) at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:97) at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:540) at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:135) at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:92) at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:78) at org.apache.catalina.valves.RemoteIpValve.invoke(RemoteIpValve.java:769) at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:357) at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:382) at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:65) at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:895) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1732) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at org.apache.tomcat.util.threads.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1191) at org.apache.tomcat.util.threads.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:659) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Unknown Source) 2022-04-14 07:51:32.197 ERROR 1 [nio-8443-exec-3] o.o.o.c.a.a.CertificationExceptionAdvice : Exception occurred calling cmp client: org.onap.oom.certservice.cmpv2client.exceptions.CmpClientException: Error encountered while processing response from CA server at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.retrieveCertificates(CmpClientImpl.java:177) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeCmpRequest(CmpClientImpl.java:144) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeInitializationRequest(CmpClientImpl.java:89) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeInitializationRequest(CmpClientImpl.java:95) at org.onap.oom.certservice.certification.CertificationProvider.executeInitializationRequest(CertificationProvider.java:58) at org.onap.oom.certservice.certification.CertificationResponseModelFactory.provideCertificationModelFromInitialRequest(CertificationResponseModelFactory.java:77) at org.onap.oom.certservice.api.CertificationController.signCertificate(CertificationController.java:94) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(Unknown Source) at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(Unknown Source) at java.base/java.lang.reflect.Method.invoke(Unknown Source) at org.springframework.web.method.support.InvocableHandlerMethod.doInvoke(InvocableHandlerMethod.java:205) at org.springframework.web.method.support.InvocableHandlerMethod.invokeForRequest(InvocableHandlerMethod.java:150) at org.springframework.web.servlet.mvc.method.annotation.ServletInvocableHandlerMethod.invokeAndHandle(ServletInvocableHandlerMethod.java:117) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.invokeHandlerMethod(RequestMappingHandlerAdapter.java:895) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.handleInternal(RequestMappingHandlerAdapter.java:808) at org.springframework.web.servlet.mvc.method.AbstractHandlerMethodAdapter.handle(AbstractHandlerMethodAdapter.java:87) at org.springframework.web.servlet.DispatcherServlet.doDispatch(DispatcherServlet.java:1067) at org.springframework.web.servlet.DispatcherServlet.doService(DispatcherServlet.java:963) at org.springframework.web.servlet.FrameworkServlet.processRequest(FrameworkServlet.java:1006) at org.springframework.web.servlet.FrameworkServlet.doGet(FrameworkServlet.java:898) at javax.servlet.http.HttpServlet.service(HttpServlet.java:655) at org.springframework.web.servlet.FrameworkServlet.service(FrameworkServlet.java:883) at javax.servlet.http.HttpServlet.service(HttpServlet.java:764) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:227) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:53) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:100) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.FormContentFilter.doFilterInternal(FormContentFilter.java:93) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.boot.actuate.metrics.web.servlet.WebMvcMetricsFilter.doFilterInternal(WebMvcMetricsFilter.java:96) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:201) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:197) at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:97) at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:540) at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:135) at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:92) at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:78) at org.apache.catalina.valves.RemoteIpValve.invoke(RemoteIpValve.java:769) at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:357) at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:382) at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:65) at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:895) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1732) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at org.apache.tomcat.util.threads.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1191) at org.apache.tomcat.util.threads.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:659) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Unknown Source) Caused by: java.lang.IllegalArgumentException: failed to construct sequence from byte[]: unknown tag 28 encountered at org.bouncycastle.asn1.ASN1Sequence.getInstance(Unknown Source) at org.bouncycastle.asn1.cmp.PKIMessage.getInstance(Unknown Source) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.retrieveCertificates(CmpClientImpl.java:171) ... 61 more 2022-04-14 07:51:39.509  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-14 07:51:39.510 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-14 07:51:39.512 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-14 07:51:39.513 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-14 07:51:39.513  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-14 07:51:39.514  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-14 07:51:39.514  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-14 07:51:39.515 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-14 07:51:39.515 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-14 07:51:39.516 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-14 07:51:39.526 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-14 07:51:39.527 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-14 07:51:39.528 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-14 07:51:39.529 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 07:51:39.554 ERROR 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Error encountered while processing response from CA server java.lang.IllegalArgumentException: failed to construct sequence from byte[]: unknown tag 28 encountered at org.bouncycastle.asn1.ASN1Sequence.getInstance(Unknown Source) at org.bouncycastle.asn1.cmp.PKIMessage.getInstance(Unknown Source) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.retrieveCertificates(CmpClientImpl.java:171) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeCmpRequest(CmpClientImpl.java:144) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeInitializationRequest(CmpClientImpl.java:89) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeInitializationRequest(CmpClientImpl.java:95) at org.onap.oom.certservice.certification.CertificationProvider.executeInitializationRequest(CertificationProvider.java:58) at org.onap.oom.certservice.certification.CertificationResponseModelFactory.provideCertificationModelFromInitialRequest(CertificationResponseModelFactory.java:77) at org.onap.oom.certservice.api.CertificationController.signCertificate(CertificationController.java:94) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(Unknown Source) at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(Unknown Source) at java.base/java.lang.reflect.Method.invoke(Unknown Source) at org.springframework.web.method.support.InvocableHandlerMethod.doInvoke(InvocableHandlerMethod.java:205) at org.springframework.web.method.support.InvocableHandlerMethod.invokeForRequest(InvocableHandlerMethod.java:150) at org.springframework.web.servlet.mvc.method.annotation.ServletInvocableHandlerMethod.invokeAndHandle(ServletInvocableHandlerMethod.java:117) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.invokeHandlerMethod(RequestMappingHandlerAdapter.java:895) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.handleInternal(RequestMappingHandlerAdapter.java:808) at org.springframework.web.servlet.mvc.method.AbstractHandlerMethodAdapter.handle(AbstractHandlerMethodAdapter.java:87) at org.springframework.web.servlet.DispatcherServlet.doDispatch(DispatcherServlet.java:1067) at org.springframework.web.servlet.DispatcherServlet.doService(DispatcherServlet.java:963) at org.springframework.web.servlet.FrameworkServlet.processRequest(FrameworkServlet.java:1006) at org.springframework.web.servlet.FrameworkServlet.doGet(FrameworkServlet.java:898) at javax.servlet.http.HttpServlet.service(HttpServlet.java:655) at org.springframework.web.servlet.FrameworkServlet.service(FrameworkServlet.java:883) at javax.servlet.http.HttpServlet.service(HttpServlet.java:764) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:227) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:53) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:100) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.FormContentFilter.doFilterInternal(FormContentFilter.java:93) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.boot.actuate.metrics.web.servlet.WebMvcMetricsFilter.doFilterInternal(WebMvcMetricsFilter.java:96) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:201) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:197) at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:97) at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:540) at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:135) at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:92) at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:78) at org.apache.catalina.valves.RemoteIpValve.invoke(RemoteIpValve.java:769) at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:357) at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:382) at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:65) at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:895) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1732) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at org.apache.tomcat.util.threads.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1191) at org.apache.tomcat.util.threads.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:659) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Unknown Source) 2022-04-14 07:51:39.560 ERROR 1 [io-8443-exec-10] o.o.o.c.a.a.CertificationExceptionAdvice : Exception occurred calling cmp client: org.onap.oom.certservice.cmpv2client.exceptions.CmpClientException: Error encountered while processing response from CA server at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.retrieveCertificates(CmpClientImpl.java:177) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeCmpRequest(CmpClientImpl.java:144) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeInitializationRequest(CmpClientImpl.java:89) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeInitializationRequest(CmpClientImpl.java:95) at org.onap.oom.certservice.certification.CertificationProvider.executeInitializationRequest(CertificationProvider.java:58) at org.onap.oom.certservice.certification.CertificationResponseModelFactory.provideCertificationModelFromInitialRequest(CertificationResponseModelFactory.java:77) at org.onap.oom.certservice.api.CertificationController.signCertificate(CertificationController.java:94) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(Unknown Source) at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(Unknown Source) at java.base/java.lang.reflect.Method.invoke(Unknown Source) at org.springframework.web.method.support.InvocableHandlerMethod.doInvoke(InvocableHandlerMethod.java:205) at org.springframework.web.method.support.InvocableHandlerMethod.invokeForRequest(InvocableHandlerMethod.java:150) at org.springframework.web.servlet.mvc.method.annotation.ServletInvocableHandlerMethod.invokeAndHandle(ServletInvocableHandlerMethod.java:117) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.invokeHandlerMethod(RequestMappingHandlerAdapter.java:895) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.handleInternal(RequestMappingHandlerAdapter.java:808) at org.springframework.web.servlet.mvc.method.AbstractHandlerMethodAdapter.handle(AbstractHandlerMethodAdapter.java:87) at org.springframework.web.servlet.DispatcherServlet.doDispatch(DispatcherServlet.java:1067) at org.springframework.web.servlet.DispatcherServlet.doService(DispatcherServlet.java:963) at org.springframework.web.servlet.FrameworkServlet.processRequest(FrameworkServlet.java:1006) at org.springframework.web.servlet.FrameworkServlet.doGet(FrameworkServlet.java:898) at javax.servlet.http.HttpServlet.service(HttpServlet.java:655) at org.springframework.web.servlet.FrameworkServlet.service(FrameworkServlet.java:883) at javax.servlet.http.HttpServlet.service(HttpServlet.java:764) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:227) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:53) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:100) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.FormContentFilter.doFilterInternal(FormContentFilter.java:93) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.boot.actuate.metrics.web.servlet.WebMvcMetricsFilter.doFilterInternal(WebMvcMetricsFilter.java:96) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:201) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:197) at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:97) at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:540) at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:135) at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:92) at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:78) at org.apache.catalina.valves.RemoteIpValve.invoke(RemoteIpValve.java:769) at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:357) at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:382) at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:65) at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:895) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1732) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at org.apache.tomcat.util.threads.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1191) at org.apache.tomcat.util.threads.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:659) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Unknown Source) Caused by: java.lang.IllegalArgumentException: failed to construct sequence from byte[]: unknown tag 28 encountered at org.bouncycastle.asn1.ASN1Sequence.getInstance(Unknown Source) at org.bouncycastle.asn1.cmp.PKIMessage.getInstance(Unknown Source) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.retrieveCertificates(CmpClientImpl.java:171) ... 61 more 2022-04-14 07:55:17.301  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-14 07:55:17.303 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-14 07:55:17.305 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-14 07:55:17.306 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-14 07:55:17.307  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-14 07:55:17.308  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-14 07:55:17.308  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-14 07:55:17.309 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-14 07:55:17.310 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-14 07:55:17.311 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-14 07:55:17.318 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-14 07:55:17.320 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-14 07:55:17.321 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-14 07:55:17.322 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 07:55:17.555  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-14 07:55:17.556  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-14 07:55:17.557 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-14 07:55:17.557 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 07:55:17.559  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-14 07:55:17.559  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-14 07:55:17.560 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 07:55:17.560 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-14 07:55:17.561 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-14 07:55:17.562 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 07:55:17.563 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-14 07:55:17.564 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-14 07:55:17.565 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 07:55:17.566 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-14 07:55:17.566 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-14 07:55:17.568 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-14 07:55:17.578 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 475972631464779826877858674307339937170790561302 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 14 05:20:19 UTC 2022 Final Date: Tue Apr 13 05:20:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [03:45:76:25:e3:28:ca:3d:66:2c:29:3d:27:b1:e6:8d:d2:da:6f:75] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8e7156ceeb0f30b816d1c6a0c462d153c08fe579 92daf8370b0ea76ab8f9768a02fe214f77728ab7 9036a34fa9ab2709d7175747480e1b4b83a429da 25e7b36b3da72c2e85854c9bddc95158ea141087 707b7f362b916f1302e9a553e572ff2f5825557f d760d96e11da4dfa2d69eaac7d8083f922ce0cba f0888bdb36498f3d2b115e08a4903af1a286b7f1 3f646cb4fad7d3aedd1f625320470785740899d3 2b9692e254f61e5b0a5f3e31fffb35711dfec9d4 d79fd547a869fb4ea3ed6ac3c5ec3b90d2ead7d7 e8bff560910ae43c1670aab44855fb64ed8a4d1d 0ffbe36a5983d6efd2a2189083d34c94af83dec9 086efd384a4965c237553fc416bec954a5f81f45 6b7e027db805cdbde8924880413b17033c7af36f 5c2d7fe465c625b3ae76331febdce236e8caf647 944e9ca40a7d3c5928cc6eb190d35f06f3b44933 068235efb6062e05c9b73111b55d62d6cfb4be9b 65691bf0a6022a40ec9e77cf8c8e5bb1f1e2b845 291ce653bb445563f4b0c4eb43d5a2f63e63cfd4 a7cac1a1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [00:1f:1a:85:98:ce:39:56:4a:97:ee:e9:c3:ab:f4:36:58:55:38:c2] modulus: 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 public exponent: 10001 ] 2022-04-14 08:00:51.813  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-14 08:00:51.821 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-14 08:00:51.829 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-14 08:00:51.833 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-14 08:00:51.834  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-14 08:00:51.834  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-14 08:00:51.835  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-14 08:00:51.835 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-14 08:00:51.836 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-14 08:00:51.836 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-14 08:00:51.844 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-14 08:00:51.846 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-14 08:00:51.846 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-14 08:00:51.847 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 08:00:52.116  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-14 08:00:52.117  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-14 08:00:52.118 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-14 08:00:52.118 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 08:00:52.122  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-14 08:00:52.124  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-14 08:00:52.124 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:00:52.125 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:00:52.125 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:00:52.126 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:00:52.129 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:00:52.129 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:00:52.131 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:00:52.131 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:00:52.131 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:00:52.133 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-14 08:00:52.138 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 475972631464779826877858674307339937170790561302 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 14 05:20:19 UTC 2022 Final Date: Tue Apr 13 05:20:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [03:45:76:25:e3:28:ca:3d:66:2c:29:3d:27:b1:e6:8d:d2:da:6f:75] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8e7156ceeb0f30b816d1c6a0c462d153c08fe579 92daf8370b0ea76ab8f9768a02fe214f77728ab7 9036a34fa9ab2709d7175747480e1b4b83a429da 25e7b36b3da72c2e85854c9bddc95158ea141087 707b7f362b916f1302e9a553e572ff2f5825557f d760d96e11da4dfa2d69eaac7d8083f922ce0cba f0888bdb36498f3d2b115e08a4903af1a286b7f1 3f646cb4fad7d3aedd1f625320470785740899d3 2b9692e254f61e5b0a5f3e31fffb35711dfec9d4 d79fd547a869fb4ea3ed6ac3c5ec3b90d2ead7d7 e8bff560910ae43c1670aab44855fb64ed8a4d1d 0ffbe36a5983d6efd2a2189083d34c94af83dec9 086efd384a4965c237553fc416bec954a5f81f45 6b7e027db805cdbde8924880413b17033c7af36f 5c2d7fe465c625b3ae76331febdce236e8caf647 944e9ca40a7d3c5928cc6eb190d35f06f3b44933 068235efb6062e05c9b73111b55d62d6cfb4be9b 65691bf0a6022a40ec9e77cf8c8e5bb1f1e2b845 291ce653bb445563f4b0c4eb43d5a2f63e63cfd4 a7cac1a1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ac:2e:1f:2e:73:1b:68:be:32:ed:8a:14:55:a7:c4:2f:4c:a8:4b:09] modulus: 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 public exponent: 10001 ] 2022-04-14 08:05:16.552  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-14 08:05:16.555 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-14 08:05:16.557 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-14 08:05:16.558 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-14 08:05:16.559  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-14 08:05:16.559  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-14 08:05:16.560  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-14 08:05:16.560 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-14 08:05:16.561 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-14 08:05:16.561 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-14 08:05:16.566 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-14 08:05:16.567 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-14 08:05:16.568 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-14 08:05:16.568 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 08:05:16.633 ERROR 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Error encountered while processing response from CA server java.lang.IllegalArgumentException: failed to construct sequence from byte[]: unknown tag 28 encountered at org.bouncycastle.asn1.ASN1Sequence.getInstance(Unknown Source) at org.bouncycastle.asn1.cmp.PKIMessage.getInstance(Unknown Source) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.retrieveCertificates(CmpClientImpl.java:171) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeCmpRequest(CmpClientImpl.java:144) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeInitializationRequest(CmpClientImpl.java:89) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeInitializationRequest(CmpClientImpl.java:95) at org.onap.oom.certservice.certification.CertificationProvider.executeInitializationRequest(CertificationProvider.java:58) at org.onap.oom.certservice.certification.CertificationResponseModelFactory.provideCertificationModelFromInitialRequest(CertificationResponseModelFactory.java:77) at org.onap.oom.certservice.api.CertificationController.signCertificate(CertificationController.java:94) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(Unknown Source) at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(Unknown Source) at java.base/java.lang.reflect.Method.invoke(Unknown Source) at org.springframework.web.method.support.InvocableHandlerMethod.doInvoke(InvocableHandlerMethod.java:205) at org.springframework.web.method.support.InvocableHandlerMethod.invokeForRequest(InvocableHandlerMethod.java:150) at org.springframework.web.servlet.mvc.method.annotation.ServletInvocableHandlerMethod.invokeAndHandle(ServletInvocableHandlerMethod.java:117) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.invokeHandlerMethod(RequestMappingHandlerAdapter.java:895) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.handleInternal(RequestMappingHandlerAdapter.java:808) at org.springframework.web.servlet.mvc.method.AbstractHandlerMethodAdapter.handle(AbstractHandlerMethodAdapter.java:87) at org.springframework.web.servlet.DispatcherServlet.doDispatch(DispatcherServlet.java:1067) at org.springframework.web.servlet.DispatcherServlet.doService(DispatcherServlet.java:963) at org.springframework.web.servlet.FrameworkServlet.processRequest(FrameworkServlet.java:1006) at org.springframework.web.servlet.FrameworkServlet.doGet(FrameworkServlet.java:898) at javax.servlet.http.HttpServlet.service(HttpServlet.java:655) at org.springframework.web.servlet.FrameworkServlet.service(FrameworkServlet.java:883) at javax.servlet.http.HttpServlet.service(HttpServlet.java:764) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:227) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:53) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:100) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.FormContentFilter.doFilterInternal(FormContentFilter.java:93) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.boot.actuate.metrics.web.servlet.WebMvcMetricsFilter.doFilterInternal(WebMvcMetricsFilter.java:96) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:201) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:197) at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:97) at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:540) at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:135) at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:92) at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:78) at org.apache.catalina.valves.RemoteIpValve.invoke(RemoteIpValve.java:769) at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:357) at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:382) at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:65) at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:895) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1732) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at org.apache.tomcat.util.threads.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1191) at org.apache.tomcat.util.threads.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:659) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Unknown Source) 2022-04-14 08:05:16.640 ERROR 1 [nio-8443-exec-7] o.o.o.c.a.a.CertificationExceptionAdvice : Exception occurred calling cmp client: org.onap.oom.certservice.cmpv2client.exceptions.CmpClientException: Error encountered while processing response from CA server at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.retrieveCertificates(CmpClientImpl.java:177) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeCmpRequest(CmpClientImpl.java:144) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeInitializationRequest(CmpClientImpl.java:89) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeInitializationRequest(CmpClientImpl.java:95) at org.onap.oom.certservice.certification.CertificationProvider.executeInitializationRequest(CertificationProvider.java:58) at org.onap.oom.certservice.certification.CertificationResponseModelFactory.provideCertificationModelFromInitialRequest(CertificationResponseModelFactory.java:77) at org.onap.oom.certservice.api.CertificationController.signCertificate(CertificationController.java:94) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(Unknown Source) at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(Unknown Source) at java.base/java.lang.reflect.Method.invoke(Unknown Source) at org.springframework.web.method.support.InvocableHandlerMethod.doInvoke(InvocableHandlerMethod.java:205) at org.springframework.web.method.support.InvocableHandlerMethod.invokeForRequest(InvocableHandlerMethod.java:150) at org.springframework.web.servlet.mvc.method.annotation.ServletInvocableHandlerMethod.invokeAndHandle(ServletInvocableHandlerMethod.java:117) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.invokeHandlerMethod(RequestMappingHandlerAdapter.java:895) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.handleInternal(RequestMappingHandlerAdapter.java:808) at org.springframework.web.servlet.mvc.method.AbstractHandlerMethodAdapter.handle(AbstractHandlerMethodAdapter.java:87) at org.springframework.web.servlet.DispatcherServlet.doDispatch(DispatcherServlet.java:1067) at org.springframework.web.servlet.DispatcherServlet.doService(DispatcherServlet.java:963) at org.springframework.web.servlet.FrameworkServlet.processRequest(FrameworkServlet.java:1006) at org.springframework.web.servlet.FrameworkServlet.doGet(FrameworkServlet.java:898) at javax.servlet.http.HttpServlet.service(HttpServlet.java:655) at org.springframework.web.servlet.FrameworkServlet.service(FrameworkServlet.java:883) at javax.servlet.http.HttpServlet.service(HttpServlet.java:764) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:227) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:53) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:100) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.FormContentFilter.doFilterInternal(FormContentFilter.java:93) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.boot.actuate.metrics.web.servlet.WebMvcMetricsFilter.doFilterInternal(WebMvcMetricsFilter.java:96) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:201) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:197) at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:97) at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:540) at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:135) at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:92) at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:78) at org.apache.catalina.valves.RemoteIpValve.invoke(RemoteIpValve.java:769) at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:357) at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:382) at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:65) at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:895) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1732) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at org.apache.tomcat.util.threads.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1191) at org.apache.tomcat.util.threads.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:659) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Unknown Source) Caused by: java.lang.IllegalArgumentException: failed to construct sequence from byte[]: unknown tag 28 encountered at org.bouncycastle.asn1.ASN1Sequence.getInstance(Unknown Source) at org.bouncycastle.asn1.cmp.PKIMessage.getInstance(Unknown Source) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.retrieveCertificates(CmpClientImpl.java:171) ... 61 more 2022-04-14 08:06:07.505  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-14 08:06:07.507 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-14 08:06:07.509 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-04-14 08:06:07.528 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-14 08:06:07.528  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-04-14 08:06:07.529  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-14 08:06:07.529  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-14 08:06:07.530 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-14 08:06:07.530 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-14 08:06:07.531 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-14 08:06:07.556 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-14 08:06:07.557 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-14 08:06:07.557 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-14 08:06:07.558 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 08:06:07.739  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-14 08:06:07.740  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-14 08:06:07.741 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-14 08:06:07.741 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 08:06:07.743  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-14 08:06:07.744  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-14 08:06:07.744 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:06:07.744 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:06:07.745 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:06:07.746 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:06:07.746 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:06:07.747 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:06:07.748 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:06:07.748 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:06:07.749 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:06:07.750 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-14 08:06:07.757 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 475972631464779826877858674307339937170790561302 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 14 05:20:19 UTC 2022 Final Date: Tue Apr 13 05:20:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [03:45:76:25:e3:28:ca:3d:66:2c:29:3d:27:b1:e6:8d:d2:da:6f:75] modulus: 99ee77723024687ce7fb901a5bfd25cb4704952dbf031f1d711ed0e8f6b4bb1bdf03792293f98fdf54462962a1b7e99b3d854dad637a500ee56ad77346b022a190500598a9dcd15b5c4ec22ef439c986974f796e574e83cef7c7a38117fbe5c0f710566f667c39fc97523365e15058a9d5bf2403c8ee7e8eb53f5a8384e95e851ea251b249eff89a1e3e97a93db10e51d293db4b01fa95783edda5c6c21f0369518a112a7cfc3c8107a296807f1a577f3fef631233d29800823182f75349f6fe79a8a83cb2165f8c066d7e6552af740b56013338b9ecc824de4d7e55980cf7ad7ba112af0c17ebb289b0ff1b4b1145ed337c6edc1f0eb575227e1ecc849949ed4647dd4a13c40b1eb43a4d32a8c5b78b63ab1b8ce1fcffbd9fd763d4ed22fd839bd8adfecbab11ac77b874f8d3a0c54aac4e62596dfe9476e70a814ec447b1848e3d08f4f6578d651a587c02fcf506b1d83f72aedcffb93f03f73f7eae2cc25f703f7216012cbf95c84f3d0629d3b79f8a18c0f5078acb7bae84d9f0d33d580f public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8e7156ceeb0f30b816d1c6a0c462d153c08fe579 92daf8370b0ea76ab8f9768a02fe214f77728ab7 9036a34fa9ab2709d7175747480e1b4b83a429da 25e7b36b3da72c2e85854c9bddc95158ea141087 707b7f362b916f1302e9a553e572ff2f5825557f d760d96e11da4dfa2d69eaac7d8083f922ce0cba f0888bdb36498f3d2b115e08a4903af1a286b7f1 3f646cb4fad7d3aedd1f625320470785740899d3 2b9692e254f61e5b0a5f3e31fffb35711dfec9d4 d79fd547a869fb4ea3ed6ac3c5ec3b90d2ead7d7 e8bff560910ae43c1670aab44855fb64ed8a4d1d 0ffbe36a5983d6efd2a2189083d34c94af83dec9 086efd384a4965c237553fc416bec954a5f81f45 6b7e027db805cdbde8924880413b17033c7af36f 5c2d7fe465c625b3ae76331febdce236e8caf647 944e9ca40a7d3c5928cc6eb190d35f06f3b44933 068235efb6062e05c9b73111b55d62d6cfb4be9b 65691bf0a6022a40ec9e77cf8c8e5bb1f1e2b845 291ce653bb445563f4b0c4eb43d5a2f63e63cfd4 a7cac1a1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ec:79:db:59:95:00:db:f5:01:c7:e0:7d:86:61:a1:ad:a0:16:13:97] modulus: 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 public exponent: 10001 ] 2022-04-14 08:07:07.902  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-14 08:07:07.903 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-14 08:07:07.905 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-04-14 08:07:07.906 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-14 08:07:07.906  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-04-14 08:07:07.907  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-14 08:07:07.907  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-14 08:07:07.907 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-14 08:07:07.908 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-14 08:07:07.908 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-14 08:07:07.919 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-14 08:07:07.920 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-14 08:07:07.921 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-14 08:07:07.922 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 08:07:08.136  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-14 08:07:08.137  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-14 08:07:08.137 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-14 08:07:08.138 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 08:07:08.142  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-14 08:07:08.143  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-14 08:07:08.144 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:07:08.145 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:07:08.145 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:07:08.146 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:07:08.147 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:07:08.147 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:07:08.149 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:07:08.149 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:07:08.149 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:07:08.150 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-14 08:07:08.154 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 475972631464779826877858674307339937170790561302 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 14 05:20:19 UTC 2022 Final Date: Tue Apr 13 05:20:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [03:45:76:25:e3:28:ca:3d:66:2c:29:3d:27:b1:e6:8d:d2:da:6f:75] modulus: 99ee77723024687ce7fb901a5bfd25cb4704952dbf031f1d711ed0e8f6b4bb1bdf03792293f98fdf54462962a1b7e99b3d854dad637a500ee56ad77346b022a190500598a9dcd15b5c4ec22ef439c986974f796e574e83cef7c7a38117fbe5c0f710566f667c39fc97523365e15058a9d5bf2403c8ee7e8eb53f5a8384e95e851ea251b249eff89a1e3e97a93db10e51d293db4b01fa95783edda5c6c21f0369518a112a7cfc3c8107a296807f1a577f3fef631233d29800823182f75349f6fe79a8a83cb2165f8c066d7e6552af740b56013338b9ecc824de4d7e55980cf7ad7ba112af0c17ebb289b0ff1b4b1145ed337c6edc1f0eb575227e1ecc849949ed4647dd4a13c40b1eb43a4d32a8c5b78b63ab1b8ce1fcffbd9fd763d4ed22fd839bd8adfecbab11ac77b874f8d3a0c54aac4e62596dfe9476e70a814ec447b1848e3d08f4f6578d651a587c02fcf506b1d83f72aedcffb93f03f73f7eae2cc25f703f7216012cbf95c84f3d0629d3b79f8a18c0f5078acb7bae84d9f0d33d580f public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8e7156ceeb0f30b816d1c6a0c462d153c08fe579 92daf8370b0ea76ab8f9768a02fe214f77728ab7 9036a34fa9ab2709d7175747480e1b4b83a429da 25e7b36b3da72c2e85854c9bddc95158ea141087 707b7f362b916f1302e9a553e572ff2f5825557f d760d96e11da4dfa2d69eaac7d8083f922ce0cba f0888bdb36498f3d2b115e08a4903af1a286b7f1 3f646cb4fad7d3aedd1f625320470785740899d3 2b9692e254f61e5b0a5f3e31fffb35711dfec9d4 d79fd547a869fb4ea3ed6ac3c5ec3b90d2ead7d7 e8bff560910ae43c1670aab44855fb64ed8a4d1d 0ffbe36a5983d6efd2a2189083d34c94af83dec9 086efd384a4965c237553fc416bec954a5f81f45 6b7e027db805cdbde8924880413b17033c7af36f 5c2d7fe465c625b3ae76331febdce236e8caf647 944e9ca40a7d3c5928cc6eb190d35f06f3b44933 068235efb6062e05c9b73111b55d62d6cfb4be9b 65691bf0a6022a40ec9e77cf8c8e5bb1f1e2b845 291ce653bb445563f4b0c4eb43d5a2f63e63cfd4 a7cac1a1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [93:a8:c4:f4:0f:db:37:1d:80:d2:d9:e0:c6:c9:bb:8c:5d:50:04:9b] modulus: a4b1e28cc6018157a7ca4da937a5a53f459ef7ad8d73cf03832a78a8593d790dc66d89c8d0ad470c7257d55bf6f09a7e0a42d59424dfb58d136064f93ea02cf0b685f384106184cfa2c3bcfe8d54207eec3825498f4adcb08b129f5dc69ecd3cd2316447bf2f07470ebe355b3db9bb3ba0caa6bd64bd63015609199c255db47296eb7ca5d0efcda42f89bab31326fa05fc433be18e2e35c1199d3bc3cf87c849d62772de5f3f4ed30fe1ebeae2799ece4ed12625429cf75c287b7e3f7cda02b63c82f242717f74708d02a26ad36db650424a7de710d3725785042436e7ab5673ffbffc6101d506a1644162b4ebe85718fecf5f97686e7e3225ad71632ad5d34b public exponent: 10001 ] 2022-04-14 08:09:04.387  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-14 08:09:04.390 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-14 08:09:04.394 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-14 08:09:04.395 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-14 08:09:04.396  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-14 08:09:04.396  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-14 08:09:04.397  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-14 08:09:04.398 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-14 08:09:04.398 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-14 08:09:04.398 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-14 08:09:04.405 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-14 08:09:04.407 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-14 08:09:04.407 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-14 08:09:04.407 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 08:09:04.574  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-14 08:09:04.575  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-14 08:09:04.576 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-14 08:09:04.576 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 08:09:04.578  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-14 08:09:04.579  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-14 08:09:04.579 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:09:04.580 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:09:04.580 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:09:04.581 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:09:04.581 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:09:04.581 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:09:04.582 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:09:04.582 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:09:04.582 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:09:04.583 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-14 08:09:04.588 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 475972631464779826877858674307339937170790561302 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 14 05:20:19 UTC 2022 Final Date: Tue Apr 13 05:20:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [03:45:76:25:e3:28:ca:3d:66:2c:29:3d:27:b1:e6:8d:d2:da:6f:75] modulus: 99ee77723024687ce7fb901a5bfd25cb4704952dbf031f1d711ed0e8f6b4bb1bdf03792293f98fdf54462962a1b7e99b3d854dad637a500ee56ad77346b022a190500598a9dcd15b5c4ec22ef439c986974f796e574e83cef7c7a38117fbe5c0f710566f667c39fc97523365e15058a9d5bf2403c8ee7e8eb53f5a8384e95e851ea251b249eff89a1e3e97a93db10e51d293db4b01fa95783edda5c6c21f0369518a112a7cfc3c8107a296807f1a577f3fef631233d29800823182f75349f6fe79a8a83cb2165f8c066d7e6552af740b56013338b9ecc824de4d7e55980cf7ad7ba112af0c17ebb289b0ff1b4b1145ed337c6edc1f0eb575227e1ecc849949ed4647dd4a13c40b1eb43a4d32a8c5b78b63ab1b8ce1fcffbd9fd763d4ed22fd839bd8adfecbab11ac77b874f8d3a0c54aac4e62596dfe9476e70a814ec447b1848e3d08f4f6578d651a587c02fcf506b1d83f72aedcffb93f03f73f7eae2cc25f703f7216012cbf95c84f3d0629d3b79f8a18c0f5078acb7bae84d9f0d33d580f public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8e7156ceeb0f30b816d1c6a0c462d153c08fe579 92daf8370b0ea76ab8f9768a02fe214f77728ab7 9036a34fa9ab2709d7175747480e1b4b83a429da 25e7b36b3da72c2e85854c9bddc95158ea141087 707b7f362b916f1302e9a553e572ff2f5825557f d760d96e11da4dfa2d69eaac7d8083f922ce0cba f0888bdb36498f3d2b115e08a4903af1a286b7f1 3f646cb4fad7d3aedd1f625320470785740899d3 2b9692e254f61e5b0a5f3e31fffb35711dfec9d4 d79fd547a869fb4ea3ed6ac3c5ec3b90d2ead7d7 e8bff560910ae43c1670aab44855fb64ed8a4d1d 0ffbe36a5983d6efd2a2189083d34c94af83dec9 086efd384a4965c237553fc416bec954a5f81f45 6b7e027db805cdbde8924880413b17033c7af36f 5c2d7fe465c625b3ae76331febdce236e8caf647 944e9ca40a7d3c5928cc6eb190d35f06f3b44933 068235efb6062e05c9b73111b55d62d6cfb4be9b 65691bf0a6022a40ec9e77cf8c8e5bb1f1e2b845 291ce653bb445563f4b0c4eb43d5a2f63e63cfd4 a7cac1a1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d6:a6:12:38:3a:1a:d2:38:5f:2f:7e:8b:8e:56:b5:10:83:68:27:ed] modulus: d8ce35ae70a9fa044c70bc9a125a75f8e527aaa6058cc42fff253325b91e3afc6b0e9d770f83f09c7a5894f0f5bc22d4d5503fd1496b64868679d5a08e1866230178faadb4652e39dc80c94992955a25aece8d8292d32d9416446a9da774ac8557e115cfa25464cf1bfe612c20b00ab9623a97185ef263634f9e137df0194ab94717600bdcb855fa1a0bed34a74977ed99230744791e180c9787a8ec04e02f993b644fee4653d2edefea11eabe3858e794fa08cea8b6313a127b3b5c9240d76a42e85985b10d90bdef4ebf88dca58889864c9b0d61c6df6f1b29ac453c0ccaf3407b9f244300eb9348d4d052b27a91e22698aee17f9663d18b3bf9f7acc8d217 public exponent: 10001 ] 2022-04-14 08:15:47.941  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-14 08:15:47.944 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-14 08:15:47.947 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-14 08:15:47.948 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-14 08:15:47.949  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-14 08:15:47.950  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-14 08:15:47.950  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-14 08:15:47.951 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-14 08:15:47.951 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-14 08:15:47.952 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-14 08:15:47.958 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-14 08:15:47.961 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-14 08:15:47.961 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-14 08:15:47.962 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 08:15:48.189  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-14 08:15:48.190  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-14 08:15:48.190 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-14 08:15:48.191 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 08:15:48.193  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-14 08:15:48.194  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-14 08:15:48.194 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:15:48.194 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:15:48.195 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:15:48.196 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:15:48.197 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:15:48.197 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:15:48.198 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:15:48.199 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:15:48.199 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:15:48.200 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-14 08:15:48.206 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 475972631464779826877858674307339937170790561302 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 14 05:20:19 UTC 2022 Final Date: Tue Apr 13 05:20:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [03:45:76:25:e3:28:ca:3d:66:2c:29:3d:27:b1:e6:8d:d2:da:6f:75] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8e7156ceeb0f30b816d1c6a0c462d153c08fe579 92daf8370b0ea76ab8f9768a02fe214f77728ab7 9036a34fa9ab2709d7175747480e1b4b83a429da 25e7b36b3da72c2e85854c9bddc95158ea141087 707b7f362b916f1302e9a553e572ff2f5825557f d760d96e11da4dfa2d69eaac7d8083f922ce0cba f0888bdb36498f3d2b115e08a4903af1a286b7f1 3f646cb4fad7d3aedd1f625320470785740899d3 2b9692e254f61e5b0a5f3e31fffb35711dfec9d4 d79fd547a869fb4ea3ed6ac3c5ec3b90d2ead7d7 e8bff560910ae43c1670aab44855fb64ed8a4d1d 0ffbe36a5983d6efd2a2189083d34c94af83dec9 086efd384a4965c237553fc416bec954a5f81f45 6b7e027db805cdbde8924880413b17033c7af36f 5c2d7fe465c625b3ae76331febdce236e8caf647 944e9ca40a7d3c5928cc6eb190d35f06f3b44933 068235efb6062e05c9b73111b55d62d6cfb4be9b 65691bf0a6022a40ec9e77cf8c8e5bb1f1e2b845 291ce653bb445563f4b0c4eb43d5a2f63e63cfd4 a7cac1a1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e6:98:64:d4:f4:e5:2f:bd:dd:d2:c5:10:11:ce:eb:c7:31:1f:2b:e4] modulus: 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 public exponent: 10001 ] 2022-04-14 08:18:10.092  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-14 08:18:10.094 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-14 08:18:10.102 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-04-14 08:18:10.105 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-14 08:18:10.105  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-04-14 08:18:10.106  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-14 08:18:10.107  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-14 08:18:10.107 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-14 08:18:10.107 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-14 08:18:10.108 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-14 08:18:10.114 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-14 08:18:10.115 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-14 08:18:10.115 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-14 08:18:10.115 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 08:18:10.263  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-14 08:18:10.264  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-14 08:18:10.264 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-14 08:18:10.265 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 08:18:10.266  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-14 08:18:10.267  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-14 08:18:10.267 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:18:10.267 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:18:10.267 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:18:10.268 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:18:10.268 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:18:10.269 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:18:10.269 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:18:10.269 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:18:10.270 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:18:10.271 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-14 08:18:10.275 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 475972631464779826877858674307339937170790561302 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 14 05:20:19 UTC 2022 Final Date: Tue Apr 13 05:20:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [03:45:76:25:e3:28:ca:3d:66:2c:29:3d:27:b1:e6:8d:d2:da:6f:75] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8e7156ceeb0f30b816d1c6a0c462d153c08fe579 92daf8370b0ea76ab8f9768a02fe214f77728ab7 9036a34fa9ab2709d7175747480e1b4b83a429da 25e7b36b3da72c2e85854c9bddc95158ea141087 707b7f362b916f1302e9a553e572ff2f5825557f d760d96e11da4dfa2d69eaac7d8083f922ce0cba f0888bdb36498f3d2b115e08a4903af1a286b7f1 3f646cb4fad7d3aedd1f625320470785740899d3 2b9692e254f61e5b0a5f3e31fffb35711dfec9d4 d79fd547a869fb4ea3ed6ac3c5ec3b90d2ead7d7 e8bff560910ae43c1670aab44855fb64ed8a4d1d 0ffbe36a5983d6efd2a2189083d34c94af83dec9 086efd384a4965c237553fc416bec954a5f81f45 6b7e027db805cdbde8924880413b17033c7af36f 5c2d7fe465c625b3ae76331febdce236e8caf647 944e9ca40a7d3c5928cc6eb190d35f06f3b44933 068235efb6062e05c9b73111b55d62d6cfb4be9b 65691bf0a6022a40ec9e77cf8c8e5bb1f1e2b845 291ce653bb445563f4b0c4eb43d5a2f63e63cfd4 a7cac1a1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7e:c4:cb:34:0f:c6:c5:01:c0:41:b4:86:48:6a:a4:7c:aa:0d:64:7b] modulus: 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 public exponent: 10001 ] 2022-04-14 08:18:15.015  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-14 08:18:15.016 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-14 08:18:15.018 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-04-14 08:18:15.019 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-14 08:18:15.019  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-04-14 08:18:15.020  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-14 08:18:15.020  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-14 08:18:15.020 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-14 08:18:15.021 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-14 08:18:15.021 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-14 08:18:15.026 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-14 08:18:15.027 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-14 08:18:15.027 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-14 08:18:15.028 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 08:18:15.132  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-14 08:18:15.133  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-14 08:18:15.134 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-14 08:18:15.134 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 08:18:15.136  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-14 08:18:15.137  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-14 08:18:15.137 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:18:15.137 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:18:15.138 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:18:15.139 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:18:15.139 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:18:15.139 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:18:15.140 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:18:15.141 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:18:15.141 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:18:15.142 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-14 08:18:15.147 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 475972631464779826877858674307339937170790561302 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 14 05:20:19 UTC 2022 Final Date: Tue Apr 13 05:20:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [03:45:76:25:e3:28:ca:3d:66:2c:29:3d:27:b1:e6:8d:d2:da:6f:75] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8e7156ceeb0f30b816d1c6a0c462d153c08fe579 92daf8370b0ea76ab8f9768a02fe214f77728ab7 9036a34fa9ab2709d7175747480e1b4b83a429da 25e7b36b3da72c2e85854c9bddc95158ea141087 707b7f362b916f1302e9a553e572ff2f5825557f d760d96e11da4dfa2d69eaac7d8083f922ce0cba f0888bdb36498f3d2b115e08a4903af1a286b7f1 3f646cb4fad7d3aedd1f625320470785740899d3 2b9692e254f61e5b0a5f3e31fffb35711dfec9d4 d79fd547a869fb4ea3ed6ac3c5ec3b90d2ead7d7 e8bff560910ae43c1670aab44855fb64ed8a4d1d 0ffbe36a5983d6efd2a2189083d34c94af83dec9 086efd384a4965c237553fc416bec954a5f81f45 6b7e027db805cdbde8924880413b17033c7af36f 5c2d7fe465c625b3ae76331febdce236e8caf647 944e9ca40a7d3c5928cc6eb190d35f06f3b44933 068235efb6062e05c9b73111b55d62d6cfb4be9b 65691bf0a6022a40ec9e77cf8c8e5bb1f1e2b845 291ce653bb445563f4b0c4eb43d5a2f63e63cfd4 a7cac1a1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [85:cc:5d:67:62:77:5e:e7:b5:2a:1e:e7:6c:64:7b:e2:4e:ae:7a:a8] modulus: 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 public exponent: 10001 ] 2022-04-14 08:19:50.066  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-14 08:19:50.068 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-14 08:19:50.070 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-14 08:19:50.071 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-14 08:19:50.071  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-14 08:19:50.072  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-14 08:19:50.073  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-14 08:19:50.073 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-14 08:19:50.074 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-14 08:19:50.074 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-14 08:19:50.085 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-14 08:19:50.087 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-14 08:19:50.087 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-14 08:19:50.088 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 08:19:50.335  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-14 08:19:50.336  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-14 08:19:50.336 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-14 08:19:50.337 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 08:19:50.342  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-14 08:19:50.343  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-14 08:19:50.343 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:19:50.344 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:19:50.344 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:19:50.345 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:19:50.345 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:19:50.346 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:19:50.347 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:19:50.347 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:19:50.348 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:19:50.349 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-14 08:19:50.354 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 475972631464779826877858674307339937170790561302 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 14 05:20:19 UTC 2022 Final Date: Tue Apr 13 05:20:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [03:45:76:25:e3:28:ca:3d:66:2c:29:3d:27:b1:e6:8d:d2:da:6f:75] modulus: 99ee77723024687ce7fb901a5bfd25cb4704952dbf031f1d711ed0e8f6b4bb1bdf03792293f98fdf54462962a1b7e99b3d854dad637a500ee56ad77346b022a190500598a9dcd15b5c4ec22ef439c986974f796e574e83cef7c7a38117fbe5c0f710566f667c39fc97523365e15058a9d5bf2403c8ee7e8eb53f5a8384e95e851ea251b249eff89a1e3e97a93db10e51d293db4b01fa95783edda5c6c21f0369518a112a7cfc3c8107a296807f1a577f3fef631233d29800823182f75349f6fe79a8a83cb2165f8c066d7e6552af740b56013338b9ecc824de4d7e55980cf7ad7ba112af0c17ebb289b0ff1b4b1145ed337c6edc1f0eb575227e1ecc849949ed4647dd4a13c40b1eb43a4d32a8c5b78b63ab1b8ce1fcffbd9fd763d4ed22fd839bd8adfecbab11ac77b874f8d3a0c54aac4e62596dfe9476e70a814ec447b1848e3d08f4f6578d651a587c02fcf506b1d83f72aedcffb93f03f73f7eae2cc25f703f7216012cbf95c84f3d0629d3b79f8a18c0f5078acb7bae84d9f0d33d580f public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8e7156ceeb0f30b816d1c6a0c462d153c08fe579 92daf8370b0ea76ab8f9768a02fe214f77728ab7 9036a34fa9ab2709d7175747480e1b4b83a429da 25e7b36b3da72c2e85854c9bddc95158ea141087 707b7f362b916f1302e9a553e572ff2f5825557f d760d96e11da4dfa2d69eaac7d8083f922ce0cba f0888bdb36498f3d2b115e08a4903af1a286b7f1 3f646cb4fad7d3aedd1f625320470785740899d3 2b9692e254f61e5b0a5f3e31fffb35711dfec9d4 d79fd547a869fb4ea3ed6ac3c5ec3b90d2ead7d7 e8bff560910ae43c1670aab44855fb64ed8a4d1d 0ffbe36a5983d6efd2a2189083d34c94af83dec9 086efd384a4965c237553fc416bec954a5f81f45 6b7e027db805cdbde8924880413b17033c7af36f 5c2d7fe465c625b3ae76331febdce236e8caf647 944e9ca40a7d3c5928cc6eb190d35f06f3b44933 068235efb6062e05c9b73111b55d62d6cfb4be9b 65691bf0a6022a40ec9e77cf8c8e5bb1f1e2b845 291ce653bb445563f4b0c4eb43d5a2f63e63cfd4 a7cac1a1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7e:ff:b9:97:a8:90:fc:ff:91:a7:22:16:00:9f:64:6c:55:c6:fd:41] modulus: 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 public exponent: 10001 ] 2022-04-14 08:24:20.900  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-14 08:24:20.903 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-14 08:24:20.905 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-14 08:24:20.906 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-14 08:24:20.907  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-14 08:24:20.907  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-14 08:24:20.908  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-14 08:24:20.908 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-14 08:24:20.909 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-14 08:24:20.909 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-14 08:24:20.915 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-14 08:24:20.916 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-14 08:24:20.917 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-14 08:24:20.917 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 08:24:21.101  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-14 08:24:21.102  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-14 08:24:21.102 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-14 08:24:21.103 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 08:24:21.105  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-14 08:24:21.105  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-14 08:24:21.105 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:24:21.106 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:24:21.106 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:24:21.107 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:24:21.107 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:24:21.107 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:24:21.108 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:24:21.108 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:24:21.108 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:24:21.109 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-14 08:24:21.113 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 475972631464779826877858674307339937170790561302 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 14 05:20:19 UTC 2022 Final Date: Tue Apr 13 05:20:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [03:45:76:25:e3:28:ca:3d:66:2c:29:3d:27:b1:e6:8d:d2:da:6f:75] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8e7156ceeb0f30b816d1c6a0c462d153c08fe579 92daf8370b0ea76ab8f9768a02fe214f77728ab7 9036a34fa9ab2709d7175747480e1b4b83a429da 25e7b36b3da72c2e85854c9bddc95158ea141087 707b7f362b916f1302e9a553e572ff2f5825557f d760d96e11da4dfa2d69eaac7d8083f922ce0cba f0888bdb36498f3d2b115e08a4903af1a286b7f1 3f646cb4fad7d3aedd1f625320470785740899d3 2b9692e254f61e5b0a5f3e31fffb35711dfec9d4 d79fd547a869fb4ea3ed6ac3c5ec3b90d2ead7d7 e8bff560910ae43c1670aab44855fb64ed8a4d1d 0ffbe36a5983d6efd2a2189083d34c94af83dec9 086efd384a4965c237553fc416bec954a5f81f45 6b7e027db805cdbde8924880413b17033c7af36f 5c2d7fe465c625b3ae76331febdce236e8caf647 944e9ca40a7d3c5928cc6eb190d35f06f3b44933 068235efb6062e05c9b73111b55d62d6cfb4be9b 65691bf0a6022a40ec9e77cf8c8e5bb1f1e2b845 291ce653bb445563f4b0c4eb43d5a2f63e63cfd4 a7cac1a1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [24:74:ee:d2:c2:4d:44:27:bc:08:65:0c:99:b0:f8:1c:4b:61:3a:3c] modulus: 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 public exponent: 10001 ] 2022-04-14 08:28:42.331  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-14 08:28:42.332 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-14 08:28:42.334 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-14 08:28:42.335 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-14 08:28:42.335  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-14 08:28:42.336  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-14 08:28:42.336  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-14 08:28:42.336 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-14 08:28:42.337 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-14 08:28:42.337 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-14 08:28:42.363 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-14 08:28:42.364 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-14 08:28:42.364 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-14 08:28:42.364 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 08:28:42.609  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-14 08:28:42.610  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-14 08:28:42.611 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-14 08:28:42.611 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 08:28:42.613  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-14 08:28:42.613  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-14 08:28:42.613 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:28:42.614 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:28:42.614 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:28:42.615 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:28:42.615 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:28:42.615 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:28:42.616 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:28:42.616 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:28:42.617 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:28:42.618 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-14 08:28:42.624 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 475972631464779826877858674307339937170790561302 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 14 05:20:19 UTC 2022 Final Date: Tue Apr 13 05:20:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [03:45:76:25:e3:28:ca:3d:66:2c:29:3d:27:b1:e6:8d:d2:da:6f:75] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8e7156ceeb0f30b816d1c6a0c462d153c08fe579 92daf8370b0ea76ab8f9768a02fe214f77728ab7 9036a34fa9ab2709d7175747480e1b4b83a429da 25e7b36b3da72c2e85854c9bddc95158ea141087 707b7f362b916f1302e9a553e572ff2f5825557f d760d96e11da4dfa2d69eaac7d8083f922ce0cba f0888bdb36498f3d2b115e08a4903af1a286b7f1 3f646cb4fad7d3aedd1f625320470785740899d3 2b9692e254f61e5b0a5f3e31fffb35711dfec9d4 d79fd547a869fb4ea3ed6ac3c5ec3b90d2ead7d7 e8bff560910ae43c1670aab44855fb64ed8a4d1d 0ffbe36a5983d6efd2a2189083d34c94af83dec9 086efd384a4965c237553fc416bec954a5f81f45 6b7e027db805cdbde8924880413b17033c7af36f 5c2d7fe465c625b3ae76331febdce236e8caf647 944e9ca40a7d3c5928cc6eb190d35f06f3b44933 068235efb6062e05c9b73111b55d62d6cfb4be9b 65691bf0a6022a40ec9e77cf8c8e5bb1f1e2b845 291ce653bb445563f4b0c4eb43d5a2f63e63cfd4 a7cac1a1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [11:24:c6:cd:d6:b2:d9:21:de:e4:80:99:61:49:5f:c6:5e:f3:2d:40] modulus: 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 public exponent: 10001 ] 2022-04-14 08:33:06.810  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-14 08:33:06.813 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-14 08:33:06.816 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-14 08:33:06.817 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-14 08:33:06.817  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-14 08:33:06.822  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-14 08:33:06.823  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-14 08:33:06.823 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-14 08:33:06.824 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-14 08:33:06.825 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-14 08:33:06.832 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-14 08:33:06.833 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-14 08:33:06.833 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-14 08:33:06.834 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 08:33:07.049  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-14 08:33:07.050  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-14 08:33:07.050 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-14 08:33:07.050 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 08:33:07.052  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-14 08:33:07.052  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-14 08:33:07.053 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:33:07.053 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:33:07.053 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:33:07.054 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:33:07.054 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:33:07.055 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:33:07.055 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:33:07.056 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:33:07.056 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:33:07.057 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-14 08:33:07.061 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 475972631464779826877858674307339937170790561302 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 14 05:20:19 UTC 2022 Final Date: Tue Apr 13 05:20:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [03:45:76:25:e3:28:ca:3d:66:2c:29:3d:27:b1:e6:8d:d2:da:6f:75] modulus: 99ee77723024687ce7fb901a5bfd25cb4704952dbf031f1d711ed0e8f6b4bb1bdf03792293f98fdf54462962a1b7e99b3d854dad637a500ee56ad77346b022a190500598a9dcd15b5c4ec22ef439c986974f796e574e83cef7c7a38117fbe5c0f710566f667c39fc97523365e15058a9d5bf2403c8ee7e8eb53f5a8384e95e851ea251b249eff89a1e3e97a93db10e51d293db4b01fa95783edda5c6c21f0369518a112a7cfc3c8107a296807f1a577f3fef631233d29800823182f75349f6fe79a8a83cb2165f8c066d7e6552af740b56013338b9ecc824de4d7e55980cf7ad7ba112af0c17ebb289b0ff1b4b1145ed337c6edc1f0eb575227e1ecc849949ed4647dd4a13c40b1eb43a4d32a8c5b78b63ab1b8ce1fcffbd9fd763d4ed22fd839bd8adfecbab11ac77b874f8d3a0c54aac4e62596dfe9476e70a814ec447b1848e3d08f4f6578d651a587c02fcf506b1d83f72aedcffb93f03f73f7eae2cc25f703f7216012cbf95c84f3d0629d3b79f8a18c0f5078acb7bae84d9f0d33d580f public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8e7156ceeb0f30b816d1c6a0c462d153c08fe579 92daf8370b0ea76ab8f9768a02fe214f77728ab7 9036a34fa9ab2709d7175747480e1b4b83a429da 25e7b36b3da72c2e85854c9bddc95158ea141087 707b7f362b916f1302e9a553e572ff2f5825557f d760d96e11da4dfa2d69eaac7d8083f922ce0cba f0888bdb36498f3d2b115e08a4903af1a286b7f1 3f646cb4fad7d3aedd1f625320470785740899d3 2b9692e254f61e5b0a5f3e31fffb35711dfec9d4 d79fd547a869fb4ea3ed6ac3c5ec3b90d2ead7d7 e8bff560910ae43c1670aab44855fb64ed8a4d1d 0ffbe36a5983d6efd2a2189083d34c94af83dec9 086efd384a4965c237553fc416bec954a5f81f45 6b7e027db805cdbde8924880413b17033c7af36f 5c2d7fe465c625b3ae76331febdce236e8caf647 944e9ca40a7d3c5928cc6eb190d35f06f3b44933 068235efb6062e05c9b73111b55d62d6cfb4be9b 65691bf0a6022a40ec9e77cf8c8e5bb1f1e2b845 291ce653bb445563f4b0c4eb43d5a2f63e63cfd4 a7cac1a1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e9:98:60:af:aa:94:87:3c:1d:bb:fa:18:eb:e2:d3:58:13:16:ff:69] modulus: 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 public exponent: 10001 ] 2022-04-14 08:39:26.679  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-14 08:39:26.683 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-14 08:39:26.687 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-14 08:39:26.688 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-14 08:39:26.688  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-14 08:39:26.689  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-14 08:39:26.689  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-14 08:39:26.689 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-14 08:39:26.690 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-14 08:39:26.690 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-14 08:39:26.696 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-14 08:39:26.697 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-14 08:39:26.697 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-14 08:39:26.697 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 08:39:26.876  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-14 08:39:26.877  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-14 08:39:26.877 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-14 08:39:26.878 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 08:39:26.880  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-14 08:39:26.880  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-14 08:39:26.881 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:39:26.881 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:39:26.881 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:39:26.882 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:39:26.883 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:39:26.883 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:39:26.885 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:39:26.885 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:39:26.885 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:39:26.900 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-14 08:39:26.907 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 475972631464779826877858674307339937170790561302 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 14 05:20:19 UTC 2022 Final Date: Tue Apr 13 05:20:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [03:45:76:25:e3:28:ca:3d:66:2c:29:3d:27:b1:e6:8d:d2:da:6f:75] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8e7156ceeb0f30b816d1c6a0c462d153c08fe579 92daf8370b0ea76ab8f9768a02fe214f77728ab7 9036a34fa9ab2709d7175747480e1b4b83a429da 25e7b36b3da72c2e85854c9bddc95158ea141087 707b7f362b916f1302e9a553e572ff2f5825557f d760d96e11da4dfa2d69eaac7d8083f922ce0cba f0888bdb36498f3d2b115e08a4903af1a286b7f1 3f646cb4fad7d3aedd1f625320470785740899d3 2b9692e254f61e5b0a5f3e31fffb35711dfec9d4 d79fd547a869fb4ea3ed6ac3c5ec3b90d2ead7d7 e8bff560910ae43c1670aab44855fb64ed8a4d1d 0ffbe36a5983d6efd2a2189083d34c94af83dec9 086efd384a4965c237553fc416bec954a5f81f45 6b7e027db805cdbde8924880413b17033c7af36f 5c2d7fe465c625b3ae76331febdce236e8caf647 944e9ca40a7d3c5928cc6eb190d35f06f3b44933 068235efb6062e05c9b73111b55d62d6cfb4be9b 65691bf0a6022a40ec9e77cf8c8e5bb1f1e2b845 291ce653bb445563f4b0c4eb43d5a2f63e63cfd4 a7cac1a1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [de:09:16:ab:33:f0:47:32:34:d2:ce:ae:74:fe:57:7c:a9:19:12:57] modulus: e6fc43be6b24c243ea6b12d0ec9df9a88a3f12432a98645658ccf27af99f704e85adef772f0312acbd205a48a3eb309a6d23612b9ef5854cb84184e59c440a2c35ad37187caa85393c429ea18154dae74623f5a467ce616530a8bc89696a02c17baccc0cbe7114afbac05fc654d745c3c0f258ca401116eb0737981debc4ab6398a720992a80f9578a2a034402baae7d47e79f6d7163e0a557fbbc5e52ffa22f7366b81240e95e5e4c3db194980da322e0f71012dabdf665a9fd1f01ca0759eca1c8c8d1e75adda3d8cb5587b70dc7b6021f28676c21c0a92e5d764109c2088576c5734eceda039fe0bca970c4cb8b105f5e5e46b8d33ac06215263411c8d2b9 public exponent: 10001 ] 2022-04-14 08:43:52.152  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-14 08:43:52.154 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-14 08:43:52.155 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-14 08:43:52.156 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-14 08:43:52.156  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-14 08:43:52.157  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-14 08:43:52.157  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-14 08:43:52.158 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-14 08:43:52.158 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-14 08:43:52.159 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-14 08:43:52.164 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-14 08:43:52.165 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-14 08:43:52.165 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-14 08:43:52.166 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 08:43:52.321  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-14 08:43:52.321  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-14 08:43:52.322 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-14 08:43:52.322 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 08:43:52.323  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-14 08:43:52.325  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-14 08:43:52.326 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:43:52.326 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:43:52.326 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:43:52.328 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:43:52.328 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:43:52.328 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:43:52.329 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:43:52.329 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:43:52.330 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:43:52.331 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-14 08:43:52.334 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 475972631464779826877858674307339937170790561302 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 14 05:20:19 UTC 2022 Final Date: Tue Apr 13 05:20:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [03:45:76:25:e3:28:ca:3d:66:2c:29:3d:27:b1:e6:8d:d2:da:6f:75] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8e7156ceeb0f30b816d1c6a0c462d153c08fe579 92daf8370b0ea76ab8f9768a02fe214f77728ab7 9036a34fa9ab2709d7175747480e1b4b83a429da 25e7b36b3da72c2e85854c9bddc95158ea141087 707b7f362b916f1302e9a553e572ff2f5825557f d760d96e11da4dfa2d69eaac7d8083f922ce0cba f0888bdb36498f3d2b115e08a4903af1a286b7f1 3f646cb4fad7d3aedd1f625320470785740899d3 2b9692e254f61e5b0a5f3e31fffb35711dfec9d4 d79fd547a869fb4ea3ed6ac3c5ec3b90d2ead7d7 e8bff560910ae43c1670aab44855fb64ed8a4d1d 0ffbe36a5983d6efd2a2189083d34c94af83dec9 086efd384a4965c237553fc416bec954a5f81f45 6b7e027db805cdbde8924880413b17033c7af36f 5c2d7fe465c625b3ae76331febdce236e8caf647 944e9ca40a7d3c5928cc6eb190d35f06f3b44933 068235efb6062e05c9b73111b55d62d6cfb4be9b 65691bf0a6022a40ec9e77cf8c8e5bb1f1e2b845 291ce653bb445563f4b0c4eb43d5a2f63e63cfd4 a7cac1a1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [74:99:9e:9e:fe:b3:2f:c5:df:31:63:94:15:ea:f9:86:3e:b2:f7:d8] modulus: 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 public exponent: 10001 ] 2022-04-14 08:53:26.430  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-14 08:53:26.434 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-14 08:53:26.437 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-14 08:53:26.439 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-14 08:53:26.440  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-14 08:53:26.441  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-14 08:53:26.442  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-14 08:53:26.442 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-14 08:53:26.442 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-14 08:53:26.443 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-14 08:53:26.450 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-14 08:53:26.452 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-14 08:53:26.452 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-14 08:53:26.453 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 08:53:26.605  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-14 08:53:26.606  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-14 08:53:26.606 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-14 08:53:26.606 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 08:53:26.608  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-14 08:53:26.608  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-14 08:53:26.608 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:53:26.609 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:53:26.609 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:53:26.609 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:53:26.610 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:53:26.610 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:53:26.610 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-14 08:53:26.611 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-14 08:53:26.611 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-14 08:53:26.612 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-14 08:53:26.615 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 475972631464779826877858674307339937170790561302 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 14 05:20:19 UTC 2022 Final Date: Tue Apr 13 05:20:18 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [03:45:76:25:e3:28:ca:3d:66:2c:29:3d:27:b1:e6:8d:d2:da:6f:75] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8e7156ceeb0f30b816d1c6a0c462d153c08fe579 92daf8370b0ea76ab8f9768a02fe214f77728ab7 9036a34fa9ab2709d7175747480e1b4b83a429da 25e7b36b3da72c2e85854c9bddc95158ea141087 707b7f362b916f1302e9a553e572ff2f5825557f d760d96e11da4dfa2d69eaac7d8083f922ce0cba f0888bdb36498f3d2b115e08a4903af1a286b7f1 3f646cb4fad7d3aedd1f625320470785740899d3 2b9692e254f61e5b0a5f3e31fffb35711dfec9d4 d79fd547a869fb4ea3ed6ac3c5ec3b90d2ead7d7 e8bff560910ae43c1670aab44855fb64ed8a4d1d 0ffbe36a5983d6efd2a2189083d34c94af83dec9 086efd384a4965c237553fc416bec954a5f81f45 6b7e027db805cdbde8924880413b17033c7af36f 5c2d7fe465c625b3ae76331febdce236e8caf647 944e9ca40a7d3c5928cc6eb190d35f06f3b44933 068235efb6062e05c9b73111b55d62d6cfb4be9b 65691bf0a6022a40ec9e77cf8c8e5bb1f1e2b845 291ce653bb445563f4b0c4eb43d5a2f63e63cfd4 a7cac1a1 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [49:ae:f6:57:65:b3:df:50:dc:97:6c:3d:b7:f7:45:34:78:11:7e:73] modulus: d173a2c4240c2b2545519d47da3b28cb4787c2b64c9cee7fee51da5e86f4503d40c0ed5c0ef8e8c566a7edf8658d2c02838ead55fb48aff3c9c54ec0bd33b63a7feb8a29b146cb97bac1664b529d3d131f1c2ff5a144dfa3d992c8c06869016cde0ef0a97a9cd4146e01b8cc9e1dfe726250b43a1bd4b44c503b34424606763b56999627cd9eb353747a9f2fe5ab3af529f7a96deeb5afdf895e4962a41732dec3b5ae80980862d276ea59d441298b8939764157f2e42f98d9047c631c3a95119656cafb956921c522b7dab599b2f9ec1f5305904638c34d38b7ba8b0698fb5e1c921f046c8d286fb448bedd4894516777acce50bb85510b546d25a124e8bf97 public exponent: 10001 ] 2022-04-14 08:58:06.131  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-14 08:58:06.132 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-14 08:58:06.134 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-14 08:58:06.134 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-14 08:58:06.140  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-14 08:58:06.141  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-14 08:58:06.142  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-14 08:58:06.142 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-14 08:58:06.143 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-14 08:58:06.143 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-14 08:58:06.155 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-14 08:58:06.156 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-14 08:58:06.156 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-14 08:58:06.156 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-14 08:58:06.366 ERROR 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Error encountered while processing response from CA server java.lang.IllegalArgumentException: failed to construct sequence from byte[]: unknown tag 28 encountered at org.bouncycastle.asn1.ASN1Sequence.getInstance(Unknown Source) at org.bouncycastle.asn1.cmp.PKIMessage.getInstance(Unknown Source) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.retrieveCertificates(CmpClientImpl.java:171) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeCmpRequest(CmpClientImpl.java:144) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeInitializationRequest(CmpClientImpl.java:89) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeInitializationRequest(CmpClientImpl.java:95) at org.onap.oom.certservice.certification.CertificationProvider.executeInitializationRequest(CertificationProvider.java:58) at org.onap.oom.certservice.certification.CertificationResponseModelFactory.provideCertificationModelFromInitialRequest(CertificationResponseModelFactory.java:77) at org.onap.oom.certservice.api.CertificationController.signCertificate(CertificationController.java:94) at jdk.internal.reflect.GeneratedMethodAccessor69.invoke(Unknown Source) at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(Unknown Source) at java.base/java.lang.reflect.Method.invoke(Unknown Source) at org.springframework.web.method.support.InvocableHandlerMethod.doInvoke(InvocableHandlerMethod.java:205) at org.springframework.web.method.support.InvocableHandlerMethod.invokeForRequest(InvocableHandlerMethod.java:150) at org.springframework.web.servlet.mvc.method.annotation.ServletInvocableHandlerMethod.invokeAndHandle(ServletInvocableHandlerMethod.java:117) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.invokeHandlerMethod(RequestMappingHandlerAdapter.java:895) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.handleInternal(RequestMappingHandlerAdapter.java:808) at org.springframework.web.servlet.mvc.method.AbstractHandlerMethodAdapter.handle(AbstractHandlerMethodAdapter.java:87) at org.springframework.web.servlet.DispatcherServlet.doDispatch(DispatcherServlet.java:1067) at org.springframework.web.servlet.DispatcherServlet.doService(DispatcherServlet.java:963) at org.springframework.web.servlet.FrameworkServlet.processRequest(FrameworkServlet.java:1006) at org.springframework.web.servlet.FrameworkServlet.doGet(FrameworkServlet.java:898) at javax.servlet.http.HttpServlet.service(HttpServlet.java:655) at org.springframework.web.servlet.FrameworkServlet.service(FrameworkServlet.java:883) at javax.servlet.http.HttpServlet.service(HttpServlet.java:764) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:227) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:53) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:100) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.FormContentFilter.doFilterInternal(FormContentFilter.java:93) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.boot.actuate.metrics.web.servlet.WebMvcMetricsFilter.doFilterInternal(WebMvcMetricsFilter.java:96) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:201) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:197) at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:97) at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:540) at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:135) at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:92) at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:78) at org.apache.catalina.valves.RemoteIpValve.invoke(RemoteIpValve.java:769) at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:357) at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:382) at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:65) at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:895) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1732) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at org.apache.tomcat.util.threads.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1191) at org.apache.tomcat.util.threads.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:659) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Unknown Source) 2022-04-14 08:58:06.378 ERROR 1 [io-8443-exec-10] o.o.o.c.a.a.CertificationExceptionAdvice : Exception occurred calling cmp client: org.onap.oom.certservice.cmpv2client.exceptions.CmpClientException: Error encountered while processing response from CA server at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.retrieveCertificates(CmpClientImpl.java:177) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeCmpRequest(CmpClientImpl.java:144) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeInitializationRequest(CmpClientImpl.java:89) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeInitializationRequest(CmpClientImpl.java:95) at org.onap.oom.certservice.certification.CertificationProvider.executeInitializationRequest(CertificationProvider.java:58) at org.onap.oom.certservice.certification.CertificationResponseModelFactory.provideCertificationModelFromInitialRequest(CertificationResponseModelFactory.java:77) at org.onap.oom.certservice.api.CertificationController.signCertificate(CertificationController.java:94) at jdk.internal.reflect.GeneratedMethodAccessor69.invoke(Unknown Source) at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(Unknown Source) at java.base/java.lang.reflect.Method.invoke(Unknown Source) at org.springframework.web.method.support.InvocableHandlerMethod.doInvoke(InvocableHandlerMethod.java:205) at org.springframework.web.method.support.InvocableHandlerMethod.invokeForRequest(InvocableHandlerMethod.java:150) at org.springframework.web.servlet.mvc.method.annotation.ServletInvocableHandlerMethod.invokeAndHandle(ServletInvocableHandlerMethod.java:117) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.invokeHandlerMethod(RequestMappingHandlerAdapter.java:895) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.handleInternal(RequestMappingHandlerAdapter.java:808) at org.springframework.web.servlet.mvc.method.AbstractHandlerMethodAdapter.handle(AbstractHandlerMethodAdapter.java:87) at org.springframework.web.servlet.DispatcherServlet.doDispatch(DispatcherServlet.java:1067) at org.springframework.web.servlet.DispatcherServlet.doService(DispatcherServlet.java:963) at org.springframework.web.servlet.FrameworkServlet.processRequest(FrameworkServlet.java:1006) at org.springframework.web.servlet.FrameworkServlet.doGet(FrameworkServlet.java:898) at javax.servlet.http.HttpServlet.service(HttpServlet.java:655) at org.springframework.web.servlet.FrameworkServlet.service(FrameworkServlet.java:883) at javax.servlet.http.HttpServlet.service(HttpServlet.java:764) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:227) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:53) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:100) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.FormContentFilter.doFilterInternal(FormContentFilter.java:93) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.boot.actuate.metrics.web.servlet.WebMvcMetricsFilter.doFilterInternal(WebMvcMetricsFilter.java:96) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:201) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:197) at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:97) at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:540) at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:135) at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:92) at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:78) at org.apache.catalina.valves.RemoteIpValve.invoke(RemoteIpValve.java:769) at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:357) at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:382) at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:65) at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:895) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1732) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at org.apache.tomcat.util.threads.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1191) at org.apache.tomcat.util.threads.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:659) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Unknown Source) Caused by: java.lang.IllegalArgumentException: failed to construct sequence from byte[]: unknown tag 28 encountered at org.bouncycastle.asn1.ASN1Sequence.getInstance(Unknown Source) at org.bouncycastle.asn1.cmp.PKIMessage.getInstance(Unknown Source) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.retrieveCertificates(CmpClientImpl.java:171) ... 60 more