2022-04-28 05:32:30,680 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-04-28 05:32:31,988 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-04-28 05:32:32.972  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Apr 28, 2022 5:32:35 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Apr 28, 2022 5:32:35 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Apr 28, 2022 5:32:35 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Apr 28, 2022 5:32:35 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-04-28 05:32:35.945 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-04-28 05:32:36.249  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-04-28 05:32:36.417  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-04-28 05:32:37.214 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-04-28 05:32:37.217 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-04-28 05:32:37.219 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-04-28 05:32:37.223 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-04-28 05:32:37.266 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-04-28 05:32:37.270 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-04-28 05:32:37.398 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-04-28 05:32:38.115 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Apr 28, 2022 5:32:38 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-04-28 05:32:39.174  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 9.416 seconds (JVM running for 11.683) Apr 28, 2022 5:32:58 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-04-28 05:33:08.217  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-28 05:33:08.228 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-28 05:33:08.273 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-04-28 05:33:08.277 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-28 05:33:08.295  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-04-28 05:33:08.297  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-28 05:33:08.298  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-28 05:33:08.300 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-28 05:33:08.300 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 05:33:08.307 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-28 05:33:08.315 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-28 05:33:08.319 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-28 05:33:08.367 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-28 05:33:08.371 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 05:33:08.372 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 05:33:08.375 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-28 05:33:09.287  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-28 05:33:09.290  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-28 05:33:09.291 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-28 05:33:09.292 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-28 05:33:09.302  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-28 05:33:09.304  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-28 05:33:09.304 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 05:33:09.305 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 05:33:09.305 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 05:33:09.318 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 05:33:09.319 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 05:33:09.319 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 05:33:09.326 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 05:33:09.326 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 05:33:09.327 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 05:33:09.329 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-28 05:33:09.361 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 163330103288001217920201553715399510928059212224 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 28 05:26:20 UTC 2022 Final Date: Tue Apr 27 05:26:19 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a7:e0:dc:c0:36:d0:f4:5a:35:9f:f1:92:1f:57:c7:1d:fd:d4:4c:d1] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8de6c726fa6ab0b6045a250dc1f21a39feff74e2 15e76517b5954de7b39f2b0e083938cd39bf14b0 3610cc29006fa940f54496d2582651fafd55918b d1d2c7c7e97bc43656dae5bb4e170acac8efdc97 bb5c2314601ed4488c9322570458349478e63e44 e65bffaf5ce1460084541f7c6c093f0c7a28ed26 433d9ff69754e805e46adc761fb21099836dbefe d6552b63ab0e4bc9b8382e667fb47fe030e5344c 42680614133ebe3cb47bf20fb1ec9850c2dbeeb8 70e851ce9f1a758d0044c748e36873f6df4c9f1e dde6c0205e2fb37705b6f4d691333e6d072723bc c87b5e7ed05a2884c4da2711de984faf0a7663c1 871eaae241a3566af82eb323b581eb1f05641f9b dc0e456135ad32e56cec93d99451be997825f7c3 044ebc1c77a7dd92a04f5e9b55c5e2621fe9d3e9 15b6eba762c02adf2d06ac248b8a8feb4bfa40ac e270483d6994540b3999b1deed8ab23fbe272287 3fff1996b222c342c99a5e8b50922e8b4e236510 ab0c23c56e834646140a6b502cdfde8679ce9641 900f2b24 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [cb:4c:4a:2a:b5:82:03:ab:61:54:e7:59:ea:0b:5c:04:d9:85:0a:8d] modulus: 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 public exponent: 10001 ] 2022-04-28 07:48:19.634  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-28 07:48:19.637 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-28 07:48:19.641 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-04-28 07:48:19.643 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-28 07:48:19.644  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-04-28 07:48:19.645  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-28 07:48:19.646  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-28 07:48:19.647 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-28 07:48:19.649 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-28 07:48:19.649 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-28 07:48:19.671 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-28 07:48:19.674 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 07:48:19.675 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 07:48:19.676 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-28 07:48:20.019  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-28 07:48:20.020  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-28 07:48:20.021 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-28 07:48:20.022 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-28 07:48:20.027  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-28 07:48:20.028  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-28 07:48:20.029 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 07:48:20.030 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 07:48:20.031 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 07:48:20.033 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 07:48:20.034 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 07:48:20.035 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 07:48:20.036 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 07:48:20.037 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 07:48:20.038 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 07:48:20.040 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-28 07:48:20.049 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 163330103288001217920201553715399510928059212224 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 28 05:26:20 UTC 2022 Final Date: Tue Apr 27 05:26:19 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a7:e0:dc:c0:36:d0:f4:5a:35:9f:f1:92:1f:57:c7:1d:fd:d4:4c:d1] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8de6c726fa6ab0b6045a250dc1f21a39feff74e2 15e76517b5954de7b39f2b0e083938cd39bf14b0 3610cc29006fa940f54496d2582651fafd55918b d1d2c7c7e97bc43656dae5bb4e170acac8efdc97 bb5c2314601ed4488c9322570458349478e63e44 e65bffaf5ce1460084541f7c6c093f0c7a28ed26 433d9ff69754e805e46adc761fb21099836dbefe d6552b63ab0e4bc9b8382e667fb47fe030e5344c 42680614133ebe3cb47bf20fb1ec9850c2dbeeb8 70e851ce9f1a758d0044c748e36873f6df4c9f1e dde6c0205e2fb37705b6f4d691333e6d072723bc c87b5e7ed05a2884c4da2711de984faf0a7663c1 871eaae241a3566af82eb323b581eb1f05641f9b dc0e456135ad32e56cec93d99451be997825f7c3 044ebc1c77a7dd92a04f5e9b55c5e2621fe9d3e9 15b6eba762c02adf2d06ac248b8a8feb4bfa40ac e270483d6994540b3999b1deed8ab23fbe272287 3fff1996b222c342c99a5e8b50922e8b4e236510 ab0c23c56e834646140a6b502cdfde8679ce9641 900f2b24 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6c:09:ee:ac:9d:f3:6e:d1:ac:c6:0d:90:d9:e0:8a:56:fc:c6:6f:3d] modulus: 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 public exponent: 10001 ] 2022-04-28 07:48:22.750  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-28 07:48:22.752 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-28 07:48:22.756 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-28 07:48:22.757 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-28 07:48:22.758  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-28 07:48:22.759  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-28 07:48:22.759  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-28 07:48:22.760 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-28 07:48:22.760 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-28 07:48:22.762 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-28 07:48:22.771 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-28 07:48:22.772 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 07:48:22.773 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 07:48:22.773 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-28 07:48:22.991  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-28 07:48:22.992  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-28 07:48:22.992 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-28 07:48:22.992 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-28 07:48:22.995  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-28 07:48:22.996  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-28 07:48:22.996 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 07:48:22.997 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 07:48:22.997 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 07:48:22.998 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 07:48:22.999 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 07:48:22.999 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 07:48:23.000 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 07:48:23.001 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 07:48:23.001 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 07:48:23.003 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-28 07:48:23.007 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 163330103288001217920201553715399510928059212224 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 28 05:26:20 UTC 2022 Final Date: Tue Apr 27 05:26:19 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a7:e0:dc:c0:36:d0:f4:5a:35:9f:f1:92:1f:57:c7:1d:fd:d4:4c:d1] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8de6c726fa6ab0b6045a250dc1f21a39feff74e2 15e76517b5954de7b39f2b0e083938cd39bf14b0 3610cc29006fa940f54496d2582651fafd55918b d1d2c7c7e97bc43656dae5bb4e170acac8efdc97 bb5c2314601ed4488c9322570458349478e63e44 e65bffaf5ce1460084541f7c6c093f0c7a28ed26 433d9ff69754e805e46adc761fb21099836dbefe d6552b63ab0e4bc9b8382e667fb47fe030e5344c 42680614133ebe3cb47bf20fb1ec9850c2dbeeb8 70e851ce9f1a758d0044c748e36873f6df4c9f1e dde6c0205e2fb37705b6f4d691333e6d072723bc c87b5e7ed05a2884c4da2711de984faf0a7663c1 871eaae241a3566af82eb323b581eb1f05641f9b dc0e456135ad32e56cec93d99451be997825f7c3 044ebc1c77a7dd92a04f5e9b55c5e2621fe9d3e9 15b6eba762c02adf2d06ac248b8a8feb4bfa40ac e270483d6994540b3999b1deed8ab23fbe272287 3fff1996b222c342c99a5e8b50922e8b4e236510 ab0c23c56e834646140a6b502cdfde8679ce9641 900f2b24 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b3:7a:82:b2:3d:16:fd:a0:82:0c:62:b0:c6:8e:df:7d:a4:b1:18:d0] modulus: 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 public exponent: 10001 ] 2022-04-28 07:49:57.608  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-28 07:49:57.609 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-28 07:49:57.611 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-04-28 07:49:57.612 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-28 07:49:57.613  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-04-28 07:49:57.614  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-28 07:49:57.615  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-28 07:49:57.615 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-28 07:49:57.615 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-28 07:49:57.616 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-28 07:49:57.620 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-28 07:49:57.621 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 07:49:57.621 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 07:49:57.622 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-28 07:49:57.893  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-28 07:49:57.894  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-28 07:49:57.895 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-28 07:49:57.896 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-28 07:49:57.898  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-28 07:49:57.899  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-28 07:49:57.900 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 07:49:57.900 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 07:49:57.900 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 07:49:57.901 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 07:49:57.902 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 07:49:57.902 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 07:49:57.903 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 07:49:57.904 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 07:49:57.904 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 07:49:57.906 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-28 07:49:57.914 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 163330103288001217920201553715399510928059212224 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 28 05:26:20 UTC 2022 Final Date: Tue Apr 27 05:26:19 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a7:e0:dc:c0:36:d0:f4:5a:35:9f:f1:92:1f:57:c7:1d:fd:d4:4c:d1] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8de6c726fa6ab0b6045a250dc1f21a39feff74e2 15e76517b5954de7b39f2b0e083938cd39bf14b0 3610cc29006fa940f54496d2582651fafd55918b d1d2c7c7e97bc43656dae5bb4e170acac8efdc97 bb5c2314601ed4488c9322570458349478e63e44 e65bffaf5ce1460084541f7c6c093f0c7a28ed26 433d9ff69754e805e46adc761fb21099836dbefe d6552b63ab0e4bc9b8382e667fb47fe030e5344c 42680614133ebe3cb47bf20fb1ec9850c2dbeeb8 70e851ce9f1a758d0044c748e36873f6df4c9f1e dde6c0205e2fb37705b6f4d691333e6d072723bc c87b5e7ed05a2884c4da2711de984faf0a7663c1 871eaae241a3566af82eb323b581eb1f05641f9b dc0e456135ad32e56cec93d99451be997825f7c3 044ebc1c77a7dd92a04f5e9b55c5e2621fe9d3e9 15b6eba762c02adf2d06ac248b8a8feb4bfa40ac e270483d6994540b3999b1deed8ab23fbe272287 3fff1996b222c342c99a5e8b50922e8b4e236510 ab0c23c56e834646140a6b502cdfde8679ce9641 900f2b24 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f1:d1:1d:38:bd:d8:27:80:e9:da:a6:0a:6b:2c:6d:43:1d:b6:12:bf] modulus: b378ce408cf0dc8ef87f2bfafadcc86bbbc405302c477fcda2ee37e3d261520cfdb5336f5a075075cb4fe2ddea9fd09dfff69cf73cabe8ac1eb4080f76c4c63dbdf4a3a022994e9fe7d4d24a96c8c7e90090b75d529fba74161dddcdba78a58c174265d18110ead084ad0a83ec778b05db3dc22e51ccaf772507e93907c83e2a1d1f020757aee1dea79ba39e65321178d24a72c8492511110eb72a607bce07f74f406ea2b8463d2d54d184af54c3efd22866762585f493c2175e43391ce830e5e4abdf9012467f411f7459ee85672a1b4e9df8689df6d5a8386f6245dc55120c3429f7bbd9b80b5bd3888771f6ce8850da85386f67b0ad22989c0cc27357c5b5 public exponent: 10001 ] 2022-04-28 07:52:38.674  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-28 07:52:38.676 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-28 07:52:38.678 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-04-28 07:52:38.680 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-28 07:52:38.681  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-04-28 07:52:38.683  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-28 07:52:38.685  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-28 07:52:38.685 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-28 07:52:38.686 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-28 07:52:38.687 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-28 07:52:38.695 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-28 07:52:38.696 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 07:52:38.696 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 07:52:38.697 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-28 07:52:39.183  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-28 07:52:39.183  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-28 07:52:39.185 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-28 07:52:39.186 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-28 07:52:39.188  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-28 07:52:39.194  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-28 07:52:39.194 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 07:52:39.194 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 07:52:39.195 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 07:52:39.195 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 07:52:39.196 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 07:52:39.196 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 07:52:39.197 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 07:52:39.197 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 07:52:39.198 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 07:52:39.199 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-28 07:52:39.204 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 163330103288001217920201553715399510928059212224 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 28 05:26:20 UTC 2022 Final Date: Tue Apr 27 05:26:19 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a7:e0:dc:c0:36:d0:f4:5a:35:9f:f1:92:1f:57:c7:1d:fd:d4:4c:d1] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8de6c726fa6ab0b6045a250dc1f21a39feff74e2 15e76517b5954de7b39f2b0e083938cd39bf14b0 3610cc29006fa940f54496d2582651fafd55918b d1d2c7c7e97bc43656dae5bb4e170acac8efdc97 bb5c2314601ed4488c9322570458349478e63e44 e65bffaf5ce1460084541f7c6c093f0c7a28ed26 433d9ff69754e805e46adc761fb21099836dbefe d6552b63ab0e4bc9b8382e667fb47fe030e5344c 42680614133ebe3cb47bf20fb1ec9850c2dbeeb8 70e851ce9f1a758d0044c748e36873f6df4c9f1e dde6c0205e2fb37705b6f4d691333e6d072723bc c87b5e7ed05a2884c4da2711de984faf0a7663c1 871eaae241a3566af82eb323b581eb1f05641f9b dc0e456135ad32e56cec93d99451be997825f7c3 044ebc1c77a7dd92a04f5e9b55c5e2621fe9d3e9 15b6eba762c02adf2d06ac248b8a8feb4bfa40ac e270483d6994540b3999b1deed8ab23fbe272287 3fff1996b222c342c99a5e8b50922e8b4e236510 ab0c23c56e834646140a6b502cdfde8679ce9641 900f2b24 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c5:58:2e:95:0c:f2:6e:e4:8c:6d:31:0f:59:0f:0a:d1:21:9b:c5:0b] modulus: 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 public exponent: 10001 ] 2022-04-28 07:53:23.417  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-28 07:53:23.419 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-28 07:53:23.421 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-04-28 07:53:23.422 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-28 07:53:23.423  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-04-28 07:53:23.424  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-28 07:53:23.424  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-28 07:53:23.425 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-28 07:53:23.425 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-28 07:53:23.426 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-28 07:53:23.433 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-28 07:53:23.436 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 07:53:23.436 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 07:53:23.437 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-28 07:53:23.803  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-28 07:53:23.804  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-28 07:53:23.804 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-28 07:53:23.804 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-28 07:53:23.806  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-28 07:53:23.807  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-28 07:53:23.807 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 07:53:23.807 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 07:53:23.807 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 07:53:23.808 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 07:53:23.808 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 07:53:23.808 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 07:53:23.809 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 07:53:23.809 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 07:53:23.810 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 07:53:23.810 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-28 07:53:23.814 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 163330103288001217920201553715399510928059212224 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 28 05:26:20 UTC 2022 Final Date: Tue Apr 27 05:26:19 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a7:e0:dc:c0:36:d0:f4:5a:35:9f:f1:92:1f:57:c7:1d:fd:d4:4c:d1] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8de6c726fa6ab0b6045a250dc1f21a39feff74e2 15e76517b5954de7b39f2b0e083938cd39bf14b0 3610cc29006fa940f54496d2582651fafd55918b d1d2c7c7e97bc43656dae5bb4e170acac8efdc97 bb5c2314601ed4488c9322570458349478e63e44 e65bffaf5ce1460084541f7c6c093f0c7a28ed26 433d9ff69754e805e46adc761fb21099836dbefe d6552b63ab0e4bc9b8382e667fb47fe030e5344c 42680614133ebe3cb47bf20fb1ec9850c2dbeeb8 70e851ce9f1a758d0044c748e36873f6df4c9f1e dde6c0205e2fb37705b6f4d691333e6d072723bc c87b5e7ed05a2884c4da2711de984faf0a7663c1 871eaae241a3566af82eb323b581eb1f05641f9b dc0e456135ad32e56cec93d99451be997825f7c3 044ebc1c77a7dd92a04f5e9b55c5e2621fe9d3e9 15b6eba762c02adf2d06ac248b8a8feb4bfa40ac e270483d6994540b3999b1deed8ab23fbe272287 3fff1996b222c342c99a5e8b50922e8b4e236510 ab0c23c56e834646140a6b502cdfde8679ce9641 900f2b24 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [50:f4:22:a5:9e:ca:9b:12:99:d6:6b:d1:37:04:fc:d5:79:c9:c5:5f] modulus: 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 public exponent: 10001 ] 2022-04-28 07:53:42.344  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-28 07:53:42.346 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-28 07:53:42.347 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-04-28 07:53:42.348 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-28 07:53:42.348  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-04-28 07:53:42.350  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-28 07:53:42.350  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-28 07:53:42.351 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-28 07:53:42.351 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-28 07:53:42.351 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-28 07:53:42.357 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-28 07:53:42.358 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 07:53:42.358 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 07:53:42.359 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-28 07:53:42.624  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-28 07:53:42.624  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-28 07:53:42.625 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-28 07:53:42.626 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-28 07:53:42.628  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-28 07:53:42.629  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-28 07:53:42.629 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 07:53:42.630 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 07:53:42.630 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 07:53:42.632 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 07:53:42.632 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 07:53:42.633 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 07:53:42.634 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 07:53:42.634 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 07:53:42.635 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 07:53:42.636 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-28 07:53:42.641 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 163330103288001217920201553715399510928059212224 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 28 05:26:20 UTC 2022 Final Date: Tue Apr 27 05:26:19 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a7:e0:dc:c0:36:d0:f4:5a:35:9f:f1:92:1f:57:c7:1d:fd:d4:4c:d1] modulus: e0d93c8ca065a6a477d612df304ea35c72d7a462cba6fa47038f19855b3632852c164a821edea97328859a09b0b2eadc51dd836cdcf15402f36850493f0afb01ed3505e487358a7c69eacfd316b616ca44a6869e5e8221ae4f644cdd7f8f00831335d8f132b56072cfaf0a391592db0d6e17d9dd9b1362e97df46425390cd1d5b75f48af243fac352ed4bb939b37b097ba5bf92f669dfbd22131e13e6546bb1f42d56fe390ac92f5d7d2fbd5e920c2f6cf1f6156073dba2dae66d4e6cf08d4b35aaf098ce1b761110889db6b42af4a605e05b8a462ae3b675d53fa31a7e2adc8cdc3239ab6813b8bf23e4c285071f573b32a7123c36350262d96e151262ff1b24a9ac23a460fc438e5bc6a35b99deb41744c28ec337f0ea4b4c83396f76d13cce438e525912311310fe03584e5e607f47098a73704ef66727d9e92b78aeda4d213b432fae881d4d4762e772fba4684f0e241a2f8c8415a88e426282c5741716883beedf2720d3709da144e041126e3d4ce83d2226a891df38ff67ca61b6024fd public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8de6c726fa6ab0b6045a250dc1f21a39feff74e2 15e76517b5954de7b39f2b0e083938cd39bf14b0 3610cc29006fa940f54496d2582651fafd55918b d1d2c7c7e97bc43656dae5bb4e170acac8efdc97 bb5c2314601ed4488c9322570458349478e63e44 e65bffaf5ce1460084541f7c6c093f0c7a28ed26 433d9ff69754e805e46adc761fb21099836dbefe d6552b63ab0e4bc9b8382e667fb47fe030e5344c 42680614133ebe3cb47bf20fb1ec9850c2dbeeb8 70e851ce9f1a758d0044c748e36873f6df4c9f1e dde6c0205e2fb37705b6f4d691333e6d072723bc c87b5e7ed05a2884c4da2711de984faf0a7663c1 871eaae241a3566af82eb323b581eb1f05641f9b dc0e456135ad32e56cec93d99451be997825f7c3 044ebc1c77a7dd92a04f5e9b55c5e2621fe9d3e9 15b6eba762c02adf2d06ac248b8a8feb4bfa40ac e270483d6994540b3999b1deed8ab23fbe272287 3fff1996b222c342c99a5e8b50922e8b4e236510 ab0c23c56e834646140a6b502cdfde8679ce9641 900f2b24 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d5:1e:4c:6a:b0:05:da:9a:60:09:3c:64:00:cc:22:5a:17:db:be:43] modulus: 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 public exponent: 10001 ] 2022-04-28 07:54:43.911  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-28 07:54:43.913 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-28 07:54:43.914 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-28 07:54:43.915 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-28 07:54:43.915  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-28 07:54:43.916  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-28 07:54:43.916  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-28 07:54:43.916 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-28 07:54:43.916 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-28 07:54:43.917 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-28 07:54:43.922 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-28 07:54:43.922 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 07:54:43.923 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 07:54:43.923 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-28 07:54:44.388  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-28 07:54:44.388  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-28 07:54:44.389 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-28 07:54:44.389 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-28 07:54:44.390  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-28 07:54:44.390  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-28 07:54:44.391 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 07:54:44.391 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 07:54:44.391 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 07:54:44.392 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 07:54:44.392 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 07:54:44.392 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 07:54:44.393 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 07:54:44.393 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 07:54:44.393 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 07:54:44.394 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-28 07:54:44.398 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 163330103288001217920201553715399510928059212224 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 28 05:26:20 UTC 2022 Final Date: Tue Apr 27 05:26:19 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a7:e0:dc:c0:36:d0:f4:5a:35:9f:f1:92:1f:57:c7:1d:fd:d4:4c:d1] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8de6c726fa6ab0b6045a250dc1f21a39feff74e2 15e76517b5954de7b39f2b0e083938cd39bf14b0 3610cc29006fa940f54496d2582651fafd55918b d1d2c7c7e97bc43656dae5bb4e170acac8efdc97 bb5c2314601ed4488c9322570458349478e63e44 e65bffaf5ce1460084541f7c6c093f0c7a28ed26 433d9ff69754e805e46adc761fb21099836dbefe d6552b63ab0e4bc9b8382e667fb47fe030e5344c 42680614133ebe3cb47bf20fb1ec9850c2dbeeb8 70e851ce9f1a758d0044c748e36873f6df4c9f1e dde6c0205e2fb37705b6f4d691333e6d072723bc c87b5e7ed05a2884c4da2711de984faf0a7663c1 871eaae241a3566af82eb323b581eb1f05641f9b dc0e456135ad32e56cec93d99451be997825f7c3 044ebc1c77a7dd92a04f5e9b55c5e2621fe9d3e9 15b6eba762c02adf2d06ac248b8a8feb4bfa40ac e270483d6994540b3999b1deed8ab23fbe272287 3fff1996b222c342c99a5e8b50922e8b4e236510 ab0c23c56e834646140a6b502cdfde8679ce9641 900f2b24 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [dd:8d:dd:bb:5b:27:32:ff:f3:1e:7d:95:dd:3d:52:59:c8:5d:80:e7] modulus: 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 public exponent: 10001 ] 2022-04-28 07:58:47.249  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-28 07:58:47.252 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-28 07:58:47.256 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-28 07:58:47.257 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-28 07:58:47.258  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-28 07:58:47.259  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-28 07:58:47.260  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-28 07:58:47.260 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-28 07:58:47.261 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-28 07:58:47.262 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-28 07:58:47.271 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-28 07:58:47.272 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 07:58:47.273 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 07:58:47.273 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-28 07:58:47.620  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-28 07:58:47.621  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-28 07:58:47.621 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-28 07:58:47.622 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-28 07:58:47.623  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-28 07:58:47.624  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-28 07:58:47.624 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 07:58:47.624 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 07:58:47.625 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 07:58:47.626 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 07:58:47.626 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 07:58:47.626 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 07:58:47.627 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 07:58:47.627 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 07:58:47.627 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 07:58:47.628 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-28 07:58:47.632 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 163330103288001217920201553715399510928059212224 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 28 05:26:20 UTC 2022 Final Date: Tue Apr 27 05:26:19 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a7:e0:dc:c0:36:d0:f4:5a:35:9f:f1:92:1f:57:c7:1d:fd:d4:4c:d1] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8de6c726fa6ab0b6045a250dc1f21a39feff74e2 15e76517b5954de7b39f2b0e083938cd39bf14b0 3610cc29006fa940f54496d2582651fafd55918b d1d2c7c7e97bc43656dae5bb4e170acac8efdc97 bb5c2314601ed4488c9322570458349478e63e44 e65bffaf5ce1460084541f7c6c093f0c7a28ed26 433d9ff69754e805e46adc761fb21099836dbefe d6552b63ab0e4bc9b8382e667fb47fe030e5344c 42680614133ebe3cb47bf20fb1ec9850c2dbeeb8 70e851ce9f1a758d0044c748e36873f6df4c9f1e dde6c0205e2fb37705b6f4d691333e6d072723bc c87b5e7ed05a2884c4da2711de984faf0a7663c1 871eaae241a3566af82eb323b581eb1f05641f9b dc0e456135ad32e56cec93d99451be997825f7c3 044ebc1c77a7dd92a04f5e9b55c5e2621fe9d3e9 15b6eba762c02adf2d06ac248b8a8feb4bfa40ac e270483d6994540b3999b1deed8ab23fbe272287 3fff1996b222c342c99a5e8b50922e8b4e236510 ab0c23c56e834646140a6b502cdfde8679ce9641 900f2b24 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [fa:58:96:81:91:6d:71:e4:0e:04:39:b9:e8:f8:52:5b:b0:20:97:b1] modulus: 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 public exponent: 10001 ] 2022-04-28 08:04:52.297  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-28 08:04:52.299 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-28 08:04:52.300 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-28 08:04:52.300 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-28 08:04:52.301  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-28 08:04:52.301  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-28 08:04:52.302  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-28 08:04:52.302 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-28 08:04:52.302 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-28 08:04:52.303 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-28 08:04:52.307 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-28 08:04:52.308 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 08:04:52.309 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 08:04:52.309 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-28 08:04:52.643  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-28 08:04:52.644  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-28 08:04:52.644 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-28 08:04:52.645 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-28 08:04:52.646  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-28 08:04:52.647  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-28 08:04:52.647 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 08:04:52.648 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 08:04:52.648 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 08:04:52.649 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 08:04:52.650 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 08:04:52.650 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 08:04:52.651 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 08:04:52.651 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 08:04:52.651 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 08:04:52.652 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-28 08:04:52.657 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 163330103288001217920201553715399510928059212224 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 28 05:26:20 UTC 2022 Final Date: Tue Apr 27 05:26:19 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a7:e0:dc:c0:36:d0:f4:5a:35:9f:f1:92:1f:57:c7:1d:fd:d4:4c:d1] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8de6c726fa6ab0b6045a250dc1f21a39feff74e2 15e76517b5954de7b39f2b0e083938cd39bf14b0 3610cc29006fa940f54496d2582651fafd55918b d1d2c7c7e97bc43656dae5bb4e170acac8efdc97 bb5c2314601ed4488c9322570458349478e63e44 e65bffaf5ce1460084541f7c6c093f0c7a28ed26 433d9ff69754e805e46adc761fb21099836dbefe d6552b63ab0e4bc9b8382e667fb47fe030e5344c 42680614133ebe3cb47bf20fb1ec9850c2dbeeb8 70e851ce9f1a758d0044c748e36873f6df4c9f1e dde6c0205e2fb37705b6f4d691333e6d072723bc c87b5e7ed05a2884c4da2711de984faf0a7663c1 871eaae241a3566af82eb323b581eb1f05641f9b dc0e456135ad32e56cec93d99451be997825f7c3 044ebc1c77a7dd92a04f5e9b55c5e2621fe9d3e9 15b6eba762c02adf2d06ac248b8a8feb4bfa40ac e270483d6994540b3999b1deed8ab23fbe272287 3fff1996b222c342c99a5e8b50922e8b4e236510 ab0c23c56e834646140a6b502cdfde8679ce9641 900f2b24 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8f:97:a2:7e:ae:74:e8:84:3b:63:3e:d7:bb:b0:1d:b0:44:08:ed:6c] modulus: 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 public exponent: 10001 ] 2022-04-28 08:10:04.854  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-28 08:10:04.860 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-28 08:10:04.864 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-28 08:10:04.865 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-28 08:10:04.865  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-28 08:10:04.866  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-28 08:10:04.866  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-28 08:10:04.866 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-28 08:10:04.867 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-28 08:10:04.867 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-28 08:10:04.874 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-28 08:10:04.876 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 08:10:04.876 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 08:10:04.876 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-28 08:10:05.213  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-28 08:10:05.214  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-28 08:10:05.214 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-28 08:10:05.214 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-28 08:10:05.217  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-28 08:10:05.217  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-28 08:10:05.218 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 08:10:05.218 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 08:10:05.218 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 08:10:05.219 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 08:10:05.219 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 08:10:05.220 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 08:10:05.221 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 08:10:05.221 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 08:10:05.221 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 08:10:05.223 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-28 08:10:05.229 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 163330103288001217920201553715399510928059212224 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 28 05:26:20 UTC 2022 Final Date: Tue Apr 27 05:26:19 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a7:e0:dc:c0:36:d0:f4:5a:35:9f:f1:92:1f:57:c7:1d:fd:d4:4c:d1] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8de6c726fa6ab0b6045a250dc1f21a39feff74e2 15e76517b5954de7b39f2b0e083938cd39bf14b0 3610cc29006fa940f54496d2582651fafd55918b d1d2c7c7e97bc43656dae5bb4e170acac8efdc97 bb5c2314601ed4488c9322570458349478e63e44 e65bffaf5ce1460084541f7c6c093f0c7a28ed26 433d9ff69754e805e46adc761fb21099836dbefe d6552b63ab0e4bc9b8382e667fb47fe030e5344c 42680614133ebe3cb47bf20fb1ec9850c2dbeeb8 70e851ce9f1a758d0044c748e36873f6df4c9f1e dde6c0205e2fb37705b6f4d691333e6d072723bc c87b5e7ed05a2884c4da2711de984faf0a7663c1 871eaae241a3566af82eb323b581eb1f05641f9b dc0e456135ad32e56cec93d99451be997825f7c3 044ebc1c77a7dd92a04f5e9b55c5e2621fe9d3e9 15b6eba762c02adf2d06ac248b8a8feb4bfa40ac e270483d6994540b3999b1deed8ab23fbe272287 3fff1996b222c342c99a5e8b50922e8b4e236510 ab0c23c56e834646140a6b502cdfde8679ce9641 900f2b24 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [22:23:8d:c9:bb:f3:5b:d5:62:27:3c:97:a6:23:5f:60:f9:26:82:de] modulus: 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 public exponent: 10001 ] 2022-04-28 08:13:37.690  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-28 08:13:37.691 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-28 08:13:37.692 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-28 08:13:37.692 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-28 08:13:37.693  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-28 08:13:37.693  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-28 08:13:37.694  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-28 08:13:37.694 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-28 08:13:37.694 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-28 08:13:37.694 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-28 08:13:37.699 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-28 08:13:37.699 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 08:13:37.699 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 08:13:37.700 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-28 08:13:38.426  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-28 08:13:38.427  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-28 08:13:38.427 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-28 08:13:38.428 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-28 08:13:38.436  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-28 08:13:38.436  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-28 08:13:38.437 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 08:13:38.437 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 08:13:38.437 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 08:13:38.438 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 08:13:38.438 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 08:13:38.438 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 08:13:38.439 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 08:13:38.439 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 08:13:38.439 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 08:13:38.440 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-28 08:13:38.443 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 163330103288001217920201553715399510928059212224 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 28 05:26:20 UTC 2022 Final Date: Tue Apr 27 05:26:19 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a7:e0:dc:c0:36:d0:f4:5a:35:9f:f1:92:1f:57:c7:1d:fd:d4:4c:d1] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8de6c726fa6ab0b6045a250dc1f21a39feff74e2 15e76517b5954de7b39f2b0e083938cd39bf14b0 3610cc29006fa940f54496d2582651fafd55918b d1d2c7c7e97bc43656dae5bb4e170acac8efdc97 bb5c2314601ed4488c9322570458349478e63e44 e65bffaf5ce1460084541f7c6c093f0c7a28ed26 433d9ff69754e805e46adc761fb21099836dbefe d6552b63ab0e4bc9b8382e667fb47fe030e5344c 42680614133ebe3cb47bf20fb1ec9850c2dbeeb8 70e851ce9f1a758d0044c748e36873f6df4c9f1e dde6c0205e2fb37705b6f4d691333e6d072723bc c87b5e7ed05a2884c4da2711de984faf0a7663c1 871eaae241a3566af82eb323b581eb1f05641f9b dc0e456135ad32e56cec93d99451be997825f7c3 044ebc1c77a7dd92a04f5e9b55c5e2621fe9d3e9 15b6eba762c02adf2d06ac248b8a8feb4bfa40ac e270483d6994540b3999b1deed8ab23fbe272287 3fff1996b222c342c99a5e8b50922e8b4e236510 ab0c23c56e834646140a6b502cdfde8679ce9641 900f2b24 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a6:0c:b9:a2:a3:d4:1f:47:c2:01:3a:98:1a:ee:80:27:07:0f:47:00] modulus: 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 public exponent: 10001 ] 2022-04-28 08:18:33.206  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-28 08:18:33.208 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-28 08:18:33.216 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-28 08:18:33.217 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-28 08:18:33.218  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-28 08:18:33.218  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-28 08:18:33.219  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-28 08:18:33.219 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-28 08:18:33.220 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-28 08:18:33.220 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-28 08:18:33.228 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-28 08:18:33.230 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 08:18:33.230 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 08:18:33.230 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-28 08:18:33.554  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-28 08:18:33.555  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-28 08:18:33.555 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-28 08:18:33.555 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-28 08:18:33.557  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-28 08:18:33.558  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-28 08:18:33.559 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 08:18:33.559 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 08:18:33.559 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 08:18:33.560 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 08:18:33.560 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 08:18:33.561 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 08:18:33.562 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 08:18:33.562 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 08:18:33.562 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 08:18:33.563 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-28 08:18:33.567 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 163330103288001217920201553715399510928059212224 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 28 05:26:20 UTC 2022 Final Date: Tue Apr 27 05:26:19 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a7:e0:dc:c0:36:d0:f4:5a:35:9f:f1:92:1f:57:c7:1d:fd:d4:4c:d1] modulus: e0d93c8ca065a6a477d612df304ea35c72d7a462cba6fa47038f19855b3632852c164a821edea97328859a09b0b2eadc51dd836cdcf15402f36850493f0afb01ed3505e487358a7c69eacfd316b616ca44a6869e5e8221ae4f644cdd7f8f00831335d8f132b56072cfaf0a391592db0d6e17d9dd9b1362e97df46425390cd1d5b75f48af243fac352ed4bb939b37b097ba5bf92f669dfbd22131e13e6546bb1f42d56fe390ac92f5d7d2fbd5e920c2f6cf1f6156073dba2dae66d4e6cf08d4b35aaf098ce1b761110889db6b42af4a605e05b8a462ae3b675d53fa31a7e2adc8cdc3239ab6813b8bf23e4c285071f573b32a7123c36350262d96e151262ff1b24a9ac23a460fc438e5bc6a35b99deb41744c28ec337f0ea4b4c83396f76d13cce438e525912311310fe03584e5e607f47098a73704ef66727d9e92b78aeda4d213b432fae881d4d4762e772fba4684f0e241a2f8c8415a88e426282c5741716883beedf2720d3709da144e041126e3d4ce83d2226a891df38ff67ca61b6024fd public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8de6c726fa6ab0b6045a250dc1f21a39feff74e2 15e76517b5954de7b39f2b0e083938cd39bf14b0 3610cc29006fa940f54496d2582651fafd55918b d1d2c7c7e97bc43656dae5bb4e170acac8efdc97 bb5c2314601ed4488c9322570458349478e63e44 e65bffaf5ce1460084541f7c6c093f0c7a28ed26 433d9ff69754e805e46adc761fb21099836dbefe d6552b63ab0e4bc9b8382e667fb47fe030e5344c 42680614133ebe3cb47bf20fb1ec9850c2dbeeb8 70e851ce9f1a758d0044c748e36873f6df4c9f1e dde6c0205e2fb37705b6f4d691333e6d072723bc c87b5e7ed05a2884c4da2711de984faf0a7663c1 871eaae241a3566af82eb323b581eb1f05641f9b dc0e456135ad32e56cec93d99451be997825f7c3 044ebc1c77a7dd92a04f5e9b55c5e2621fe9d3e9 15b6eba762c02adf2d06ac248b8a8feb4bfa40ac e270483d6994540b3999b1deed8ab23fbe272287 3fff1996b222c342c99a5e8b50922e8b4e236510 ab0c23c56e834646140a6b502cdfde8679ce9641 900f2b24 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5f:a1:af:5b:9d:12:65:ec:ee:86:64:bc:c7:00:dc:5b:e4:76:37:f5] modulus: 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 public exponent: 10001 ] 2022-04-28 08:22:36.437  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-28 08:22:36.439 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-28 08:22:36.441 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-28 08:22:36.442 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-28 08:22:36.443  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-28 08:22:36.443  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-28 08:22:36.444  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-28 08:22:36.444 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-28 08:22:36.445 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-28 08:22:36.445 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-28 08:22:36.450 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-28 08:22:36.452 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 08:22:36.452 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 08:22:36.453 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-28 08:22:36.796  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-28 08:22:36.797  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-28 08:22:36.797 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-28 08:22:36.797 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-28 08:22:36.799  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-28 08:22:36.799  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-28 08:22:36.800 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 08:22:36.800 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 08:22:36.800 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 08:22:36.801 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 08:22:36.801 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 08:22:36.802 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 08:22:36.802 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 08:22:36.803 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 08:22:36.803 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 08:22:36.804 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-28 08:22:36.807 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 163330103288001217920201553715399510928059212224 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 28 05:26:20 UTC 2022 Final Date: Tue Apr 27 05:26:19 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a7:e0:dc:c0:36:d0:f4:5a:35:9f:f1:92:1f:57:c7:1d:fd:d4:4c:d1] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8de6c726fa6ab0b6045a250dc1f21a39feff74e2 15e76517b5954de7b39f2b0e083938cd39bf14b0 3610cc29006fa940f54496d2582651fafd55918b d1d2c7c7e97bc43656dae5bb4e170acac8efdc97 bb5c2314601ed4488c9322570458349478e63e44 e65bffaf5ce1460084541f7c6c093f0c7a28ed26 433d9ff69754e805e46adc761fb21099836dbefe d6552b63ab0e4bc9b8382e667fb47fe030e5344c 42680614133ebe3cb47bf20fb1ec9850c2dbeeb8 70e851ce9f1a758d0044c748e36873f6df4c9f1e dde6c0205e2fb37705b6f4d691333e6d072723bc c87b5e7ed05a2884c4da2711de984faf0a7663c1 871eaae241a3566af82eb323b581eb1f05641f9b dc0e456135ad32e56cec93d99451be997825f7c3 044ebc1c77a7dd92a04f5e9b55c5e2621fe9d3e9 15b6eba762c02adf2d06ac248b8a8feb4bfa40ac e270483d6994540b3999b1deed8ab23fbe272287 3fff1996b222c342c99a5e8b50922e8b4e236510 ab0c23c56e834646140a6b502cdfde8679ce9641 900f2b24 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [14:dd:34:a6:53:18:06:7f:50:50:7d:89:22:4b:f4:89:55:7a:b7:c9] modulus: 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 public exponent: 10001 ] 2022-04-28 08:27:19.082  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-28 08:27:19.084 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-28 08:27:19.086 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-28 08:27:19.087 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-28 08:27:19.088  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-28 08:27:19.088  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-28 08:27:19.088  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-28 08:27:19.089 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-28 08:27:19.089 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-28 08:27:19.093 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-28 08:27:19.099 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-28 08:27:19.100 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 08:27:19.101 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 08:27:19.101 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-28 08:27:19.544  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-28 08:27:19.545  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-28 08:27:19.546 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-28 08:27:19.546 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-28 08:27:19.548  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-28 08:27:19.549  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-28 08:27:19.550 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 08:27:19.550 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 08:27:19.550 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 08:27:19.552 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 08:27:19.552 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 08:27:19.552 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 08:27:19.553 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 08:27:19.554 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 08:27:19.554 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 08:27:19.555 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-28 08:27:19.559 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 163330103288001217920201553715399510928059212224 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 28 05:26:20 UTC 2022 Final Date: Tue Apr 27 05:26:19 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a7:e0:dc:c0:36:d0:f4:5a:35:9f:f1:92:1f:57:c7:1d:fd:d4:4c:d1] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8de6c726fa6ab0b6045a250dc1f21a39feff74e2 15e76517b5954de7b39f2b0e083938cd39bf14b0 3610cc29006fa940f54496d2582651fafd55918b d1d2c7c7e97bc43656dae5bb4e170acac8efdc97 bb5c2314601ed4488c9322570458349478e63e44 e65bffaf5ce1460084541f7c6c093f0c7a28ed26 433d9ff69754e805e46adc761fb21099836dbefe d6552b63ab0e4bc9b8382e667fb47fe030e5344c 42680614133ebe3cb47bf20fb1ec9850c2dbeeb8 70e851ce9f1a758d0044c748e36873f6df4c9f1e dde6c0205e2fb37705b6f4d691333e6d072723bc c87b5e7ed05a2884c4da2711de984faf0a7663c1 871eaae241a3566af82eb323b581eb1f05641f9b dc0e456135ad32e56cec93d99451be997825f7c3 044ebc1c77a7dd92a04f5e9b55c5e2621fe9d3e9 15b6eba762c02adf2d06ac248b8a8feb4bfa40ac e270483d6994540b3999b1deed8ab23fbe272287 3fff1996b222c342c99a5e8b50922e8b4e236510 ab0c23c56e834646140a6b502cdfde8679ce9641 900f2b24 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ea:14:d2:d2:72:e7:2b:5b:3b:23:2b:4a:52:7d:ea:e1:b0:89:8e:a9] modulus: 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 public exponent: 10001 ] 2022-04-28 08:33:23.707  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-28 08:33:23.711 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-28 08:33:23.715 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-28 08:33:23.716 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-28 08:33:23.717  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-28 08:33:23.718  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-28 08:33:23.719  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-28 08:33:23.720 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-28 08:33:23.720 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-28 08:33:23.721 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-28 08:33:23.729 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-28 08:33:23.731 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 08:33:23.731 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 08:33:23.732 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-28 08:33:23.954  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-28 08:33:23.954  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-28 08:33:23.955 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-28 08:33:23.955 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-28 08:33:23.957  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-28 08:33:23.957  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-28 08:33:23.957 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 08:33:23.958 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 08:33:23.958 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 08:33:23.959 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 08:33:23.959 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 08:33:23.959 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 08:33:23.960 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 08:33:23.960 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 08:33:23.961 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 08:33:23.962 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-28 08:33:23.967 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 163330103288001217920201553715399510928059212224 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 28 05:26:20 UTC 2022 Final Date: Tue Apr 27 05:26:19 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a7:e0:dc:c0:36:d0:f4:5a:35:9f:f1:92:1f:57:c7:1d:fd:d4:4c:d1] modulus: e0d93c8ca065a6a477d612df304ea35c72d7a462cba6fa47038f19855b3632852c164a821edea97328859a09b0b2eadc51dd836cdcf15402f36850493f0afb01ed3505e487358a7c69eacfd316b616ca44a6869e5e8221ae4f644cdd7f8f00831335d8f132b56072cfaf0a391592db0d6e17d9dd9b1362e97df46425390cd1d5b75f48af243fac352ed4bb939b37b097ba5bf92f669dfbd22131e13e6546bb1f42d56fe390ac92f5d7d2fbd5e920c2f6cf1f6156073dba2dae66d4e6cf08d4b35aaf098ce1b761110889db6b42af4a605e05b8a462ae3b675d53fa31a7e2adc8cdc3239ab6813b8bf23e4c285071f573b32a7123c36350262d96e151262ff1b24a9ac23a460fc438e5bc6a35b99deb41744c28ec337f0ea4b4c83396f76d13cce438e525912311310fe03584e5e607f47098a73704ef66727d9e92b78aeda4d213b432fae881d4d4762e772fba4684f0e241a2f8c8415a88e426282c5741716883beedf2720d3709da144e041126e3d4ce83d2226a891df38ff67ca61b6024fd public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8de6c726fa6ab0b6045a250dc1f21a39feff74e2 15e76517b5954de7b39f2b0e083938cd39bf14b0 3610cc29006fa940f54496d2582651fafd55918b d1d2c7c7e97bc43656dae5bb4e170acac8efdc97 bb5c2314601ed4488c9322570458349478e63e44 e65bffaf5ce1460084541f7c6c093f0c7a28ed26 433d9ff69754e805e46adc761fb21099836dbefe d6552b63ab0e4bc9b8382e667fb47fe030e5344c 42680614133ebe3cb47bf20fb1ec9850c2dbeeb8 70e851ce9f1a758d0044c748e36873f6df4c9f1e dde6c0205e2fb37705b6f4d691333e6d072723bc c87b5e7ed05a2884c4da2711de984faf0a7663c1 871eaae241a3566af82eb323b581eb1f05641f9b dc0e456135ad32e56cec93d99451be997825f7c3 044ebc1c77a7dd92a04f5e9b55c5e2621fe9d3e9 15b6eba762c02adf2d06ac248b8a8feb4bfa40ac e270483d6994540b3999b1deed8ab23fbe272287 3fff1996b222c342c99a5e8b50922e8b4e236510 ab0c23c56e834646140a6b502cdfde8679ce9641 900f2b24 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [fe:d0:13:c0:1f:64:a6:15:bc:88:68:fb:e5:db:e2:f2:1a:87:69:69] modulus: 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 public exponent: 10001 ] 2022-04-28 08:38:04.592  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-28 08:38:04.594 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-28 08:38:04.596 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-28 08:38:04.597 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-28 08:38:04.598  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-28 08:38:04.598  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-28 08:38:04.599  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-28 08:38:04.599 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-28 08:38:04.599 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-28 08:38:04.600 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-28 08:38:04.605 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-28 08:38:04.606 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 08:38:04.606 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 08:38:04.607 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-28 08:38:04.926  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-28 08:38:04.927  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-28 08:38:04.927 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-28 08:38:04.927 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-28 08:38:04.929  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-28 08:38:04.929  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-28 08:38:04.929 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 08:38:04.930 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 08:38:04.930 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 08:38:04.931 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 08:38:04.931 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 08:38:04.931 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 08:38:04.932 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 08:38:04.932 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 08:38:04.932 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 08:38:04.933 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-28 08:38:04.936 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 163330103288001217920201553715399510928059212224 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 28 05:26:20 UTC 2022 Final Date: Tue Apr 27 05:26:19 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a7:e0:dc:c0:36:d0:f4:5a:35:9f:f1:92:1f:57:c7:1d:fd:d4:4c:d1] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8de6c726fa6ab0b6045a250dc1f21a39feff74e2 15e76517b5954de7b39f2b0e083938cd39bf14b0 3610cc29006fa940f54496d2582651fafd55918b d1d2c7c7e97bc43656dae5bb4e170acac8efdc97 bb5c2314601ed4488c9322570458349478e63e44 e65bffaf5ce1460084541f7c6c093f0c7a28ed26 433d9ff69754e805e46adc761fb21099836dbefe d6552b63ab0e4bc9b8382e667fb47fe030e5344c 42680614133ebe3cb47bf20fb1ec9850c2dbeeb8 70e851ce9f1a758d0044c748e36873f6df4c9f1e dde6c0205e2fb37705b6f4d691333e6d072723bc c87b5e7ed05a2884c4da2711de984faf0a7663c1 871eaae241a3566af82eb323b581eb1f05641f9b dc0e456135ad32e56cec93d99451be997825f7c3 044ebc1c77a7dd92a04f5e9b55c5e2621fe9d3e9 15b6eba762c02adf2d06ac248b8a8feb4bfa40ac e270483d6994540b3999b1deed8ab23fbe272287 3fff1996b222c342c99a5e8b50922e8b4e236510 ab0c23c56e834646140a6b502cdfde8679ce9641 900f2b24 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [df:0e:82:d6:39:be:21:8d:ba:f6:fe:8f:e8:40:57:0a:7b:ef:ab:83] modulus: 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 public exponent: 10001 ] 2022-04-28 08:46:44.657  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-28 08:46:44.659 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-28 08:46:44.661 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-28 08:46:44.662 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-28 08:46:44.662  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-28 08:46:44.663  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-28 08:46:44.663  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-28 08:46:44.663 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-28 08:46:44.664 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-28 08:46:44.664 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-28 08:46:44.669 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-28 08:46:44.670 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 08:46:44.670 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 08:46:44.670 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-28 08:46:44.944  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-28 08:46:44.945  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-28 08:46:44.945 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-28 08:46:44.945 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-28 08:46:44.947  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-28 08:46:44.947  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-28 08:46:44.948 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 08:46:44.948 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 08:46:44.948 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 08:46:44.949 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 08:46:44.949 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 08:46:44.950 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 08:46:44.950 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 08:46:44.951 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 08:46:44.951 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 08:46:44.952 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-28 08:46:44.956 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 163330103288001217920201553715399510928059212224 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 28 05:26:20 UTC 2022 Final Date: Tue Apr 27 05:26:19 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a7:e0:dc:c0:36:d0:f4:5a:35:9f:f1:92:1f:57:c7:1d:fd:d4:4c:d1] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8de6c726fa6ab0b6045a250dc1f21a39feff74e2 15e76517b5954de7b39f2b0e083938cd39bf14b0 3610cc29006fa940f54496d2582651fafd55918b d1d2c7c7e97bc43656dae5bb4e170acac8efdc97 bb5c2314601ed4488c9322570458349478e63e44 e65bffaf5ce1460084541f7c6c093f0c7a28ed26 433d9ff69754e805e46adc761fb21099836dbefe d6552b63ab0e4bc9b8382e667fb47fe030e5344c 42680614133ebe3cb47bf20fb1ec9850c2dbeeb8 70e851ce9f1a758d0044c748e36873f6df4c9f1e dde6c0205e2fb37705b6f4d691333e6d072723bc c87b5e7ed05a2884c4da2711de984faf0a7663c1 871eaae241a3566af82eb323b581eb1f05641f9b dc0e456135ad32e56cec93d99451be997825f7c3 044ebc1c77a7dd92a04f5e9b55c5e2621fe9d3e9 15b6eba762c02adf2d06ac248b8a8feb4bfa40ac e270483d6994540b3999b1deed8ab23fbe272287 3fff1996b222c342c99a5e8b50922e8b4e236510 ab0c23c56e834646140a6b502cdfde8679ce9641 900f2b24 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1d:8c:d6:c8:72:54:f4:a0:e8:2b:44:b6:b2:40:b5:82:aa:41:22:cb] modulus: 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 public exponent: 10001 ] 2022-04-28 08:51:15.435  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-28 08:51:15.436 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-28 08:51:15.438 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-28 08:51:15.439 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-28 08:51:15.439  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-28 08:51:15.440  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-28 08:51:15.440  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-28 08:51:15.440 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-28 08:51:15.441 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-28 08:51:15.441 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-28 08:51:15.449 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-28 08:51:15.450 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 08:51:15.450 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 08:51:15.451 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-28 08:51:15.786  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-28 08:51:15.786  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-28 08:51:15.786 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-28 08:51:15.787 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-28 08:51:15.788  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-28 08:51:15.788  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-28 08:51:15.788 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 08:51:15.789 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 08:51:15.789 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 08:51:15.789 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 08:51:15.789 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 08:51:15.790 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 08:51:15.790 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 08:51:15.790 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 08:51:15.791 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 08:51:15.791 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-28 08:51:15.794 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 163330103288001217920201553715399510928059212224 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 28 05:26:20 UTC 2022 Final Date: Tue Apr 27 05:26:19 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a7:e0:dc:c0:36:d0:f4:5a:35:9f:f1:92:1f:57:c7:1d:fd:d4:4c:d1] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8de6c726fa6ab0b6045a250dc1f21a39feff74e2 15e76517b5954de7b39f2b0e083938cd39bf14b0 3610cc29006fa940f54496d2582651fafd55918b d1d2c7c7e97bc43656dae5bb4e170acac8efdc97 bb5c2314601ed4488c9322570458349478e63e44 e65bffaf5ce1460084541f7c6c093f0c7a28ed26 433d9ff69754e805e46adc761fb21099836dbefe d6552b63ab0e4bc9b8382e667fb47fe030e5344c 42680614133ebe3cb47bf20fb1ec9850c2dbeeb8 70e851ce9f1a758d0044c748e36873f6df4c9f1e dde6c0205e2fb37705b6f4d691333e6d072723bc c87b5e7ed05a2884c4da2711de984faf0a7663c1 871eaae241a3566af82eb323b581eb1f05641f9b dc0e456135ad32e56cec93d99451be997825f7c3 044ebc1c77a7dd92a04f5e9b55c5e2621fe9d3e9 15b6eba762c02adf2d06ac248b8a8feb4bfa40ac e270483d6994540b3999b1deed8ab23fbe272287 3fff1996b222c342c99a5e8b50922e8b4e236510 ab0c23c56e834646140a6b502cdfde8679ce9641 900f2b24 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [af:57:b5:2d:17:e9:9e:2b:2b:08:20:dd:1d:39:28:0b:62:43:ef:2f] modulus: d8f3f7b05be4a28ceb8f08f0e0cf98d39f64eb561f75ce5b7e3e80d5a18972d0637da9519f68738fef286679a583949df7b0e9dbb06ac66a3c3c1f354ca066b719829c6e0b38604362300f33eb843af7ca13e9f9d3521193a76ed3e176b2e5294208522fd9d19107611eed71faff09a1ea2d33c5514c83d5467d1a401c42d02d6495535cc1e68aa2df7de6e660ba7b4a3c5f244876b18ba26ea13369764637918f372e204ef8eaf2856a3acbbdd0ef20aa689e7a30b1f7c76741ba86a7d087096577152e7ca8c6818ae71a742fe10e9215fc22ac466efe94b557db56c588610d510a7c392298abc025e6d51735d2c601a4b919d007d0cc7e17eb3938625caf1b public exponent: 10001 ] 2022-04-28 09:00:33.758  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-28 09:00:33.760 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-28 09:00:33.763 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-28 09:00:33.763 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-28 09:00:33.764  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-28 09:00:33.764  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-28 09:00:33.765  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-28 09:00:33.765 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-28 09:00:33.765 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-28 09:00:33.766 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-28 09:00:33.772 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-28 09:00:33.773 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 09:00:33.773 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 09:00:33.773 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-28 09:00:34.078  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-28 09:00:34.079  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-28 09:00:34.080 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-28 09:00:34.080 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-28 09:00:34.081  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-28 09:00:34.082  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-28 09:00:34.082 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 09:00:34.082 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 09:00:34.083 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 09:00:34.083 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 09:00:34.084 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 09:00:34.084 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 09:00:34.085 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 09:00:34.085 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 09:00:34.085 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 09:00:34.086 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-28 09:00:34.089 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 163330103288001217920201553715399510928059212224 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 28 05:26:20 UTC 2022 Final Date: Tue Apr 27 05:26:19 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a7:e0:dc:c0:36:d0:f4:5a:35:9f:f1:92:1f:57:c7:1d:fd:d4:4c:d1] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8de6c726fa6ab0b6045a250dc1f21a39feff74e2 15e76517b5954de7b39f2b0e083938cd39bf14b0 3610cc29006fa940f54496d2582651fafd55918b d1d2c7c7e97bc43656dae5bb4e170acac8efdc97 bb5c2314601ed4488c9322570458349478e63e44 e65bffaf5ce1460084541f7c6c093f0c7a28ed26 433d9ff69754e805e46adc761fb21099836dbefe d6552b63ab0e4bc9b8382e667fb47fe030e5344c 42680614133ebe3cb47bf20fb1ec9850c2dbeeb8 70e851ce9f1a758d0044c748e36873f6df4c9f1e dde6c0205e2fb37705b6f4d691333e6d072723bc c87b5e7ed05a2884c4da2711de984faf0a7663c1 871eaae241a3566af82eb323b581eb1f05641f9b dc0e456135ad32e56cec93d99451be997825f7c3 044ebc1c77a7dd92a04f5e9b55c5e2621fe9d3e9 15b6eba762c02adf2d06ac248b8a8feb4bfa40ac e270483d6994540b3999b1deed8ab23fbe272287 3fff1996b222c342c99a5e8b50922e8b4e236510 ab0c23c56e834646140a6b502cdfde8679ce9641 900f2b24 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9a:a9:56:7e:ac:5a:52:d4:cf:95:b6:c8:4f:54:83:e6:8b:47:64:5d] modulus: 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 public exponent: 10001 ]