2022-04-22 05:14:20,214 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-04-22 05:14:21,946 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-04-22 05:14:23.237  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Apr 22, 2022 5:14:26 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Apr 22, 2022 5:14:26 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Apr 22, 2022 5:14:26 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Apr 22, 2022 5:14:27 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-04-22 05:14:28.042 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-04-22 05:14:28.655  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-04-22 05:14:28.987  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-04-22 05:14:30.488 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-04-22 05:14:30.493 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-04-22 05:14:30.496 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-04-22 05:14:30.505 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-04-22 05:14:30.576 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-04-22 05:14:30.583 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-04-22 05:14:30.795 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-04-22 05:14:31.989 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Apr 22, 2022 5:14:33 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-04-22 05:14:33.807  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 15.354 seconds (JVM running for 18.671) Apr 22, 2022 5:14:46 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-04-22 05:15:16.398  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-22 05:15:16.409 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-22 05:15:16.473 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-04-22 05:15:16.480 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-22 05:15:16.513  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-04-22 05:15:16.517  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-22 05:15:16.520  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-22 05:15:16.523 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-22 05:15:16.523 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-22 05:15:16.532 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-22 05:15:16.545 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-22 05:15:16.551 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-22 05:15:16.634 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-22 05:15:16.641 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-22 05:15:16.642 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-22 05:15:16.647 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-22 05:15:18.085  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-22 05:15:18.090  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-22 05:15:18.092 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-22 05:15:18.095 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-22 05:15:18.120  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-22 05:15:18.122  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-22 05:15:18.124 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-22 05:15:18.125 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-22 05:15:18.126 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-22 05:15:18.154 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-22 05:15:18.155 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-22 05:15:18.156 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-22 05:15:18.177 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-22 05:15:18.179 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-22 05:15:18.180 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-22 05:15:18.197 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-22 05:15:18.269 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 398904590996439918760230912045821836189323261613 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 22 05:10:46 UTC 2022 Final Date: Wed Apr 21 05:10:45 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2f:4d:6e:cc:cb:df:74:91:15:52:17:dd:32:3a:6c:70:83:51:86:88] modulus: a61ac1de0b3d0d07475937f5a401daf96623af897c1855b073804c1474ed0524767cdb54c82d740f6b0d0ea2e9150d3259b6d82d957defbb1defb2313bdfc53b5a7d33891c30c51f041cbdab928ea1b716e450f2b5b99ea33889cd65f3c0ebb2b4f15bbcc973e0072c49eb8b118764c01fdf82d999847b51f86965155ac49988cf53a6fa190430e06a8257b8f9d080d3e5559266d7589f83cecb564deab65eb328bb6f47673b2ec9d220367fc584ac5aa56d9633f1da235391b0f288c05ae2199208dab445a0ec50b343838da52db4ec23fdf54f42895767df487d40c5eba7b404207d330d07249445ac134cb40ea96047e0dffae32e5bd883824f421b36265a78f172c9d9d50ee659005408aa2c1ff016614c9cc37abedf18779fc0a733ef90e426f9213e64080650e91dbb06a774a98479f4a4cfb77f77ab89ace0675796e798c2409b8d1ce2495ccd2aecda0c3209e249965ff154b3fa530742ad48e058bd2184cf8c7e7de7d109e5b247676d50f0900a0f11c57a8e22d6a5a9c7f22f8b3d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1ad124b580504b357a74871bfccf92565df726e5 e9c1bc0e6cc6011b3942a9a232217173bb0422fb 59378e0ff331cf3300204d2ad8bc0478134d127c cf233270a39303808d20091286a9645449d110cb dfb084983e67564e40943724c7ce3e5296608cac ea4c14ed74f7af01d917e5182169545f13a240d0 41dab038c23db1157ba0f6b3d4546b0fbf0c6443 7c0a35108744d91a57c91a27d3fd79adc7cc0f77 78f19b45e2c3bcf83e069da7be640ca9a349dfa9 6e536dde4313ff8f33177ab455d52f2171f2e43f d4015f65e3e78bed5144ac54bddd1ebdce926a8f efa1168769cb3e9667092bdf35d46be0b73606bc 299d2bec7ec797334abb0d5cc647de9ead52740b 401fb4ac6422d84d0eb192264fb8f1c4e5ad8225 92ab3d53a573afbac3b80bba14ffc427274df3fd 8c0319cff93bf57a191acdeff0a8eb34b71a13f3 fea215b4d6095b447710962a26474ce969ab3403 abdb6c0351a4cfd55a9ee94274ad029a3ffaf067 96587161d811457ee3354da153c90ad203c821a4 f3240d07 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [db:03:42:26:af:55:f0:28:6f:06:d0:5a:52:b6:f3:2d:9e:49:32:77] modulus: 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 public exponent: 10001 ] 2022-04-22 07:39:38.284  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-22 07:39:38.289 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-22 07:39:38.297 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-04-22 07:39:38.299 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-22 07:39:38.300  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-04-22 07:39:38.301  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-22 07:39:38.302  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-22 07:39:38.303 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-22 07:39:38.304 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-22 07:39:38.304 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-22 07:39:38.326 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-22 07:39:38.331 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-22 07:39:38.333 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-22 07:39:38.334 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-22 07:39:39.023  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-22 07:39:39.024  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-22 07:39:39.025 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-22 07:39:39.025 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-22 07:39:39.032  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-22 07:39:39.034  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-22 07:39:39.036 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-22 07:39:39.039 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-22 07:39:39.040 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-22 07:39:39.044 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-22 07:39:39.045 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-22 07:39:39.046 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-22 07:39:39.049 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-22 07:39:39.051 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-22 07:39:39.054 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-22 07:39:39.058 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-22 07:39:39.077 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 398904590996439918760230912045821836189323261613 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 22 05:10:46 UTC 2022 Final Date: Wed Apr 21 05:10:45 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2f:4d:6e:cc:cb:df:74:91:15:52:17:dd:32:3a:6c:70:83:51:86:88] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1ad124b580504b357a74871bfccf92565df726e5 e9c1bc0e6cc6011b3942a9a232217173bb0422fb 59378e0ff331cf3300204d2ad8bc0478134d127c cf233270a39303808d20091286a9645449d110cb dfb084983e67564e40943724c7ce3e5296608cac ea4c14ed74f7af01d917e5182169545f13a240d0 41dab038c23db1157ba0f6b3d4546b0fbf0c6443 7c0a35108744d91a57c91a27d3fd79adc7cc0f77 78f19b45e2c3bcf83e069da7be640ca9a349dfa9 6e536dde4313ff8f33177ab455d52f2171f2e43f d4015f65e3e78bed5144ac54bddd1ebdce926a8f efa1168769cb3e9667092bdf35d46be0b73606bc 299d2bec7ec797334abb0d5cc647de9ead52740b 401fb4ac6422d84d0eb192264fb8f1c4e5ad8225 92ab3d53a573afbac3b80bba14ffc427274df3fd 8c0319cff93bf57a191acdeff0a8eb34b71a13f3 fea215b4d6095b447710962a26474ce969ab3403 abdb6c0351a4cfd55a9ee94274ad029a3ffaf067 96587161d811457ee3354da153c90ad203c821a4 f3240d07 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [58:2d:cc:e4:62:2f:ff:92:93:35:db:a8:bc:51:b9:a6:54:00:98:c2] modulus: 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 public exponent: 10001 ] 2022-04-22 07:39:43.747  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-22 07:39:43.749 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-22 07:39:43.752 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-22 07:39:43.754 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-22 07:39:43.755  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-22 07:39:43.764  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-22 07:39:43.768  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-22 07:39:43.769 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-22 07:39:43.770 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-22 07:39:43.772 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-22 07:39:43.808 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-22 07:39:43.809 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-22 07:39:43.810 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-22 07:39:43.810 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-22 07:39:44.068  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-22 07:39:44.074  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-22 07:39:44.075 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-22 07:39:44.076 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-22 07:39:44.083  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-22 07:39:44.085  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-22 07:39:44.086 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-22 07:39:44.088 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-22 07:39:44.088 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-22 07:39:44.090 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-22 07:39:44.091 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-22 07:39:44.091 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-22 07:39:44.092 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-22 07:39:44.093 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-22 07:39:44.094 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-22 07:39:44.097 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-22 07:39:44.105 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 398904590996439918760230912045821836189323261613 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 22 05:10:46 UTC 2022 Final Date: Wed Apr 21 05:10:45 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2f:4d:6e:cc:cb:df:74:91:15:52:17:dd:32:3a:6c:70:83:51:86:88] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1ad124b580504b357a74871bfccf92565df726e5 e9c1bc0e6cc6011b3942a9a232217173bb0422fb 59378e0ff331cf3300204d2ad8bc0478134d127c cf233270a39303808d20091286a9645449d110cb dfb084983e67564e40943724c7ce3e5296608cac ea4c14ed74f7af01d917e5182169545f13a240d0 41dab038c23db1157ba0f6b3d4546b0fbf0c6443 7c0a35108744d91a57c91a27d3fd79adc7cc0f77 78f19b45e2c3bcf83e069da7be640ca9a349dfa9 6e536dde4313ff8f33177ab455d52f2171f2e43f d4015f65e3e78bed5144ac54bddd1ebdce926a8f efa1168769cb3e9667092bdf35d46be0b73606bc 299d2bec7ec797334abb0d5cc647de9ead52740b 401fb4ac6422d84d0eb192264fb8f1c4e5ad8225 92ab3d53a573afbac3b80bba14ffc427274df3fd 8c0319cff93bf57a191acdeff0a8eb34b71a13f3 fea215b4d6095b447710962a26474ce969ab3403 abdb6c0351a4cfd55a9ee94274ad029a3ffaf067 96587161d811457ee3354da153c90ad203c821a4 f3240d07 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0b:47:82:8d:c1:84:ae:fb:e5:da:cd:73:f3:ed:5e:0a:2e:d1:ab:2d] modulus: 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 public exponent: 10001 ] 2022-04-22 07:41:32.666  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-22 07:41:32.669 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-22 07:41:32.675 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-04-22 07:41:32.677 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-22 07:41:32.681  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-04-22 07:41:32.686  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-22 07:41:32.689  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-22 07:41:32.690 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-22 07:41:32.691 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-22 07:41:32.692 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-22 07:41:32.702 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-22 07:41:32.703 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-22 07:41:32.704 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-22 07:41:32.705 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-22 07:41:33.212  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-22 07:41:33.213  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-22 07:41:33.214 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-22 07:41:33.216 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-22 07:41:33.234  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-22 07:41:33.236  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-22 07:41:33.237 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-22 07:41:33.238 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-22 07:41:33.242 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-22 07:41:33.244 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-22 07:41:33.244 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-22 07:41:33.245 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-22 07:41:33.253 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-22 07:41:33.253 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-22 07:41:33.254 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-22 07:41:33.255 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-22 07:41:33.287 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 398904590996439918760230912045821836189323261613 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 22 05:10:46 UTC 2022 Final Date: Wed Apr 21 05:10:45 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2f:4d:6e:cc:cb:df:74:91:15:52:17:dd:32:3a:6c:70:83:51:86:88] modulus: a61ac1de0b3d0d07475937f5a401daf96623af897c1855b073804c1474ed0524767cdb54c82d740f6b0d0ea2e9150d3259b6d82d957defbb1defb2313bdfc53b5a7d33891c30c51f041cbdab928ea1b716e450f2b5b99ea33889cd65f3c0ebb2b4f15bbcc973e0072c49eb8b118764c01fdf82d999847b51f86965155ac49988cf53a6fa190430e06a8257b8f9d080d3e5559266d7589f83cecb564deab65eb328bb6f47673b2ec9d220367fc584ac5aa56d9633f1da235391b0f288c05ae2199208dab445a0ec50b343838da52db4ec23fdf54f42895767df487d40c5eba7b404207d330d07249445ac134cb40ea96047e0dffae32e5bd883824f421b36265a78f172c9d9d50ee659005408aa2c1ff016614c9cc37abedf18779fc0a733ef90e426f9213e64080650e91dbb06a774a98479f4a4cfb77f77ab89ace0675796e798c2409b8d1ce2495ccd2aecda0c3209e249965ff154b3fa530742ad48e058bd2184cf8c7e7de7d109e5b247676d50f0900a0f11c57a8e22d6a5a9c7f22f8b3d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1ad124b580504b357a74871bfccf92565df726e5 e9c1bc0e6cc6011b3942a9a232217173bb0422fb 59378e0ff331cf3300204d2ad8bc0478134d127c cf233270a39303808d20091286a9645449d110cb dfb084983e67564e40943724c7ce3e5296608cac ea4c14ed74f7af01d917e5182169545f13a240d0 41dab038c23db1157ba0f6b3d4546b0fbf0c6443 7c0a35108744d91a57c91a27d3fd79adc7cc0f77 78f19b45e2c3bcf83e069da7be640ca9a349dfa9 6e536dde4313ff8f33177ab455d52f2171f2e43f d4015f65e3e78bed5144ac54bddd1ebdce926a8f efa1168769cb3e9667092bdf35d46be0b73606bc 299d2bec7ec797334abb0d5cc647de9ead52740b 401fb4ac6422d84d0eb192264fb8f1c4e5ad8225 92ab3d53a573afbac3b80bba14ffc427274df3fd 8c0319cff93bf57a191acdeff0a8eb34b71a13f3 fea215b4d6095b447710962a26474ce969ab3403 abdb6c0351a4cfd55a9ee94274ad029a3ffaf067 96587161d811457ee3354da153c90ad203c821a4 f3240d07 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [be:1a:dd:63:56:71:c1:39:71:e4:b3:8e:f9:ba:ba:d0:88:4c:bc:17] modulus: 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 public exponent: 10001 ] 2022-04-22 07:42:37.715  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-22 07:42:37.719 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-22 07:42:37.722 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-04-22 07:42:37.724 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-22 07:42:37.725  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-04-22 07:42:37.731  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-22 07:42:37.733  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-22 07:42:37.734 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-22 07:42:37.736 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-22 07:42:37.743 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-22 07:42:37.755 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-22 07:42:37.756 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-22 07:42:37.757 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-22 07:42:37.758 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-22 07:42:38.080  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-22 07:42:38.082  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-22 07:42:38.082 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-22 07:42:38.085 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-22 07:42:38.088  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-22 07:42:38.089  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-22 07:42:38.090 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-22 07:42:38.091 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-22 07:42:38.091 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-22 07:42:38.093 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-22 07:42:38.094 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-22 07:42:38.094 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-22 07:42:38.096 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-22 07:42:38.097 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-22 07:42:38.098 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-22 07:42:38.099 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-22 07:42:38.104 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 398904590996439918760230912045821836189323261613 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 22 05:10:46 UTC 2022 Final Date: Wed Apr 21 05:10:45 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2f:4d:6e:cc:cb:df:74:91:15:52:17:dd:32:3a:6c:70:83:51:86:88] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1ad124b580504b357a74871bfccf92565df726e5 e9c1bc0e6cc6011b3942a9a232217173bb0422fb 59378e0ff331cf3300204d2ad8bc0478134d127c cf233270a39303808d20091286a9645449d110cb dfb084983e67564e40943724c7ce3e5296608cac ea4c14ed74f7af01d917e5182169545f13a240d0 41dab038c23db1157ba0f6b3d4546b0fbf0c6443 7c0a35108744d91a57c91a27d3fd79adc7cc0f77 78f19b45e2c3bcf83e069da7be640ca9a349dfa9 6e536dde4313ff8f33177ab455d52f2171f2e43f d4015f65e3e78bed5144ac54bddd1ebdce926a8f efa1168769cb3e9667092bdf35d46be0b73606bc 299d2bec7ec797334abb0d5cc647de9ead52740b 401fb4ac6422d84d0eb192264fb8f1c4e5ad8225 92ab3d53a573afbac3b80bba14ffc427274df3fd 8c0319cff93bf57a191acdeff0a8eb34b71a13f3 fea215b4d6095b447710962a26474ce969ab3403 abdb6c0351a4cfd55a9ee94274ad029a3ffaf067 96587161d811457ee3354da153c90ad203c821a4 f3240d07 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [76:d9:46:96:c6:00:06:09:2d:09:d7:b7:9d:97:da:56:76:d9:25:e7] modulus: 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 public exponent: 10001 ] 2022-04-22 07:45:52.434  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-22 07:45:52.439 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-22 07:45:52.442 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-22 07:45:52.444 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-22 07:45:52.444  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-22 07:45:52.446  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-22 07:45:52.447  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-22 07:45:52.448 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-22 07:45:52.449 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-22 07:45:52.450 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-22 07:45:52.478 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-22 07:45:52.486 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-22 07:45:52.487 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-22 07:45:52.488 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-22 07:45:52.855  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-22 07:45:52.857  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-22 07:45:52.857 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-22 07:45:52.858 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-22 07:45:52.866  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-22 07:45:52.867  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-22 07:45:52.868 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-22 07:45:52.869 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-22 07:45:52.869 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-22 07:45:52.872 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-22 07:45:52.874 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-22 07:45:52.875 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-22 07:45:52.877 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-22 07:45:52.882 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-22 07:45:52.883 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-22 07:45:52.885 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-22 07:45:52.895 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 398904590996439918760230912045821836189323261613 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 22 05:10:46 UTC 2022 Final Date: Wed Apr 21 05:10:45 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2f:4d:6e:cc:cb:df:74:91:15:52:17:dd:32:3a:6c:70:83:51:86:88] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1ad124b580504b357a74871bfccf92565df726e5 e9c1bc0e6cc6011b3942a9a232217173bb0422fb 59378e0ff331cf3300204d2ad8bc0478134d127c cf233270a39303808d20091286a9645449d110cb dfb084983e67564e40943724c7ce3e5296608cac ea4c14ed74f7af01d917e5182169545f13a240d0 41dab038c23db1157ba0f6b3d4546b0fbf0c6443 7c0a35108744d91a57c91a27d3fd79adc7cc0f77 78f19b45e2c3bcf83e069da7be640ca9a349dfa9 6e536dde4313ff8f33177ab455d52f2171f2e43f d4015f65e3e78bed5144ac54bddd1ebdce926a8f efa1168769cb3e9667092bdf35d46be0b73606bc 299d2bec7ec797334abb0d5cc647de9ead52740b 401fb4ac6422d84d0eb192264fb8f1c4e5ad8225 92ab3d53a573afbac3b80bba14ffc427274df3fd 8c0319cff93bf57a191acdeff0a8eb34b71a13f3 fea215b4d6095b447710962a26474ce969ab3403 abdb6c0351a4cfd55a9ee94274ad029a3ffaf067 96587161d811457ee3354da153c90ad203c821a4 f3240d07 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4f:ed:38:b8:d5:89:03:52:f9:e5:76:17:d6:71:69:a5:a6:41:8f:07] modulus: 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 public exponent: 10001 ] 2022-04-22 07:48:04.925  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-22 07:48:04.927 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-22 07:48:04.928 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-04-22 07:48:04.929 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-22 07:48:04.930  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-04-22 07:48:04.931  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-22 07:48:04.931  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-22 07:48:04.932 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-22 07:48:04.932 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-22 07:48:04.933 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-22 07:48:04.941 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-22 07:48:04.943 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-22 07:48:04.943 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-22 07:48:04.943 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-22 07:48:05.185  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-22 07:48:05.186  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-22 07:48:05.187 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-22 07:48:05.187 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-22 07:48:05.190  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-22 07:48:05.190  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-22 07:48:05.191 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-22 07:48:05.191 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-22 07:48:05.192 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-22 07:48:05.195 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-22 07:48:05.196 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-22 07:48:05.196 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-22 07:48:05.197 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-22 07:48:05.198 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-22 07:48:05.199 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-22 07:48:05.200 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-22 07:48:05.211 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 398904590996439918760230912045821836189323261613 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 22 05:10:46 UTC 2022 Final Date: Wed Apr 21 05:10:45 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2f:4d:6e:cc:cb:df:74:91:15:52:17:dd:32:3a:6c:70:83:51:86:88] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1ad124b580504b357a74871bfccf92565df726e5 e9c1bc0e6cc6011b3942a9a232217173bb0422fb 59378e0ff331cf3300204d2ad8bc0478134d127c cf233270a39303808d20091286a9645449d110cb dfb084983e67564e40943724c7ce3e5296608cac ea4c14ed74f7af01d917e5182169545f13a240d0 41dab038c23db1157ba0f6b3d4546b0fbf0c6443 7c0a35108744d91a57c91a27d3fd79adc7cc0f77 78f19b45e2c3bcf83e069da7be640ca9a349dfa9 6e536dde4313ff8f33177ab455d52f2171f2e43f d4015f65e3e78bed5144ac54bddd1ebdce926a8f efa1168769cb3e9667092bdf35d46be0b73606bc 299d2bec7ec797334abb0d5cc647de9ead52740b 401fb4ac6422d84d0eb192264fb8f1c4e5ad8225 92ab3d53a573afbac3b80bba14ffc427274df3fd 8c0319cff93bf57a191acdeff0a8eb34b71a13f3 fea215b4d6095b447710962a26474ce969ab3403 abdb6c0351a4cfd55a9ee94274ad029a3ffaf067 96587161d811457ee3354da153c90ad203c821a4 f3240d07 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b6:18:77:b8:09:f8:cf:d0:8a:38:56:5f:bf:0a:fe:10:2d:ab:c9:23] modulus: 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 public exponent: 10001 ] 2022-04-22 07:48:26.171  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-22 07:48:26.175 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-22 07:48:26.176 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-04-22 07:48:26.178 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-22 07:48:26.178  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-04-22 07:48:26.179  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-22 07:48:26.179  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-22 07:48:26.180 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-22 07:48:26.182 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-22 07:48:26.182 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-22 07:48:26.192 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-22 07:48:26.193 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-22 07:48:26.193 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-22 07:48:26.194 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-22 07:48:26.469  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-22 07:48:26.470  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-22 07:48:26.471 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-22 07:48:26.472 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-22 07:48:26.474  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-22 07:48:26.475  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-22 07:48:26.476 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-22 07:48:26.477 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-22 07:48:26.477 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-22 07:48:26.478 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-22 07:48:26.479 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-22 07:48:26.479 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-22 07:48:26.480 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-22 07:48:26.481 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-22 07:48:26.481 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-22 07:48:26.482 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-22 07:48:26.490 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 398904590996439918760230912045821836189323261613 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 22 05:10:46 UTC 2022 Final Date: Wed Apr 21 05:10:45 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2f:4d:6e:cc:cb:df:74:91:15:52:17:dd:32:3a:6c:70:83:51:86:88] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1ad124b580504b357a74871bfccf92565df726e5 e9c1bc0e6cc6011b3942a9a232217173bb0422fb 59378e0ff331cf3300204d2ad8bc0478134d127c cf233270a39303808d20091286a9645449d110cb dfb084983e67564e40943724c7ce3e5296608cac ea4c14ed74f7af01d917e5182169545f13a240d0 41dab038c23db1157ba0f6b3d4546b0fbf0c6443 7c0a35108744d91a57c91a27d3fd79adc7cc0f77 78f19b45e2c3bcf83e069da7be640ca9a349dfa9 6e536dde4313ff8f33177ab455d52f2171f2e43f d4015f65e3e78bed5144ac54bddd1ebdce926a8f efa1168769cb3e9667092bdf35d46be0b73606bc 299d2bec7ec797334abb0d5cc647de9ead52740b 401fb4ac6422d84d0eb192264fb8f1c4e5ad8225 92ab3d53a573afbac3b80bba14ffc427274df3fd 8c0319cff93bf57a191acdeff0a8eb34b71a13f3 fea215b4d6095b447710962a26474ce969ab3403 abdb6c0351a4cfd55a9ee94274ad029a3ffaf067 96587161d811457ee3354da153c90ad203c821a4 f3240d07 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [17:7a:cf:b6:38:fe:da:41:71:a0:f2:b2:cc:75:c3:3f:95:05:e1:1c] modulus: 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 public exponent: 10001 ] 2022-04-22 07:50:14.662  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-22 07:50:14.665 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-22 07:50:14.669 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-22 07:50:14.671 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-22 07:50:14.671  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-22 07:50:14.673  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-22 07:50:14.674  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-22 07:50:14.675 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-22 07:50:14.675 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-22 07:50:14.676 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-22 07:50:14.685 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-22 07:50:14.686 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-22 07:50:14.687 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-22 07:50:14.687 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-22 07:50:14.931  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-22 07:50:14.932  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-22 07:50:14.933 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-22 07:50:14.933 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-22 07:50:14.936  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-22 07:50:14.937  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-22 07:50:14.938 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-22 07:50:14.938 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-22 07:50:14.939 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-22 07:50:14.940 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-22 07:50:14.941 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-22 07:50:14.942 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-22 07:50:14.943 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-22 07:50:14.944 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-22 07:50:14.944 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-22 07:50:14.946 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-22 07:50:14.955 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 398904590996439918760230912045821836189323261613 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 22 05:10:46 UTC 2022 Final Date: Wed Apr 21 05:10:45 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2f:4d:6e:cc:cb:df:74:91:15:52:17:dd:32:3a:6c:70:83:51:86:88] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1ad124b580504b357a74871bfccf92565df726e5 e9c1bc0e6cc6011b3942a9a232217173bb0422fb 59378e0ff331cf3300204d2ad8bc0478134d127c cf233270a39303808d20091286a9645449d110cb dfb084983e67564e40943724c7ce3e5296608cac ea4c14ed74f7af01d917e5182169545f13a240d0 41dab038c23db1157ba0f6b3d4546b0fbf0c6443 7c0a35108744d91a57c91a27d3fd79adc7cc0f77 78f19b45e2c3bcf83e069da7be640ca9a349dfa9 6e536dde4313ff8f33177ab455d52f2171f2e43f d4015f65e3e78bed5144ac54bddd1ebdce926a8f efa1168769cb3e9667092bdf35d46be0b73606bc 299d2bec7ec797334abb0d5cc647de9ead52740b 401fb4ac6422d84d0eb192264fb8f1c4e5ad8225 92ab3d53a573afbac3b80bba14ffc427274df3fd 8c0319cff93bf57a191acdeff0a8eb34b71a13f3 fea215b4d6095b447710962a26474ce969ab3403 abdb6c0351a4cfd55a9ee94274ad029a3ffaf067 96587161d811457ee3354da153c90ad203c821a4 f3240d07 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d7:6c:0a:6c:1f:66:15:70:75:df:c1:d0:f4:c7:42:1e:67:5d:a3:db] modulus: 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 public exponent: 10001 ] 2022-04-22 07:55:52.440  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-22 07:55:52.447 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-22 07:55:52.451 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-22 07:55:52.454 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-22 07:55:52.454  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-22 07:55:52.456  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-22 07:55:52.458  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-22 07:55:52.462 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-22 07:55:52.479 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-22 07:55:52.480 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-22 07:55:52.501 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-22 07:55:52.503 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-22 07:55:52.504 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-22 07:55:52.505 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-22 07:55:52.846  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-22 07:55:52.849  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-22 07:55:52.854 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-22 07:55:52.857 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-22 07:55:52.860  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-22 07:55:52.861  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-22 07:55:52.861 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-22 07:55:52.862 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-22 07:55:52.862 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-22 07:55:52.864 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-22 07:55:52.864 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-22 07:55:52.865 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-22 07:55:52.866 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-22 07:55:52.867 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-22 07:55:52.867 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-22 07:55:52.869 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-22 07:55:52.878 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 398904590996439918760230912045821836189323261613 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 22 05:10:46 UTC 2022 Final Date: Wed Apr 21 05:10:45 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2f:4d:6e:cc:cb:df:74:91:15:52:17:dd:32:3a:6c:70:83:51:86:88] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1ad124b580504b357a74871bfccf92565df726e5 e9c1bc0e6cc6011b3942a9a232217173bb0422fb 59378e0ff331cf3300204d2ad8bc0478134d127c cf233270a39303808d20091286a9645449d110cb dfb084983e67564e40943724c7ce3e5296608cac ea4c14ed74f7af01d917e5182169545f13a240d0 41dab038c23db1157ba0f6b3d4546b0fbf0c6443 7c0a35108744d91a57c91a27d3fd79adc7cc0f77 78f19b45e2c3bcf83e069da7be640ca9a349dfa9 6e536dde4313ff8f33177ab455d52f2171f2e43f d4015f65e3e78bed5144ac54bddd1ebdce926a8f efa1168769cb3e9667092bdf35d46be0b73606bc 299d2bec7ec797334abb0d5cc647de9ead52740b 401fb4ac6422d84d0eb192264fb8f1c4e5ad8225 92ab3d53a573afbac3b80bba14ffc427274df3fd 8c0319cff93bf57a191acdeff0a8eb34b71a13f3 fea215b4d6095b447710962a26474ce969ab3403 abdb6c0351a4cfd55a9ee94274ad029a3ffaf067 96587161d811457ee3354da153c90ad203c821a4 f3240d07 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [da:8f:9c:95:67:86:7b:64:d8:78:ca:0c:41:49:9f:03:78:5e:d9:8e] modulus: c29ba56e79b4151d1cca4581459de454890f7c5283b23c3a4edddd67551e79c4d91a3b443f5c77c5405d60ecab1fa363c6043de6e160f459ff78e1fa0164e43524efc0d10681ffbf110bd4c1ac6c301ac73628a82a19f2f43875898c85afda158a710605e016b69496edd46de22a197e849d67df7b193c91669ae8f6157d582029b83212f61b69da174de0cfae358035da50d54e7797e3ec3948f4e059ae33c87db9cdfbacbb1c5666db681ed03ba18eeadabdf4249ec5784551d1ff9950fb427a331e9d439cf9129ab91191a68d332a093643faa34e06d27bc9cb3343c744b5c4772e3820147a1b5363ac0eadc9923c36d1069d6cf87811813bc74364bdc517 public exponent: 10001 ] 2022-04-22 08:00:41.191  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-22 08:00:41.193 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-22 08:00:41.196 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-22 08:00:41.198 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-22 08:00:41.198  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-22 08:00:41.200  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-22 08:00:41.201  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-22 08:00:41.201 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-22 08:00:41.202 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-22 08:00:41.203 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-22 08:00:41.217 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-22 08:00:41.220 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-22 08:00:41.220 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-22 08:00:41.223 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-22 08:00:41.584  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-22 08:00:41.587  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-22 08:00:41.588 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-22 08:00:41.588 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-22 08:00:41.591  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-22 08:00:41.592  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-22 08:00:41.593 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-22 08:00:41.593 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-22 08:00:41.594 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-22 08:00:41.599 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-22 08:00:41.600 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-22 08:00:41.600 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-22 08:00:41.601 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-22 08:00:41.602 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-22 08:00:41.602 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-22 08:00:41.610 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-22 08:00:41.617 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 398904590996439918760230912045821836189323261613 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 22 05:10:46 UTC 2022 Final Date: Wed Apr 21 05:10:45 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2f:4d:6e:cc:cb:df:74:91:15:52:17:dd:32:3a:6c:70:83:51:86:88] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1ad124b580504b357a74871bfccf92565df726e5 e9c1bc0e6cc6011b3942a9a232217173bb0422fb 59378e0ff331cf3300204d2ad8bc0478134d127c cf233270a39303808d20091286a9645449d110cb dfb084983e67564e40943724c7ce3e5296608cac ea4c14ed74f7af01d917e5182169545f13a240d0 41dab038c23db1157ba0f6b3d4546b0fbf0c6443 7c0a35108744d91a57c91a27d3fd79adc7cc0f77 78f19b45e2c3bcf83e069da7be640ca9a349dfa9 6e536dde4313ff8f33177ab455d52f2171f2e43f d4015f65e3e78bed5144ac54bddd1ebdce926a8f efa1168769cb3e9667092bdf35d46be0b73606bc 299d2bec7ec797334abb0d5cc647de9ead52740b 401fb4ac6422d84d0eb192264fb8f1c4e5ad8225 92ab3d53a573afbac3b80bba14ffc427274df3fd 8c0319cff93bf57a191acdeff0a8eb34b71a13f3 fea215b4d6095b447710962a26474ce969ab3403 abdb6c0351a4cfd55a9ee94274ad029a3ffaf067 96587161d811457ee3354da153c90ad203c821a4 f3240d07 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [11:ec:2a:e1:94:15:98:9e:61:e5:9a:ad:2a:ae:ac:60:6c:78:ea:c3] modulus: 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 public exponent: 10001 ] 2022-04-22 08:04:42.657  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-22 08:04:42.661 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-22 08:04:42.665 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-22 08:04:42.668 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-22 08:04:42.668  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-22 08:04:42.669  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-22 08:04:42.670  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-22 08:04:42.670 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-22 08:04:42.671 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-22 08:04:42.672 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-22 08:04:42.679 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-22 08:04:42.681 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-22 08:04:42.682 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-22 08:04:42.683 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-22 08:04:42.924  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-22 08:04:42.925  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-22 08:04:42.925 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-22 08:04:42.926 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-22 08:04:42.928  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-22 08:04:42.929  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-22 08:04:42.930 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-22 08:04:42.931 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-22 08:04:42.931 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-22 08:04:42.933 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-22 08:04:42.933 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-22 08:04:42.934 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-22 08:04:42.935 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-22 08:04:42.935 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-22 08:04:42.936 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-22 08:04:42.937 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-22 08:04:42.947 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 398904590996439918760230912045821836189323261613 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 22 05:10:46 UTC 2022 Final Date: Wed Apr 21 05:10:45 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2f:4d:6e:cc:cb:df:74:91:15:52:17:dd:32:3a:6c:70:83:51:86:88] modulus: a61ac1de0b3d0d07475937f5a401daf96623af897c1855b073804c1474ed0524767cdb54c82d740f6b0d0ea2e9150d3259b6d82d957defbb1defb2313bdfc53b5a7d33891c30c51f041cbdab928ea1b716e450f2b5b99ea33889cd65f3c0ebb2b4f15bbcc973e0072c49eb8b118764c01fdf82d999847b51f86965155ac49988cf53a6fa190430e06a8257b8f9d080d3e5559266d7589f83cecb564deab65eb328bb6f47673b2ec9d220367fc584ac5aa56d9633f1da235391b0f288c05ae2199208dab445a0ec50b343838da52db4ec23fdf54f42895767df487d40c5eba7b404207d330d07249445ac134cb40ea96047e0dffae32e5bd883824f421b36265a78f172c9d9d50ee659005408aa2c1ff016614c9cc37abedf18779fc0a733ef90e426f9213e64080650e91dbb06a774a98479f4a4cfb77f77ab89ace0675796e798c2409b8d1ce2495ccd2aecda0c3209e249965ff154b3fa530742ad48e058bd2184cf8c7e7de7d109e5b247676d50f0900a0f11c57a8e22d6a5a9c7f22f8b3d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1ad124b580504b357a74871bfccf92565df726e5 e9c1bc0e6cc6011b3942a9a232217173bb0422fb 59378e0ff331cf3300204d2ad8bc0478134d127c cf233270a39303808d20091286a9645449d110cb dfb084983e67564e40943724c7ce3e5296608cac ea4c14ed74f7af01d917e5182169545f13a240d0 41dab038c23db1157ba0f6b3d4546b0fbf0c6443 7c0a35108744d91a57c91a27d3fd79adc7cc0f77 78f19b45e2c3bcf83e069da7be640ca9a349dfa9 6e536dde4313ff8f33177ab455d52f2171f2e43f d4015f65e3e78bed5144ac54bddd1ebdce926a8f efa1168769cb3e9667092bdf35d46be0b73606bc 299d2bec7ec797334abb0d5cc647de9ead52740b 401fb4ac6422d84d0eb192264fb8f1c4e5ad8225 92ab3d53a573afbac3b80bba14ffc427274df3fd 8c0319cff93bf57a191acdeff0a8eb34b71a13f3 fea215b4d6095b447710962a26474ce969ab3403 abdb6c0351a4cfd55a9ee94274ad029a3ffaf067 96587161d811457ee3354da153c90ad203c821a4 f3240d07 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4e:b8:25:e9:02:c6:d7:f7:d4:e7:26:0a:62:dc:e5:9b:5c:d4:5b:68] modulus: dd07b205609ab2100cd23427ee517a09505045d46f3502caeaf42907e0ccd934898a12348cdf0a05d6312f26617befef40f2272e11ce158504a84230b4732bf6f4a689588a269906582f153256469518294bca27717286790d6e92e2a4d56e6c27f6791ae8863847d8f361bfecf2ba3d7576c5c833feeb54bda846c0148e6c906446698d841c74e03c7c27f33290ecfd1404166227466b3055a7c58ea0351ae56943939fe0718e556e03c0803ae8407d7ee545a23573ea9c111f98bbe5362418b05996b480fc9cf05aa9e5661d0ad80855d7e6e2119e8b46a4bc6a335ab373cc228dbc4c8ecacc8dabe681ac20e00c11eef60fdf421b82677dac07267acc4d49 public exponent: 10001 ] 2022-04-22 08:06:41.463  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-22 08:06:41.465 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-22 08:06:41.467 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-04-22 08:06:41.468 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-22 08:06:41.469  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-04-22 08:06:41.473  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-22 08:06:41.474  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-22 08:06:41.475 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-22 08:06:41.475 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-22 08:06:41.476 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-22 08:06:41.489 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-22 08:06:41.490 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-22 08:06:41.490 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-22 08:06:41.491 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-22 08:06:41.819  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-22 08:06:41.820  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-22 08:06:41.820 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-22 08:06:41.821 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-22 08:06:41.826  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-22 08:06:41.827  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-22 08:06:41.827 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-22 08:06:41.829 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-22 08:06:41.834 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-22 08:06:41.835 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-22 08:06:41.836 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-22 08:06:41.836 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-22 08:06:41.837 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-22 08:06:41.838 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-22 08:06:41.838 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-22 08:06:41.840 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-22 08:06:41.845 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 398904590996439918760230912045821836189323261613 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 22 05:10:46 UTC 2022 Final Date: Wed Apr 21 05:10:45 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2f:4d:6e:cc:cb:df:74:91:15:52:17:dd:32:3a:6c:70:83:51:86:88] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1ad124b580504b357a74871bfccf92565df726e5 e9c1bc0e6cc6011b3942a9a232217173bb0422fb 59378e0ff331cf3300204d2ad8bc0478134d127c cf233270a39303808d20091286a9645449d110cb dfb084983e67564e40943724c7ce3e5296608cac ea4c14ed74f7af01d917e5182169545f13a240d0 41dab038c23db1157ba0f6b3d4546b0fbf0c6443 7c0a35108744d91a57c91a27d3fd79adc7cc0f77 78f19b45e2c3bcf83e069da7be640ca9a349dfa9 6e536dde4313ff8f33177ab455d52f2171f2e43f d4015f65e3e78bed5144ac54bddd1ebdce926a8f efa1168769cb3e9667092bdf35d46be0b73606bc 299d2bec7ec797334abb0d5cc647de9ead52740b 401fb4ac6422d84d0eb192264fb8f1c4e5ad8225 92ab3d53a573afbac3b80bba14ffc427274df3fd 8c0319cff93bf57a191acdeff0a8eb34b71a13f3 fea215b4d6095b447710962a26474ce969ab3403 abdb6c0351a4cfd55a9ee94274ad029a3ffaf067 96587161d811457ee3354da153c90ad203c821a4 f3240d07 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3e:84:45:8f:bf:d6:fd:5d:45:9d:cc:e3:1b:da:7a:95:a0:97:ff:76] modulus: cd418daa8bbe8ad1a45afc0b09af614c303aa6e60712581e2d963801227817c9b94824d592a47810fc45d321ec8384fa3f67128da8a1efdb63ca1da471cfc36d1465464123255eb38085f341cf86ac45d768ada70b5d1e162310faf57fbc5cabcfccfacaa8c4d40f881aa9affc0515710393dc66d9293795b204cae49cfa03e20f86a2dab85ae6fa0bb522abb901c527ec6f93beffbcc630e01a7d45739449ec221e73413f62132d7ca0530a3cb28fa17d0cf63efa8cc7c7c3b131f7806f24f96b185a5046b686ea0884204284c9e874dfd97df7d090c280ff7f1af558e8426e92fcc3344123695f07588e7950fb5157a8a3c7409dd2e0102996513aa212c3e7 public exponent: 10001 ] 2022-04-22 08:06:51.009  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-22 08:06:51.010 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-22 08:06:51.013 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-04-22 08:06:51.014 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-22 08:06:51.014  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-04-22 08:06:51.016  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-22 08:06:51.016  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-22 08:06:51.017 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-22 08:06:51.017 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-22 08:06:51.017 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-22 08:06:51.028 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-22 08:06:51.029 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-22 08:06:51.029 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-22 08:06:51.029 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-22 08:06:51.214  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-22 08:06:51.215  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-22 08:06:51.215 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-22 08:06:51.215 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-22 08:06:51.217  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-22 08:06:51.217  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-22 08:06:51.218 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-22 08:06:51.219 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-22 08:06:51.219 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-22 08:06:51.220 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-22 08:06:51.220 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-22 08:06:51.221 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-22 08:06:51.222 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-22 08:06:51.223 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-22 08:06:51.223 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-22 08:06:51.224 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-22 08:06:51.229 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 398904590996439918760230912045821836189323261613 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 22 05:10:46 UTC 2022 Final Date: Wed Apr 21 05:10:45 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2f:4d:6e:cc:cb:df:74:91:15:52:17:dd:32:3a:6c:70:83:51:86:88] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1ad124b580504b357a74871bfccf92565df726e5 e9c1bc0e6cc6011b3942a9a232217173bb0422fb 59378e0ff331cf3300204d2ad8bc0478134d127c cf233270a39303808d20091286a9645449d110cb dfb084983e67564e40943724c7ce3e5296608cac ea4c14ed74f7af01d917e5182169545f13a240d0 41dab038c23db1157ba0f6b3d4546b0fbf0c6443 7c0a35108744d91a57c91a27d3fd79adc7cc0f77 78f19b45e2c3bcf83e069da7be640ca9a349dfa9 6e536dde4313ff8f33177ab455d52f2171f2e43f d4015f65e3e78bed5144ac54bddd1ebdce926a8f efa1168769cb3e9667092bdf35d46be0b73606bc 299d2bec7ec797334abb0d5cc647de9ead52740b 401fb4ac6422d84d0eb192264fb8f1c4e5ad8225 92ab3d53a573afbac3b80bba14ffc427274df3fd 8c0319cff93bf57a191acdeff0a8eb34b71a13f3 fea215b4d6095b447710962a26474ce969ab3403 abdb6c0351a4cfd55a9ee94274ad029a3ffaf067 96587161d811457ee3354da153c90ad203c821a4 f3240d07 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [24:36:5f:c0:1b:ad:cc:b6:ad:37:0d:03:58:92:b3:59:26:e2:af:68] modulus: e199b1f0f31061685d61a12f945a65475a711d355ef57764ef8012792dc83555b5e54db70dcaa8797a4846133f32411b4c06df30fd923d9b9ff7fd4978f7fcede0c3e0481c5d5801bfc501f3294c869bbba2097ef301f8a7cebf19990943daadc91b1144b8773c904e167422acc0765b8c9ffb341addf80d8cf4cc2a2cdb06b1292cd74860f65fe7770f6cf4441d317281142edbba155196deb79b18a53776517001076edd15c14c537793accc0089031ccc93d7bb2232871f216cb296b261123a21673511ae2eac3854bef3a5c54b0b4ff93836fa91e389206947654f26016c73ccfe761d4c10fcdb1b03b379c01b4ff502409f0a561ad0f72ce7f736dff9e5 public exponent: 10001 ] 2022-04-22 08:09:34.692  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-22 08:09:34.694 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-22 08:09:34.696 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-22 08:09:34.697 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-22 08:09:34.698  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-22 08:09:34.698  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-22 08:09:34.699  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-22 08:09:34.699 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-22 08:09:34.699 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-22 08:09:34.700 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-22 08:09:34.708 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-22 08:09:34.709 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-22 08:09:34.710 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-22 08:09:34.710 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-22 08:09:34.974  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-22 08:09:34.975  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-22 08:09:34.976 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-22 08:09:34.976 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-22 08:09:34.978  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-22 08:09:34.979  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-22 08:09:34.980 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-22 08:09:34.980 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-22 08:09:34.980 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-22 08:09:34.981 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-22 08:09:34.981 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-22 08:09:34.982 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-22 08:09:34.982 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-22 08:09:34.982 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-22 08:09:34.983 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-22 08:09:34.983 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-22 08:09:34.988 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 398904590996439918760230912045821836189323261613 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 22 05:10:46 UTC 2022 Final Date: Wed Apr 21 05:10:45 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2f:4d:6e:cc:cb:df:74:91:15:52:17:dd:32:3a:6c:70:83:51:86:88] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1ad124b580504b357a74871bfccf92565df726e5 e9c1bc0e6cc6011b3942a9a232217173bb0422fb 59378e0ff331cf3300204d2ad8bc0478134d127c cf233270a39303808d20091286a9645449d110cb dfb084983e67564e40943724c7ce3e5296608cac ea4c14ed74f7af01d917e5182169545f13a240d0 41dab038c23db1157ba0f6b3d4546b0fbf0c6443 7c0a35108744d91a57c91a27d3fd79adc7cc0f77 78f19b45e2c3bcf83e069da7be640ca9a349dfa9 6e536dde4313ff8f33177ab455d52f2171f2e43f d4015f65e3e78bed5144ac54bddd1ebdce926a8f efa1168769cb3e9667092bdf35d46be0b73606bc 299d2bec7ec797334abb0d5cc647de9ead52740b 401fb4ac6422d84d0eb192264fb8f1c4e5ad8225 92ab3d53a573afbac3b80bba14ffc427274df3fd 8c0319cff93bf57a191acdeff0a8eb34b71a13f3 fea215b4d6095b447710962a26474ce969ab3403 abdb6c0351a4cfd55a9ee94274ad029a3ffaf067 96587161d811457ee3354da153c90ad203c821a4 f3240d07 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7d:c0:0a:8b:85:39:6b:19:b2:15:e6:8a:c2:49:b5:c0:df:ec:41:e8] modulus: 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 public exponent: 10001 ] 2022-04-22 08:13:53.250  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-22 08:13:53.256 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-22 08:13:53.259 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-22 08:13:53.263 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-22 08:13:53.265  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-22 08:13:53.272  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-22 08:13:53.273  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-22 08:13:53.273 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-22 08:13:53.275 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-22 08:13:53.276 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-22 08:13:53.284 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-22 08:13:53.285 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-22 08:13:53.286 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-22 08:13:53.286 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-22 08:13:53.644  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-22 08:13:53.645  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-22 08:13:53.646 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-22 08:13:53.647 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-22 08:13:53.649  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-22 08:13:53.650  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-22 08:13:53.650 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-22 08:13:53.651 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-22 08:13:53.651 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-22 08:13:53.653 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-22 08:13:53.654 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-22 08:13:53.654 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-22 08:13:53.655 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-22 08:13:53.656 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-22 08:13:53.656 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-22 08:13:53.657 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-22 08:13:53.668 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 398904590996439918760230912045821836189323261613 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 22 05:10:46 UTC 2022 Final Date: Wed Apr 21 05:10:45 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2f:4d:6e:cc:cb:df:74:91:15:52:17:dd:32:3a:6c:70:83:51:86:88] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1ad124b580504b357a74871bfccf92565df726e5 e9c1bc0e6cc6011b3942a9a232217173bb0422fb 59378e0ff331cf3300204d2ad8bc0478134d127c cf233270a39303808d20091286a9645449d110cb dfb084983e67564e40943724c7ce3e5296608cac ea4c14ed74f7af01d917e5182169545f13a240d0 41dab038c23db1157ba0f6b3d4546b0fbf0c6443 7c0a35108744d91a57c91a27d3fd79adc7cc0f77 78f19b45e2c3bcf83e069da7be640ca9a349dfa9 6e536dde4313ff8f33177ab455d52f2171f2e43f d4015f65e3e78bed5144ac54bddd1ebdce926a8f efa1168769cb3e9667092bdf35d46be0b73606bc 299d2bec7ec797334abb0d5cc647de9ead52740b 401fb4ac6422d84d0eb192264fb8f1c4e5ad8225 92ab3d53a573afbac3b80bba14ffc427274df3fd 8c0319cff93bf57a191acdeff0a8eb34b71a13f3 fea215b4d6095b447710962a26474ce969ab3403 abdb6c0351a4cfd55a9ee94274ad029a3ffaf067 96587161d811457ee3354da153c90ad203c821a4 f3240d07 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c6:fd:94:77:b6:d0:f5:fa:f8:03:b4:eb:37:e6:cb:e5:0c:72:1d:e8] modulus: ee2aabfb8b8deb0886ee665697ad487ec7a9345b24339ccc19bab13c7a5ff27871ef600fa140e5dab0c7ad999ad8c10459ab31626e77f6aebbb8ded2d95bfb3d558b91623e413d000a99569473c8bdf2d0ef37bf366b92fa42e5005aa61644c50ff797ec4905d1878e93cf81062d60944d0ffd1b4b31174b56bbd5996a18217d1626d32fa0f5b2062ca8a6a8c21fc962c0848496e496a49d857da718937e9668fab4600bb6fabdf1e70a35e9949af2331e12253534f0cb6275e48bfa4e3a21100b72aafac17970af640603236c1fa42f339d4277aab3337e24f6d547be6ca3423dd544deaf9f0c4e998871946ddf1543ad686e78a31440b9caf232fc91bb8b4f public exponent: 10001 ] 2022-04-22 08:19:12.504  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-22 08:19:12.506 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-22 08:19:12.508 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-22 08:19:12.509 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-22 08:19:12.515  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-22 08:19:12.517  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-22 08:19:12.523  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-22 08:19:12.525 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-22 08:19:12.525 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-22 08:19:12.526 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-22 08:19:12.548 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-22 08:19:12.549 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-22 08:19:12.549 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-22 08:19:12.550 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-22 08:19:12.840  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-22 08:19:12.841  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-22 08:19:12.841 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-22 08:19:12.841 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-22 08:19:12.844  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-22 08:19:12.845  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-22 08:19:12.846 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-22 08:19:12.847 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-22 08:19:12.847 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-22 08:19:12.848 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-22 08:19:12.849 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-22 08:19:12.849 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-22 08:19:12.850 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-22 08:19:12.850 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-22 08:19:12.850 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-22 08:19:12.851 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-22 08:19:12.856 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 398904590996439918760230912045821836189323261613 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Apr 22 05:10:46 UTC 2022 Final Date: Wed Apr 21 05:10:45 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2f:4d:6e:cc:cb:df:74:91:15:52:17:dd:32:3a:6c:70:83:51:86:88] modulus: a61ac1de0b3d0d07475937f5a401daf96623af897c1855b073804c1474ed0524767cdb54c82d740f6b0d0ea2e9150d3259b6d82d957defbb1defb2313bdfc53b5a7d33891c30c51f041cbdab928ea1b716e450f2b5b99ea33889cd65f3c0ebb2b4f15bbcc973e0072c49eb8b118764c01fdf82d999847b51f86965155ac49988cf53a6fa190430e06a8257b8f9d080d3e5559266d7589f83cecb564deab65eb328bb6f47673b2ec9d220367fc584ac5aa56d9633f1da235391b0f288c05ae2199208dab445a0ec50b343838da52db4ec23fdf54f42895767df487d40c5eba7b404207d330d07249445ac134cb40ea96047e0dffae32e5bd883824f421b36265a78f172c9d9d50ee659005408aa2c1ff016614c9cc37abedf18779fc0a733ef90e426f9213e64080650e91dbb06a774a98479f4a4cfb77f77ab89ace0675796e798c2409b8d1ce2495ccd2aecda0c3209e249965ff154b3fa530742ad48e058bd2184cf8c7e7de7d109e5b247676d50f0900a0f11c57a8e22d6a5a9c7f22f8b3d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1ad124b580504b357a74871bfccf92565df726e5 e9c1bc0e6cc6011b3942a9a232217173bb0422fb 59378e0ff331cf3300204d2ad8bc0478134d127c cf233270a39303808d20091286a9645449d110cb dfb084983e67564e40943724c7ce3e5296608cac ea4c14ed74f7af01d917e5182169545f13a240d0 41dab038c23db1157ba0f6b3d4546b0fbf0c6443 7c0a35108744d91a57c91a27d3fd79adc7cc0f77 78f19b45e2c3bcf83e069da7be640ca9a349dfa9 6e536dde4313ff8f33177ab455d52f2171f2e43f d4015f65e3e78bed5144ac54bddd1ebdce926a8f efa1168769cb3e9667092bdf35d46be0b73606bc 299d2bec7ec797334abb0d5cc647de9ead52740b 401fb4ac6422d84d0eb192264fb8f1c4e5ad8225 92ab3d53a573afbac3b80bba14ffc427274df3fd 8c0319cff93bf57a191acdeff0a8eb34b71a13f3 fea215b4d6095b447710962a26474ce969ab3403 abdb6c0351a4cfd55a9ee94274ad029a3ffaf067 96587161d811457ee3354da153c90ad203c821a4 f3240d07 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [95:1f:95:d4:6a:02:10:af:89:8d:b6:de:21:a7:b4:3c:87:bd:4e:24] modulus: d36ddca8a2be9e57317c9060483134376c1e234199d4d39c7eb023016dd01b8cd7479d6a1b6f32deda187faf8a2c4d37ecc7f99f3d8e4f7f9e9bb208a4f3a0fa07720a29edf16b05fd0cf37ac32bb12916d66679542c4179c9ad8b22ea5619f483c95b992463bfb82ffa2935932732e3deb463aebb73ef683cf1c927692f21e79b01fc967123ad3a8a57347998cd42867c8910e0488969546fdbeb56ba961b818282a584de41c1656ce642069ab12e36aaf056c77641b9a3d0884e9f89697a4fd769a68e95a0079c3855066b285e49b10301a226f3b76594542c9b664f6c61dd9f69ca87ff4ff3fb99ae92a4f4c947478e7894de2534dbf1a5ac7b4ae68aa18f public exponent: 10001 ]