2022-05-07 04:51:21,361 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-05-07 04:51:21,852 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-05-07 04:51:22.359  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default May 07, 2022 4:51:23 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] May 07, 2022 4:51:23 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] May 07, 2022 4:51:23 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] May 07, 2022 4:51:23 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-05-07 04:51:23.765 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-05-07 04:51:23.922  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-05-07 04:51:24.008  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-05-07 04:51:24.393 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-05-07 04:51:24.394 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-05-07 04:51:24.395 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-05-07 04:51:24.397 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-05-07 04:51:24.419 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-05-07 04:51:24.421 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-05-07 04:51:24.488 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-05-07 04:51:24.850 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} May 07, 2022 4:51:25 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-05-07 04:51:25.410  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 4.483 seconds (JVM running for 5.372) May 07, 2022 4:51:50 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-05-07 04:52:08.673  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-07 04:52:08.679 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-07 04:52:08.704 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-05-07 04:52:08.707 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-07 04:52:08.716  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-05-07 04:52:08.718  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-07 04:52:08.718  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-07 04:52:08.719 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-07 04:52:08.719 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-07 04:52:08.721 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-07 04:52:08.724 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-07 04:52:08.726 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-07 04:52:08.748 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-07 04:52:08.753 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-07 04:52:08.754 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-07 04:52:08.758 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-07 04:52:09.169  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-07 04:52:09.171  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-07 04:52:09.171 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-07 04:52:09.172 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-07 04:52:09.177  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-07 04:52:09.178  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-07 04:52:09.179 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-07 04:52:09.179 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-07 04:52:09.179 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-07 04:52:09.186 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-07 04:52:09.186 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-07 04:52:09.186 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-07 04:52:09.190 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-07 04:52:09.190 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-07 04:52:09.190 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-07 04:52:09.191 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-07 04:52:09.209 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 296694432726261615730754449037751750651018524822 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 07 04:49:29 UTC 2022 Final Date: Thu May 06 04:49:28 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a7:6c:24:5b:1c:48:c6:99:d7:0b:a9:c1:36:18:57:35:0c:9b:eb:79] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a36caf96e859bb65a67b0c56eb6a638682c5400b d5bc7473b646722422c389a3d8f304b97e356c6f cbbcb04e3c703a2f49d3472f541aa6e6d8444028 f03e53822a8fef6b9e76a88053b49af3510038ae 3285630c541cd9565e612efda516f3ae2d0ad901 a2fca7da4acb99f29abf0fdde81508ca6cb2b6cd 8cf8ae1dbc93f81a7225a1de8f1b46d75bc1b7f5 f70397119249eeded74df75fceb3b3f4806d7d51 bb750b86b269dcb445f1117ca62663f3ff157cd1 abc9922b7d9457d239670e9bc28dd3ca48fcbbb3 dc646a1e42c01949ad261293aff373d7fc61574e 8e72f2a544cf5daef4b99fce78fd7ff40c95de86 780449b05aaebb416cf62caa5a6c39596f66ee74 4cffd0fa163b3bcf6ad7818ff513b25925f2e9c2 0a4863cffc0af4faf58d8bdbfe494ca7b4f8d9a4 9b5ea0e608691e535a701d3780122cd18aa8e6ab f4c343d20014691608a71ccc46323b7a368931dd cab30558c05540d87d119dd293a5a75066ec36f6 4ca9867b6f997195eaaa95626cdd9bb4431b2482 948ed02f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5f:9e:50:34:75:b0:a7:71:51:45:25:a9:9f:3d:97:b5:3c:df:8a:f0] modulus: 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 public exponent: 10001 ] 2022-05-07 06:45:09.033  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-07 06:45:09.036 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-07 06:45:09.039 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-05-07 06:45:09.039 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-07 06:45:09.040  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-05-07 06:45:09.041  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-07 06:45:09.041  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-07 06:45:09.041 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-07 06:45:09.042 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-07 06:45:09.042 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-07 06:45:09.048 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-07 06:45:09.049 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-07 06:45:09.049 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-07 06:45:09.049 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-07 06:45:09.229  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-07 06:45:09.230  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-07 06:45:09.230 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-07 06:45:09.230 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-07 06:45:09.233  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-07 06:45:09.234  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-07 06:45:09.234 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-07 06:45:09.235 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-07 06:45:09.235 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-07 06:45:09.236 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-07 06:45:09.237 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-07 06:45:09.237 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-07 06:45:09.237 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-07 06:45:09.238 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-07 06:45:09.238 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-07 06:45:09.239 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-07 06:45:09.243 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 296694432726261615730754449037751750651018524822 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 07 04:49:29 UTC 2022 Final Date: Thu May 06 04:49:28 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a7:6c:24:5b:1c:48:c6:99:d7:0b:a9:c1:36:18:57:35:0c:9b:eb:79] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a36caf96e859bb65a67b0c56eb6a638682c5400b d5bc7473b646722422c389a3d8f304b97e356c6f cbbcb04e3c703a2f49d3472f541aa6e6d8444028 f03e53822a8fef6b9e76a88053b49af3510038ae 3285630c541cd9565e612efda516f3ae2d0ad901 a2fca7da4acb99f29abf0fdde81508ca6cb2b6cd 8cf8ae1dbc93f81a7225a1de8f1b46d75bc1b7f5 f70397119249eeded74df75fceb3b3f4806d7d51 bb750b86b269dcb445f1117ca62663f3ff157cd1 abc9922b7d9457d239670e9bc28dd3ca48fcbbb3 dc646a1e42c01949ad261293aff373d7fc61574e 8e72f2a544cf5daef4b99fce78fd7ff40c95de86 780449b05aaebb416cf62caa5a6c39596f66ee74 4cffd0fa163b3bcf6ad7818ff513b25925f2e9c2 0a4863cffc0af4faf58d8bdbfe494ca7b4f8d9a4 9b5ea0e608691e535a701d3780122cd18aa8e6ab f4c343d20014691608a71ccc46323b7a368931dd cab30558c05540d87d119dd293a5a75066ec36f6 4ca9867b6f997195eaaa95626cdd9bb4431b2482 948ed02f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3c:8c:fa:8f:39:27:bb:8c:11:ef:df:81:b0:60:22:2e:84:36:5a:9c] modulus: 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 public exponent: 10001 ] 2022-05-07 06:45:18.467  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-07 06:45:18.468 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-07 06:45:18.470 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-07 06:45:18.470 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-07 06:45:18.470  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-07 06:45:18.471  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-07 06:45:18.471  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-07 06:45:18.471 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-07 06:45:18.471 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-07 06:45:18.472 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-07 06:45:18.485 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-07 06:45:18.486 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-07 06:45:18.486 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-07 06:45:18.488 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-07 06:45:18.592  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-07 06:45:18.592  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-07 06:45:18.593 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-07 06:45:18.594 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-07 06:45:18.597  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-07 06:45:18.599  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-07 06:45:18.599 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-07 06:45:18.600 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-07 06:45:18.600 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-07 06:45:18.602 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-07 06:45:18.603 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-07 06:45:18.605 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-07 06:45:18.606 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-07 06:45:18.606 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-07 06:45:18.606 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-07 06:45:18.608 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-07 06:45:18.614 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 296694432726261615730754449037751750651018524822 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 07 04:49:29 UTC 2022 Final Date: Thu May 06 04:49:28 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a7:6c:24:5b:1c:48:c6:99:d7:0b:a9:c1:36:18:57:35:0c:9b:eb:79] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a36caf96e859bb65a67b0c56eb6a638682c5400b d5bc7473b646722422c389a3d8f304b97e356c6f cbbcb04e3c703a2f49d3472f541aa6e6d8444028 f03e53822a8fef6b9e76a88053b49af3510038ae 3285630c541cd9565e612efda516f3ae2d0ad901 a2fca7da4acb99f29abf0fdde81508ca6cb2b6cd 8cf8ae1dbc93f81a7225a1de8f1b46d75bc1b7f5 f70397119249eeded74df75fceb3b3f4806d7d51 bb750b86b269dcb445f1117ca62663f3ff157cd1 abc9922b7d9457d239670e9bc28dd3ca48fcbbb3 dc646a1e42c01949ad261293aff373d7fc61574e 8e72f2a544cf5daef4b99fce78fd7ff40c95de86 780449b05aaebb416cf62caa5a6c39596f66ee74 4cffd0fa163b3bcf6ad7818ff513b25925f2e9c2 0a4863cffc0af4faf58d8bdbfe494ca7b4f8d9a4 9b5ea0e608691e535a701d3780122cd18aa8e6ab f4c343d20014691608a71ccc46323b7a368931dd cab30558c05540d87d119dd293a5a75066ec36f6 4ca9867b6f997195eaaa95626cdd9bb4431b2482 948ed02f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1c:97:a8:bf:44:f2:8e:01:2f:34:ae:5b:dc:4b:e8:0d:5c:04:a8:1f] modulus: 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 public exponent: 10001 ] 2022-05-07 06:47:04.252  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-07 06:47:04.256 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-07 06:47:04.259 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-05-07 06:47:04.261 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-07 06:47:04.261  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-05-07 06:47:04.262  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-07 06:47:04.262  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-07 06:47:04.262 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-07 06:47:04.262 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-07 06:47:04.263 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-07 06:47:04.267 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-07 06:47:04.267 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-07 06:47:04.267 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-07 06:47:04.268 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-07 06:47:04.409  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-07 06:47:04.411  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-07 06:47:04.411 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-07 06:47:04.412 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-07 06:47:04.414  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-07 06:47:04.415  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-07 06:47:04.415 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-07 06:47:04.416 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-07 06:47:04.416 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-07 06:47:04.417 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-07 06:47:04.417 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-07 06:47:04.418 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-07 06:47:04.419 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-07 06:47:04.419 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-07 06:47:04.419 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-07 06:47:04.420 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-07 06:47:04.425 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 296694432726261615730754449037751750651018524822 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 07 04:49:29 UTC 2022 Final Date: Thu May 06 04:49:28 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a7:6c:24:5b:1c:48:c6:99:d7:0b:a9:c1:36:18:57:35:0c:9b:eb:79] modulus: a39fc1116f14464ff40be506d32a084cf16b5ad84cb0ccfe817639c3a3630bae8800e53b6ff359df8987eb38ac661a30c444e60d8e183a729af8d4ca0f7ae02e5d0b1431f891be04af2b8e954e29956d3b66ade6976f81a4b34722d03ea8a82f7afa1905c36083d7f9affede9af2d42ba6db36b01e50ca6d9f2c68a6fd4d5a604767c99555bcd1d9df2c0eb8a84f38414685a9cbd42db8f13891942cf9e7de0caab7a328702b086c28162f6139388a3b9aa31a91cbee27aa009825b1fe6b58a67efa083c447f6795d258cab60e7950bd7d5219e71fc11b4a9246cecf5ef4e24076bc20a9833f73b20e5f916553f13ab5f26f2529924e9280cd85e8d1023f4d487448619d2f8d5a88b88908c5017aee46323f5027846b04032e067671306455280c8e7ba7e4c0f30f31a54adebe76560169a048c3cc0efb06f6366e056a21c48ed324482ede07e105664720d181d3db9f8954364f9a3e224030d8450d38e643ef4b8930d1d803c5538cceea98ca53dcae1ba746bc15ff6694cc3709df17b85613 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a36caf96e859bb65a67b0c56eb6a638682c5400b d5bc7473b646722422c389a3d8f304b97e356c6f cbbcb04e3c703a2f49d3472f541aa6e6d8444028 f03e53822a8fef6b9e76a88053b49af3510038ae 3285630c541cd9565e612efda516f3ae2d0ad901 a2fca7da4acb99f29abf0fdde81508ca6cb2b6cd 8cf8ae1dbc93f81a7225a1de8f1b46d75bc1b7f5 f70397119249eeded74df75fceb3b3f4806d7d51 bb750b86b269dcb445f1117ca62663f3ff157cd1 abc9922b7d9457d239670e9bc28dd3ca48fcbbb3 dc646a1e42c01949ad261293aff373d7fc61574e 8e72f2a544cf5daef4b99fce78fd7ff40c95de86 780449b05aaebb416cf62caa5a6c39596f66ee74 4cffd0fa163b3bcf6ad7818ff513b25925f2e9c2 0a4863cffc0af4faf58d8bdbfe494ca7b4f8d9a4 9b5ea0e608691e535a701d3780122cd18aa8e6ab f4c343d20014691608a71ccc46323b7a368931dd cab30558c05540d87d119dd293a5a75066ec36f6 4ca9867b6f997195eaaa95626cdd9bb4431b2482 948ed02f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c2:78:b2:39:c7:3c:18:76:e1:17:b6:cd:41:e0:44:2c:7d:5e:2e:0c] modulus: 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 public exponent: 10001 ] 2022-05-07 06:48:10.004  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-07 06:48:10.005 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-07 06:48:10.006 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-05-07 06:48:10.007 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-07 06:48:10.007  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-05-07 06:48:10.007  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-07 06:48:10.008  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-07 06:48:10.008 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-07 06:48:10.008 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-07 06:48:10.008 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-07 06:48:10.018 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-07 06:48:10.020 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-07 06:48:10.020 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-07 06:48:10.023 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-07 06:48:10.215  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-07 06:48:10.216  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-07 06:48:10.217 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-07 06:48:10.217 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-07 06:48:10.220  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-07 06:48:10.221  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-07 06:48:10.222 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-07 06:48:10.222 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-07 06:48:10.223 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-07 06:48:10.223 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-07 06:48:10.223 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-07 06:48:10.224 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-07 06:48:10.227 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-07 06:48:10.227 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-07 06:48:10.227 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-07 06:48:10.228 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-07 06:48:10.230 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 296694432726261615730754449037751750651018524822 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 07 04:49:29 UTC 2022 Final Date: Thu May 06 04:49:28 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a7:6c:24:5b:1c:48:c6:99:d7:0b:a9:c1:36:18:57:35:0c:9b:eb:79] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a36caf96e859bb65a67b0c56eb6a638682c5400b d5bc7473b646722422c389a3d8f304b97e356c6f cbbcb04e3c703a2f49d3472f541aa6e6d8444028 f03e53822a8fef6b9e76a88053b49af3510038ae 3285630c541cd9565e612efda516f3ae2d0ad901 a2fca7da4acb99f29abf0fdde81508ca6cb2b6cd 8cf8ae1dbc93f81a7225a1de8f1b46d75bc1b7f5 f70397119249eeded74df75fceb3b3f4806d7d51 bb750b86b269dcb445f1117ca62663f3ff157cd1 abc9922b7d9457d239670e9bc28dd3ca48fcbbb3 dc646a1e42c01949ad261293aff373d7fc61574e 8e72f2a544cf5daef4b99fce78fd7ff40c95de86 780449b05aaebb416cf62caa5a6c39596f66ee74 4cffd0fa163b3bcf6ad7818ff513b25925f2e9c2 0a4863cffc0af4faf58d8bdbfe494ca7b4f8d9a4 9b5ea0e608691e535a701d3780122cd18aa8e6ab f4c343d20014691608a71ccc46323b7a368931dd cab30558c05540d87d119dd293a5a75066ec36f6 4ca9867b6f997195eaaa95626cdd9bb4431b2482 948ed02f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [28:df:34:9a:5c:4f:93:fa:e8:26:c2:a3:2e:3b:a3:ab:1c:8a:ad:24] modulus: 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 public exponent: 10001 ] 2022-05-07 06:50:02.184  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-07 06:50:02.186 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-07 06:50:02.188 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-07 06:50:02.189 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-07 06:50:02.190  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-07 06:50:02.191  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-07 06:50:02.191  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-07 06:50:02.191 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-07 06:50:02.191 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-07 06:50:02.192 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-07 06:50:02.196 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-07 06:50:02.197 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-07 06:50:02.197 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-07 06:50:02.197 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-07 06:50:02.325  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-07 06:50:02.325  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-07 06:50:02.326 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-07 06:50:02.326 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-07 06:50:02.327  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-07 06:50:02.328  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-07 06:50:02.328 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-07 06:50:02.328 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-07 06:50:02.329 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-07 06:50:02.329 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-07 06:50:02.330 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-07 06:50:02.330 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-07 06:50:02.330 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-07 06:50:02.330 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-07 06:50:02.330 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-07 06:50:02.331 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-07 06:50:02.333 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 296694432726261615730754449037751750651018524822 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 07 04:49:29 UTC 2022 Final Date: Thu May 06 04:49:28 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a7:6c:24:5b:1c:48:c6:99:d7:0b:a9:c1:36:18:57:35:0c:9b:eb:79] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a36caf96e859bb65a67b0c56eb6a638682c5400b d5bc7473b646722422c389a3d8f304b97e356c6f cbbcb04e3c703a2f49d3472f541aa6e6d8444028 f03e53822a8fef6b9e76a88053b49af3510038ae 3285630c541cd9565e612efda516f3ae2d0ad901 a2fca7da4acb99f29abf0fdde81508ca6cb2b6cd 8cf8ae1dbc93f81a7225a1de8f1b46d75bc1b7f5 f70397119249eeded74df75fceb3b3f4806d7d51 bb750b86b269dcb445f1117ca62663f3ff157cd1 abc9922b7d9457d239670e9bc28dd3ca48fcbbb3 dc646a1e42c01949ad261293aff373d7fc61574e 8e72f2a544cf5daef4b99fce78fd7ff40c95de86 780449b05aaebb416cf62caa5a6c39596f66ee74 4cffd0fa163b3bcf6ad7818ff513b25925f2e9c2 0a4863cffc0af4faf58d8bdbfe494ca7b4f8d9a4 9b5ea0e608691e535a701d3780122cd18aa8e6ab f4c343d20014691608a71ccc46323b7a368931dd cab30558c05540d87d119dd293a5a75066ec36f6 4ca9867b6f997195eaaa95626cdd9bb4431b2482 948ed02f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [28:b6:67:6a:e7:fd:11:6a:dd:d1:aa:bb:7c:8d:48:15:81:90:02:16] modulus: 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 public exponent: 10001 ] 2022-05-07 06:50:06.233  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-07 06:50:06.234 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-07 06:50:06.235 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-05-07 06:50:06.236 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-07 06:50:06.236  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-05-07 06:50:06.237  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-07 06:50:06.237  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-07 06:50:06.237 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-07 06:50:06.237 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-07 06:50:06.238 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-07 06:50:06.242 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-07 06:50:06.243 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-07 06:50:06.243 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-07 06:50:06.243 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-07 06:50:06.328  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-07 06:50:06.329  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-07 06:50:06.329 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-07 06:50:06.329 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-07 06:50:06.332  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-07 06:50:06.332  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-07 06:50:06.333 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-07 06:50:06.333 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-07 06:50:06.333 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-07 06:50:06.334 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-07 06:50:06.334 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-07 06:50:06.334 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-07 06:50:06.335 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-07 06:50:06.335 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-07 06:50:06.335 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-07 06:50:06.336 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-07 06:50:06.339 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 296694432726261615730754449037751750651018524822 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 07 04:49:29 UTC 2022 Final Date: Thu May 06 04:49:28 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a7:6c:24:5b:1c:48:c6:99:d7:0b:a9:c1:36:18:57:35:0c:9b:eb:79] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a36caf96e859bb65a67b0c56eb6a638682c5400b d5bc7473b646722422c389a3d8f304b97e356c6f cbbcb04e3c703a2f49d3472f541aa6e6d8444028 f03e53822a8fef6b9e76a88053b49af3510038ae 3285630c541cd9565e612efda516f3ae2d0ad901 a2fca7da4acb99f29abf0fdde81508ca6cb2b6cd 8cf8ae1dbc93f81a7225a1de8f1b46d75bc1b7f5 f70397119249eeded74df75fceb3b3f4806d7d51 bb750b86b269dcb445f1117ca62663f3ff157cd1 abc9922b7d9457d239670e9bc28dd3ca48fcbbb3 dc646a1e42c01949ad261293aff373d7fc61574e 8e72f2a544cf5daef4b99fce78fd7ff40c95de86 780449b05aaebb416cf62caa5a6c39596f66ee74 4cffd0fa163b3bcf6ad7818ff513b25925f2e9c2 0a4863cffc0af4faf58d8bdbfe494ca7b4f8d9a4 9b5ea0e608691e535a701d3780122cd18aa8e6ab f4c343d20014691608a71ccc46323b7a368931dd cab30558c05540d87d119dd293a5a75066ec36f6 4ca9867b6f997195eaaa95626cdd9bb4431b2482 948ed02f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [fe:c3:71:30:a3:59:14:7d:48:88:26:de:10:f3:de:17:40:40:3c:82] modulus: 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 public exponent: 10001 ] 2022-05-07 06:50:28.953  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-07 06:50:28.955 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-07 06:50:28.958 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-05-07 06:50:28.958 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-07 06:50:28.959  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-05-07 06:50:28.959  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-07 06:50:28.960  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-07 06:50:28.960 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-07 06:50:28.960 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-07 06:50:28.960 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-07 06:50:28.964 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-07 06:50:28.965 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-07 06:50:28.965 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-07 06:50:28.965 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-07 06:50:29.109  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-07 06:50:29.109  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-07 06:50:29.110 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-07 06:50:29.110 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-07 06:50:29.111  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-07 06:50:29.111  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-07 06:50:29.111 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-07 06:50:29.111 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-07 06:50:29.111 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-07 06:50:29.112 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-07 06:50:29.112 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-07 06:50:29.112 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-07 06:50:29.113 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-07 06:50:29.113 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-07 06:50:29.113 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-07 06:50:29.114 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-07 06:50:29.117 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 296694432726261615730754449037751750651018524822 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 07 04:49:29 UTC 2022 Final Date: Thu May 06 04:49:28 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a7:6c:24:5b:1c:48:c6:99:d7:0b:a9:c1:36:18:57:35:0c:9b:eb:79] modulus: a39fc1116f14464ff40be506d32a084cf16b5ad84cb0ccfe817639c3a3630bae8800e53b6ff359df8987eb38ac661a30c444e60d8e183a729af8d4ca0f7ae02e5d0b1431f891be04af2b8e954e29956d3b66ade6976f81a4b34722d03ea8a82f7afa1905c36083d7f9affede9af2d42ba6db36b01e50ca6d9f2c68a6fd4d5a604767c99555bcd1d9df2c0eb8a84f38414685a9cbd42db8f13891942cf9e7de0caab7a328702b086c28162f6139388a3b9aa31a91cbee27aa009825b1fe6b58a67efa083c447f6795d258cab60e7950bd7d5219e71fc11b4a9246cecf5ef4e24076bc20a9833f73b20e5f916553f13ab5f26f2529924e9280cd85e8d1023f4d487448619d2f8d5a88b88908c5017aee46323f5027846b04032e067671306455280c8e7ba7e4c0f30f31a54adebe76560169a048c3cc0efb06f6366e056a21c48ed324482ede07e105664720d181d3db9f8954364f9a3e224030d8450d38e643ef4b8930d1d803c5538cceea98ca53dcae1ba746bc15ff6694cc3709df17b85613 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a36caf96e859bb65a67b0c56eb6a638682c5400b d5bc7473b646722422c389a3d8f304b97e356c6f cbbcb04e3c703a2f49d3472f541aa6e6d8444028 f03e53822a8fef6b9e76a88053b49af3510038ae 3285630c541cd9565e612efda516f3ae2d0ad901 a2fca7da4acb99f29abf0fdde81508ca6cb2b6cd 8cf8ae1dbc93f81a7225a1de8f1b46d75bc1b7f5 f70397119249eeded74df75fceb3b3f4806d7d51 bb750b86b269dcb445f1117ca62663f3ff157cd1 abc9922b7d9457d239670e9bc28dd3ca48fcbbb3 dc646a1e42c01949ad261293aff373d7fc61574e 8e72f2a544cf5daef4b99fce78fd7ff40c95de86 780449b05aaebb416cf62caa5a6c39596f66ee74 4cffd0fa163b3bcf6ad7818ff513b25925f2e9c2 0a4863cffc0af4faf58d8bdbfe494ca7b4f8d9a4 9b5ea0e608691e535a701d3780122cd18aa8e6ab f4c343d20014691608a71ccc46323b7a368931dd cab30558c05540d87d119dd293a5a75066ec36f6 4ca9867b6f997195eaaa95626cdd9bb4431b2482 948ed02f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f6:28:de:a1:f8:d0:2f:90:a1:a6:e5:a1:ef:6f:36:86:e5:b2:e4:29] modulus: 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 public exponent: 10001 ] 2022-05-07 06:53:41.856  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-07 06:53:41.858 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-07 06:53:41.860 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-07 06:53:41.861 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-07 06:53:41.861  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-07 06:53:41.861  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-07 06:53:41.862  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-07 06:53:41.862 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-07 06:53:41.862 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-07 06:53:41.862 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-07 06:53:41.865 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-07 06:53:41.866 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-07 06:53:41.866 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-07 06:53:41.866 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-07 06:53:42.008  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-07 06:53:42.009  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-07 06:53:42.009 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-07 06:53:42.009 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-07 06:53:42.010  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-07 06:53:42.011  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-07 06:53:42.011 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-07 06:53:42.011 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-07 06:53:42.012 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-07 06:53:42.013 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-07 06:53:42.013 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-07 06:53:42.014 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-07 06:53:42.015 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-07 06:53:42.015 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-07 06:53:42.015 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-07 06:53:42.016 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-07 06:53:42.021 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 296694432726261615730754449037751750651018524822 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 07 04:49:29 UTC 2022 Final Date: Thu May 06 04:49:28 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a7:6c:24:5b:1c:48:c6:99:d7:0b:a9:c1:36:18:57:35:0c:9b:eb:79] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a36caf96e859bb65a67b0c56eb6a638682c5400b d5bc7473b646722422c389a3d8f304b97e356c6f cbbcb04e3c703a2f49d3472f541aa6e6d8444028 f03e53822a8fef6b9e76a88053b49af3510038ae 3285630c541cd9565e612efda516f3ae2d0ad901 a2fca7da4acb99f29abf0fdde81508ca6cb2b6cd 8cf8ae1dbc93f81a7225a1de8f1b46d75bc1b7f5 f70397119249eeded74df75fceb3b3f4806d7d51 bb750b86b269dcb445f1117ca62663f3ff157cd1 abc9922b7d9457d239670e9bc28dd3ca48fcbbb3 dc646a1e42c01949ad261293aff373d7fc61574e 8e72f2a544cf5daef4b99fce78fd7ff40c95de86 780449b05aaebb416cf62caa5a6c39596f66ee74 4cffd0fa163b3bcf6ad7818ff513b25925f2e9c2 0a4863cffc0af4faf58d8bdbfe494ca7b4f8d9a4 9b5ea0e608691e535a701d3780122cd18aa8e6ab f4c343d20014691608a71ccc46323b7a368931dd cab30558c05540d87d119dd293a5a75066ec36f6 4ca9867b6f997195eaaa95626cdd9bb4431b2482 948ed02f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [46:f1:bb:58:02:aa:d0:14:40:8f:ea:bd:11:cc:60:ad:c9:39:e6:cf] modulus: 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 public exponent: 10001 ] 2022-05-07 06:58:54.515  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-07 06:58:54.517 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-07 06:58:54.520 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-07 06:58:54.520 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-07 06:58:54.521  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-07 06:58:54.521  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-07 06:58:54.521  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-07 06:58:54.521 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-07 06:58:54.522 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-07 06:58:54.522 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-07 06:58:54.525 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-07 06:58:54.525 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-07 06:58:54.526 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-07 06:58:54.526 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-07 06:58:54.647  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-07 06:58:54.648  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-07 06:58:54.649 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-07 06:58:54.649 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-07 06:58:54.651  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-07 06:58:54.652  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-07 06:58:54.652 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-07 06:58:54.653 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-07 06:58:54.653 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-07 06:58:54.654 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-07 06:58:54.654 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-07 06:58:54.654 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-07 06:58:54.655 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-07 06:58:54.655 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-07 06:58:54.655 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-07 06:58:54.656 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-07 06:58:54.659 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 296694432726261615730754449037751750651018524822 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 07 04:49:29 UTC 2022 Final Date: Thu May 06 04:49:28 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a7:6c:24:5b:1c:48:c6:99:d7:0b:a9:c1:36:18:57:35:0c:9b:eb:79] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a36caf96e859bb65a67b0c56eb6a638682c5400b d5bc7473b646722422c389a3d8f304b97e356c6f cbbcb04e3c703a2f49d3472f541aa6e6d8444028 f03e53822a8fef6b9e76a88053b49af3510038ae 3285630c541cd9565e612efda516f3ae2d0ad901 a2fca7da4acb99f29abf0fdde81508ca6cb2b6cd 8cf8ae1dbc93f81a7225a1de8f1b46d75bc1b7f5 f70397119249eeded74df75fceb3b3f4806d7d51 bb750b86b269dcb445f1117ca62663f3ff157cd1 abc9922b7d9457d239670e9bc28dd3ca48fcbbb3 dc646a1e42c01949ad261293aff373d7fc61574e 8e72f2a544cf5daef4b99fce78fd7ff40c95de86 780449b05aaebb416cf62caa5a6c39596f66ee74 4cffd0fa163b3bcf6ad7818ff513b25925f2e9c2 0a4863cffc0af4faf58d8bdbfe494ca7b4f8d9a4 9b5ea0e608691e535a701d3780122cd18aa8e6ab f4c343d20014691608a71ccc46323b7a368931dd cab30558c05540d87d119dd293a5a75066ec36f6 4ca9867b6f997195eaaa95626cdd9bb4431b2482 948ed02f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [20:64:ca:6c:42:e5:0c:0c:66:f1:81:31:6c:89:eb:ea:2f:3c:7e:aa] modulus: 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 public exponent: 10001 ] 2022-05-07 07:03:11.208  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-07 07:03:11.211 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-07 07:03:11.213 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-07 07:03:11.214 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-07 07:03:11.214  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-07 07:03:11.215  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-07 07:03:11.215  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-07 07:03:11.216 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-07 07:03:11.216 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-07 07:03:11.216 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-07 07:03:11.220 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-07 07:03:11.221 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-07 07:03:11.221 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-07 07:03:11.221 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-07 07:03:11.382  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-07 07:03:11.383  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-07 07:03:11.383 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-07 07:03:11.384 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-07 07:03:11.385  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-07 07:03:11.386  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-07 07:03:11.386 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-07 07:03:11.387 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-07 07:03:11.387 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-07 07:03:11.388 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-07 07:03:11.388 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-07 07:03:11.388 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-07 07:03:11.389 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-07 07:03:11.390 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-07 07:03:11.390 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-07 07:03:11.391 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-07 07:03:11.393 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 296694432726261615730754449037751750651018524822 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 07 04:49:29 UTC 2022 Final Date: Thu May 06 04:49:28 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a7:6c:24:5b:1c:48:c6:99:d7:0b:a9:c1:36:18:57:35:0c:9b:eb:79] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a36caf96e859bb65a67b0c56eb6a638682c5400b d5bc7473b646722422c389a3d8f304b97e356c6f cbbcb04e3c703a2f49d3472f541aa6e6d8444028 f03e53822a8fef6b9e76a88053b49af3510038ae 3285630c541cd9565e612efda516f3ae2d0ad901 a2fca7da4acb99f29abf0fdde81508ca6cb2b6cd 8cf8ae1dbc93f81a7225a1de8f1b46d75bc1b7f5 f70397119249eeded74df75fceb3b3f4806d7d51 bb750b86b269dcb445f1117ca62663f3ff157cd1 abc9922b7d9457d239670e9bc28dd3ca48fcbbb3 dc646a1e42c01949ad261293aff373d7fc61574e 8e72f2a544cf5daef4b99fce78fd7ff40c95de86 780449b05aaebb416cf62caa5a6c39596f66ee74 4cffd0fa163b3bcf6ad7818ff513b25925f2e9c2 0a4863cffc0af4faf58d8bdbfe494ca7b4f8d9a4 9b5ea0e608691e535a701d3780122cd18aa8e6ab f4c343d20014691608a71ccc46323b7a368931dd cab30558c05540d87d119dd293a5a75066ec36f6 4ca9867b6f997195eaaa95626cdd9bb4431b2482 948ed02f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e2:5c:c3:94:27:87:d2:aa:b6:72:65:9c:b8:5b:0e:60:8b:2f:8a:d3] modulus: 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 public exponent: 10001 ] 2022-05-07 07:06:34.756  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-07 07:06:34.758 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-07 07:06:34.759 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-07 07:06:34.760 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-07 07:06:34.760  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-07 07:06:34.761  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-07 07:06:34.761  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-07 07:06:34.761 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-07 07:06:34.762 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-07 07:06:34.762 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-07 07:06:34.768 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-07 07:06:34.768 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-07 07:06:34.769 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-07 07:06:34.769 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-07 07:06:34.893  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-07 07:06:34.894  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-07 07:06:34.895 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-07 07:06:34.895 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-07 07:06:34.898  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-07 07:06:34.898  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-07 07:06:34.899 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-07 07:06:34.899 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-07 07:06:34.899 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-07 07:06:34.900 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-07 07:06:34.900 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-07 07:06:34.901 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-07 07:06:34.902 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-07 07:06:34.902 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-07 07:06:34.903 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-07 07:06:34.904 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-07 07:06:34.907 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 296694432726261615730754449037751750651018524822 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 07 04:49:29 UTC 2022 Final Date: Thu May 06 04:49:28 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a7:6c:24:5b:1c:48:c6:99:d7:0b:a9:c1:36:18:57:35:0c:9b:eb:79] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a36caf96e859bb65a67b0c56eb6a638682c5400b d5bc7473b646722422c389a3d8f304b97e356c6f cbbcb04e3c703a2f49d3472f541aa6e6d8444028 f03e53822a8fef6b9e76a88053b49af3510038ae 3285630c541cd9565e612efda516f3ae2d0ad901 a2fca7da4acb99f29abf0fdde81508ca6cb2b6cd 8cf8ae1dbc93f81a7225a1de8f1b46d75bc1b7f5 f70397119249eeded74df75fceb3b3f4806d7d51 bb750b86b269dcb445f1117ca62663f3ff157cd1 abc9922b7d9457d239670e9bc28dd3ca48fcbbb3 dc646a1e42c01949ad261293aff373d7fc61574e 8e72f2a544cf5daef4b99fce78fd7ff40c95de86 780449b05aaebb416cf62caa5a6c39596f66ee74 4cffd0fa163b3bcf6ad7818ff513b25925f2e9c2 0a4863cffc0af4faf58d8bdbfe494ca7b4f8d9a4 9b5ea0e608691e535a701d3780122cd18aa8e6ab f4c343d20014691608a71ccc46323b7a368931dd cab30558c05540d87d119dd293a5a75066ec36f6 4ca9867b6f997195eaaa95626cdd9bb4431b2482 948ed02f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [10:df:90:4b:49:55:d4:25:31:98:16:79:73:26:7a:00:d3:c3:1d:10] modulus: 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 public exponent: 10001 ]