2022-05-21 04:52:45,858 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-05-21 04:52:46,801 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-05-21 04:52:47.718  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default May 21, 2022 4:52:49 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] May 21, 2022 4:52:49 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] May 21, 2022 4:52:49 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] May 21, 2022 4:52:49 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-05-21 04:52:50.464 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-05-21 04:52:50.765  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-05-21 04:52:50.937  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-05-21 04:52:51.704 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-05-21 04:52:51.708 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-05-21 04:52:51.710 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-05-21 04:52:51.715 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-05-21 04:52:51.762 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-05-21 04:52:51.766 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-05-21 04:52:51.897 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-05-21 04:52:52.675 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} May 21, 2022 4:52:53 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-05-21 04:52:53.639  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 8.667 seconds (JVM running for 10.483) May 21, 2022 4:53:17 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-05-21 04:53:40.200  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-21 04:53:40.208 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-21 04:53:40.249 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-05-21 04:53:40.253 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-21 04:53:40.274  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-05-21 04:53:40.277  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-21 04:53:40.278  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-21 04:53:40.279 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-21 04:53:40.279 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-21 04:53:40.283 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-21 04:53:40.290 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-21 04:53:40.293 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-21 04:53:40.354 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-21 04:53:40.360 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-21 04:53:40.361 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-21 04:53:40.364 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-21 04:53:40.882  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-21 04:53:40.885  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-21 04:53:40.885 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-21 04:53:40.887 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-21 04:53:40.897  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-21 04:53:40.898  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-21 04:53:40.900 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-21 04:53:40.900 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-21 04:53:40.900 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-21 04:53:40.913 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-21 04:53:40.914 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-21 04:53:40.914 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-21 04:53:40.922 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-21 04:53:40.922 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-21 04:53:40.922 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-21 04:53:40.925 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-21 04:53:40.953 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 559266934618921041374131635737909767184287317820 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 21 04:50:53 UTC 2022 Final Date: Thu May 20 04:50:52 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [46:16:83:d8:65:a0:7a:65:08:94:50:b6:ae:30:b1:92:7c:3f:96:a7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 94f7e14d7f550d18fa0bfaab0a0fcb4020c9d558 31eedd548fc0daff69b55767622aab873b39eede ca4cd79639e61c80263fe1e5b9f5ea2b0c90b09b fe74817f237706c871b40ea5f3eebec5f16c308e 32f3983140d9fa3240c6e5c430fd3358092ee382 0a5fb29a75b2740f391933751d06e216d4d72de3 db5b5ad2138bf7e96180a36450c1300b97ee6fa8 61ee04b3668a02a416248c11a72eb9ac5ab236f4 6b0ff261d1aae67ced34f0c7804d5244369eac7d 226c3060ccaadadd0cc49690a2558093ab71d3e1 d100135829c9cac1da04e3aac299d2cf2178cd05 c507c0e1d2dd74ae460b0c8ad9b4f25ad5d63745 78d1c6d6217bac53f80a025d5894d310c9226085 a6d9accd302fa1611cf73b9c26cec6307d65918c e505242f637c57b884bbac0375f0626bfe87ff82 d2904959defea076827c6287d578acc4c00a748a 1f022b4718e40e651d892bc09cacd3e10a911535 78c9723e0e1cf48378e067a6f505c08ce06e7e9a b7463c0d979775f1f360ef1290669997cda40427 d6ee94e4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e7:11:b3:2a:4e:45:ab:1d:7a:05:9b:ed:aa:a8:3e:e7:59:de:9e:cf] modulus: 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 public exponent: 10001 ] 2022-05-21 06:01:22.528  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-21 06:01:22.537 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-21 06:01:22.540 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-05-21 06:01:22.542 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-21 06:01:22.542  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-05-21 06:01:22.543  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-21 06:01:22.544  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-21 06:01:22.544 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-21 06:01:22.545 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-21 06:01:22.546 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-21 06:01:22.552 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-21 06:01:22.553 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-21 06:01:22.554 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-21 06:01:22.554 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-21 06:01:22.726  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-21 06:01:22.727  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-21 06:01:22.728 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-21 06:01:22.728 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-21 06:01:22.732  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-21 06:01:22.732  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-21 06:01:22.733 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-21 06:01:22.733 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-21 06:01:22.734 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-21 06:01:22.735 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-21 06:01:22.735 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-21 06:01:22.736 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-21 06:01:22.737 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-21 06:01:22.738 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-21 06:01:22.738 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-21 06:01:22.739 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-21 06:01:22.746 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 559266934618921041374131635737909767184287317820 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 21 04:50:53 UTC 2022 Final Date: Thu May 20 04:50:52 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [46:16:83:d8:65:a0:7a:65:08:94:50:b6:ae:30:b1:92:7c:3f:96:a7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 94f7e14d7f550d18fa0bfaab0a0fcb4020c9d558 31eedd548fc0daff69b55767622aab873b39eede ca4cd79639e61c80263fe1e5b9f5ea2b0c90b09b fe74817f237706c871b40ea5f3eebec5f16c308e 32f3983140d9fa3240c6e5c430fd3358092ee382 0a5fb29a75b2740f391933751d06e216d4d72de3 db5b5ad2138bf7e96180a36450c1300b97ee6fa8 61ee04b3668a02a416248c11a72eb9ac5ab236f4 6b0ff261d1aae67ced34f0c7804d5244369eac7d 226c3060ccaadadd0cc49690a2558093ab71d3e1 d100135829c9cac1da04e3aac299d2cf2178cd05 c507c0e1d2dd74ae460b0c8ad9b4f25ad5d63745 78d1c6d6217bac53f80a025d5894d310c9226085 a6d9accd302fa1611cf73b9c26cec6307d65918c e505242f637c57b884bbac0375f0626bfe87ff82 d2904959defea076827c6287d578acc4c00a748a 1f022b4718e40e651d892bc09cacd3e10a911535 78c9723e0e1cf48378e067a6f505c08ce06e7e9a b7463c0d979775f1f360ef1290669997cda40427 d6ee94e4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d8:d5:4f:0b:4b:56:cf:42:96:7b:5f:f8:f4:e3:2a:b2:50:f4:e0:a1] modulus: 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 public exponent: 10001 ] 2022-05-21 06:01:35.397  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-21 06:01:35.399 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-21 06:01:35.402 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-21 06:01:35.403 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-21 06:01:35.404  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-21 06:01:35.406  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-21 06:01:35.407  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-21 06:01:35.408 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-21 06:01:35.409 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-21 06:01:35.411 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-21 06:01:35.419 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-21 06:01:35.420 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-21 06:01:35.420 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-21 06:01:35.421 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-21 06:01:35.550  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-21 06:01:35.551  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-21 06:01:35.552 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-21 06:01:35.552 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-21 06:01:35.557  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-21 06:01:35.558  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-21 06:01:35.559 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-21 06:01:35.559 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-21 06:01:35.560 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-21 06:01:35.562 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-21 06:01:35.562 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-21 06:01:35.563 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-21 06:01:35.564 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-21 06:01:35.565 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-21 06:01:35.565 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-21 06:01:35.566 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-21 06:01:35.571 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 559266934618921041374131635737909767184287317820 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 21 04:50:53 UTC 2022 Final Date: Thu May 20 04:50:52 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [46:16:83:d8:65:a0:7a:65:08:94:50:b6:ae:30:b1:92:7c:3f:96:a7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 94f7e14d7f550d18fa0bfaab0a0fcb4020c9d558 31eedd548fc0daff69b55767622aab873b39eede ca4cd79639e61c80263fe1e5b9f5ea2b0c90b09b fe74817f237706c871b40ea5f3eebec5f16c308e 32f3983140d9fa3240c6e5c430fd3358092ee382 0a5fb29a75b2740f391933751d06e216d4d72de3 db5b5ad2138bf7e96180a36450c1300b97ee6fa8 61ee04b3668a02a416248c11a72eb9ac5ab236f4 6b0ff261d1aae67ced34f0c7804d5244369eac7d 226c3060ccaadadd0cc49690a2558093ab71d3e1 d100135829c9cac1da04e3aac299d2cf2178cd05 c507c0e1d2dd74ae460b0c8ad9b4f25ad5d63745 78d1c6d6217bac53f80a025d5894d310c9226085 a6d9accd302fa1611cf73b9c26cec6307d65918c e505242f637c57b884bbac0375f0626bfe87ff82 d2904959defea076827c6287d578acc4c00a748a 1f022b4718e40e651d892bc09cacd3e10a911535 78c9723e0e1cf48378e067a6f505c08ce06e7e9a b7463c0d979775f1f360ef1290669997cda40427 d6ee94e4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [19:62:b9:cc:de:14:ee:c5:43:d6:88:99:93:b7:bc:26:ae:a1:23:36] modulus: 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 public exponent: 10001 ] 2022-05-21 06:03:08.980  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-21 06:03:08.984 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-21 06:03:08.988 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-05-21 06:03:08.989 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-21 06:03:08.997  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-05-21 06:03:09.002  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-21 06:03:09.005  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-21 06:03:09.005 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-21 06:03:09.006 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-21 06:03:09.007 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-21 06:03:09.013 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-21 06:03:09.016 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-21 06:03:09.017 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-21 06:03:09.017 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-21 06:03:09.150  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-21 06:03:09.152  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-21 06:03:09.153 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-21 06:03:09.153 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-21 06:03:09.156  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-21 06:03:09.157  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-21 06:03:09.162 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-21 06:03:09.163 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-21 06:03:09.163 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-21 06:03:09.165 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-21 06:03:09.165 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-21 06:03:09.167 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-21 06:03:09.168 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-21 06:03:09.168 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-21 06:03:09.169 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-21 06:03:09.170 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-21 06:03:09.179 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 559266934618921041374131635737909767184287317820 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 21 04:50:53 UTC 2022 Final Date: Thu May 20 04:50:52 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [46:16:83:d8:65:a0:7a:65:08:94:50:b6:ae:30:b1:92:7c:3f:96:a7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 94f7e14d7f550d18fa0bfaab0a0fcb4020c9d558 31eedd548fc0daff69b55767622aab873b39eede ca4cd79639e61c80263fe1e5b9f5ea2b0c90b09b fe74817f237706c871b40ea5f3eebec5f16c308e 32f3983140d9fa3240c6e5c430fd3358092ee382 0a5fb29a75b2740f391933751d06e216d4d72de3 db5b5ad2138bf7e96180a36450c1300b97ee6fa8 61ee04b3668a02a416248c11a72eb9ac5ab236f4 6b0ff261d1aae67ced34f0c7804d5244369eac7d 226c3060ccaadadd0cc49690a2558093ab71d3e1 d100135829c9cac1da04e3aac299d2cf2178cd05 c507c0e1d2dd74ae460b0c8ad9b4f25ad5d63745 78d1c6d6217bac53f80a025d5894d310c9226085 a6d9accd302fa1611cf73b9c26cec6307d65918c e505242f637c57b884bbac0375f0626bfe87ff82 d2904959defea076827c6287d578acc4c00a748a 1f022b4718e40e651d892bc09cacd3e10a911535 78c9723e0e1cf48378e067a6f505c08ce06e7e9a b7463c0d979775f1f360ef1290669997cda40427 d6ee94e4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [21:41:b2:82:f0:ac:d7:82:5f:43:73:e6:d0:ea:fc:b0:19:29:e2:f8] modulus: c01e0459cfad8d0004922b8fc9ab5e10a927b15d7c73b0445445f167d89d9a312df8e67e5a194addb625cd4f43815a4043db90a6c4747e8de3dc20524a4f246c11e4ec52fde208e4efedcc7bd093a612653835785434f4fdb249fd520c06cfd877eb9df2e16153454c49bcee41e3df23021bc873334b8ccb5fdcfc2ac5cf6095d9d1ffc5bb1f45e9b97a16a2ebed57c14bcf6011e5738045c902ad5fb288e7b7ec66e2b5d8758df054acb4d34aa50a000b2896f7d55b231ea483220b0d9fc1ec97a3d39e14ab5e485cc2c695e16851a47970e9cc98a0857beb4773d88aab220520614c805ccc245720f848dba398979dbb6015229b0440cc84b3e74480f708fd public exponent: 10001 ] 2022-05-21 06:04:32.327  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-21 06:04:32.328 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-21 06:04:32.329 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-05-21 06:04:32.330 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-21 06:04:32.331  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-05-21 06:04:32.331  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-21 06:04:32.332  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-21 06:04:32.332 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-21 06:04:32.333 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-21 06:04:32.333 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-21 06:04:32.338 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-21 06:04:32.340 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-21 06:04:32.341 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-21 06:04:32.342 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-21 06:04:32.454  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-21 06:04:32.455  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-21 06:04:32.455 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-21 06:04:32.455 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-21 06:04:32.458  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-21 06:04:32.458  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-21 06:04:32.459 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-21 06:04:32.459 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-21 06:04:32.459 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-21 06:04:32.460 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-21 06:04:32.460 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-21 06:04:32.461 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-21 06:04:32.462 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-21 06:04:32.462 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-21 06:04:32.462 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-21 06:04:32.463 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-21 06:04:32.467 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 559266934618921041374131635737909767184287317820 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 21 04:50:53 UTC 2022 Final Date: Thu May 20 04:50:52 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [46:16:83:d8:65:a0:7a:65:08:94:50:b6:ae:30:b1:92:7c:3f:96:a7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 94f7e14d7f550d18fa0bfaab0a0fcb4020c9d558 31eedd548fc0daff69b55767622aab873b39eede ca4cd79639e61c80263fe1e5b9f5ea2b0c90b09b fe74817f237706c871b40ea5f3eebec5f16c308e 32f3983140d9fa3240c6e5c430fd3358092ee382 0a5fb29a75b2740f391933751d06e216d4d72de3 db5b5ad2138bf7e96180a36450c1300b97ee6fa8 61ee04b3668a02a416248c11a72eb9ac5ab236f4 6b0ff261d1aae67ced34f0c7804d5244369eac7d 226c3060ccaadadd0cc49690a2558093ab71d3e1 d100135829c9cac1da04e3aac299d2cf2178cd05 c507c0e1d2dd74ae460b0c8ad9b4f25ad5d63745 78d1c6d6217bac53f80a025d5894d310c9226085 a6d9accd302fa1611cf73b9c26cec6307d65918c e505242f637c57b884bbac0375f0626bfe87ff82 d2904959defea076827c6287d578acc4c00a748a 1f022b4718e40e651d892bc09cacd3e10a911535 78c9723e0e1cf48378e067a6f505c08ce06e7e9a b7463c0d979775f1f360ef1290669997cda40427 d6ee94e4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d4:d1:6a:3f:b3:eb:ac:45:0a:3a:27:f2:f2:9c:1d:46:22:bb:08:a6] modulus: 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 public exponent: 10001 ] 2022-05-21 06:05:50.798  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-21 06:05:50.799 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-21 06:05:50.801 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-05-21 06:05:50.802 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-21 06:05:50.803  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-05-21 06:05:50.804  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-21 06:05:50.804  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-21 06:05:50.804 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-21 06:05:50.805 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-21 06:05:50.805 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-21 06:05:50.811 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-21 06:05:50.811 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-21 06:05:50.812 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-21 06:05:50.812 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-21 06:05:50.935  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-21 06:05:50.936  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-21 06:05:50.937 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-21 06:05:50.937 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-21 06:05:50.940  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-21 06:05:50.940  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-21 06:05:50.940 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-21 06:05:50.941 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-21 06:05:50.941 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-21 06:05:50.942 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-21 06:05:50.942 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-21 06:05:50.943 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-21 06:05:50.944 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-21 06:05:50.945 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-21 06:05:50.945 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-21 06:05:50.947 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-21 06:05:50.954 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 559266934618921041374131635737909767184287317820 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 21 04:50:53 UTC 2022 Final Date: Thu May 20 04:50:52 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [46:16:83:d8:65:a0:7a:65:08:94:50:b6:ae:30:b1:92:7c:3f:96:a7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 94f7e14d7f550d18fa0bfaab0a0fcb4020c9d558 31eedd548fc0daff69b55767622aab873b39eede ca4cd79639e61c80263fe1e5b9f5ea2b0c90b09b fe74817f237706c871b40ea5f3eebec5f16c308e 32f3983140d9fa3240c6e5c430fd3358092ee382 0a5fb29a75b2740f391933751d06e216d4d72de3 db5b5ad2138bf7e96180a36450c1300b97ee6fa8 61ee04b3668a02a416248c11a72eb9ac5ab236f4 6b0ff261d1aae67ced34f0c7804d5244369eac7d 226c3060ccaadadd0cc49690a2558093ab71d3e1 d100135829c9cac1da04e3aac299d2cf2178cd05 c507c0e1d2dd74ae460b0c8ad9b4f25ad5d63745 78d1c6d6217bac53f80a025d5894d310c9226085 a6d9accd302fa1611cf73b9c26cec6307d65918c e505242f637c57b884bbac0375f0626bfe87ff82 d2904959defea076827c6287d578acc4c00a748a 1f022b4718e40e651d892bc09cacd3e10a911535 78c9723e0e1cf48378e067a6f505c08ce06e7e9a b7463c0d979775f1f360ef1290669997cda40427 d6ee94e4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3b:45:4a:e4:83:dc:61:e1:d8:64:f7:09:24:01:74:8e:2e:c7:9d:57] modulus: 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 public exponent: 10001 ] 2022-05-21 06:06:07.386  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-21 06:06:07.387 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-21 06:06:07.388 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-05-21 06:06:07.390 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-21 06:06:07.390  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-05-21 06:06:07.391  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-21 06:06:07.391  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-21 06:06:07.392 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-21 06:06:07.392 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-21 06:06:07.392 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-21 06:06:07.397 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-21 06:06:07.397 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-21 06:06:07.398 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-21 06:06:07.398 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-21 06:06:07.523  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-21 06:06:07.525  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-21 06:06:07.526 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-21 06:06:07.526 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-21 06:06:07.529  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-21 06:06:07.530  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-21 06:06:07.531 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-21 06:06:07.532 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-21 06:06:07.532 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-21 06:06:07.534 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-21 06:06:07.535 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-21 06:06:07.536 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-21 06:06:07.538 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-21 06:06:07.539 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-21 06:06:07.539 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-21 06:06:07.540 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-21 06:06:07.544 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 559266934618921041374131635737909767184287317820 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 21 04:50:53 UTC 2022 Final Date: Thu May 20 04:50:52 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [46:16:83:d8:65:a0:7a:65:08:94:50:b6:ae:30:b1:92:7c:3f:96:a7] modulus: b26648efe5bd064c10147807f23fcd907863ea7665ae7cac9a604bce176c7c38f6a1849663a6f19d898869ba7379b631804ef39ebb4500ccb45b3f190d36f0fc1b38aea4fe836529cfea1363247d12b3aa0cdf90902d80dec62feedbe1c137507e772a0b0d2aa401ee66b08f3bcbff8078f5d6201b9044644232b31674de5734603579b93ba4d16d9cca0c79ec27b6322a41772ff8fde5eae82f479cef66090ca90263b368918305a9e8808053155d079b6b9da92396d1c501719d50d6ee2cec3b9e4db734d0b57bfe550f0c9870e5f16a9a4911b7e79b06eee90cae37fd0cde4e065d59eff7e929bbd95e01bd4909afa38bf2ae518b24622bcc952983979a5bc69388e9ed47b802b9bc0c9bf5284d3e7c77e7218572221835f3af43ee7ae5dfcf796c75cad89cd502ed6168aefb383838763cf7370186aa491299b5d4a2b754c0ca37fa387df14c2a81705e94fd5f4b476397e311382a118f7e6d5f0f6c375fd26a87c8da0e583bf74896c8a3b440393d1912e941eab0561dd15c51547908ad public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 94f7e14d7f550d18fa0bfaab0a0fcb4020c9d558 31eedd548fc0daff69b55767622aab873b39eede ca4cd79639e61c80263fe1e5b9f5ea2b0c90b09b fe74817f237706c871b40ea5f3eebec5f16c308e 32f3983140d9fa3240c6e5c430fd3358092ee382 0a5fb29a75b2740f391933751d06e216d4d72de3 db5b5ad2138bf7e96180a36450c1300b97ee6fa8 61ee04b3668a02a416248c11a72eb9ac5ab236f4 6b0ff261d1aae67ced34f0c7804d5244369eac7d 226c3060ccaadadd0cc49690a2558093ab71d3e1 d100135829c9cac1da04e3aac299d2cf2178cd05 c507c0e1d2dd74ae460b0c8ad9b4f25ad5d63745 78d1c6d6217bac53f80a025d5894d310c9226085 a6d9accd302fa1611cf73b9c26cec6307d65918c e505242f637c57b884bbac0375f0626bfe87ff82 d2904959defea076827c6287d578acc4c00a748a 1f022b4718e40e651d892bc09cacd3e10a911535 78c9723e0e1cf48378e067a6f505c08ce06e7e9a b7463c0d979775f1f360ef1290669997cda40427 d6ee94e4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [dc:cc:06:64:57:36:4a:24:f7:27:d7:20:55:6b:a0:1f:61:5e:59:bf] modulus: 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 public exponent: 10001 ] 2022-05-21 06:06:17.210  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-21 06:06:17.212 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-21 06:06:17.213 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-21 06:06:17.214 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-21 06:06:17.215  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-21 06:06:17.215  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-21 06:06:17.215  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-21 06:06:17.216 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-21 06:06:17.216 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-21 06:06:17.217 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-21 06:06:17.224 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-21 06:06:17.224 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-21 06:06:17.224 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-21 06:06:17.225 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-21 06:06:17.336  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-21 06:06:17.337  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-21 06:06:17.337 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-21 06:06:17.337 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-21 06:06:17.339  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-21 06:06:17.339  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-21 06:06:17.339 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-21 06:06:17.340 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-21 06:06:17.340 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-21 06:06:17.341 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-21 06:06:17.341 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-21 06:06:17.341 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-21 06:06:17.342 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-21 06:06:17.342 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-21 06:06:17.342 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-21 06:06:17.343 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-21 06:06:17.348 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 559266934618921041374131635737909767184287317820 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 21 04:50:53 UTC 2022 Final Date: Thu May 20 04:50:52 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [46:16:83:d8:65:a0:7a:65:08:94:50:b6:ae:30:b1:92:7c:3f:96:a7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 94f7e14d7f550d18fa0bfaab0a0fcb4020c9d558 31eedd548fc0daff69b55767622aab873b39eede ca4cd79639e61c80263fe1e5b9f5ea2b0c90b09b fe74817f237706c871b40ea5f3eebec5f16c308e 32f3983140d9fa3240c6e5c430fd3358092ee382 0a5fb29a75b2740f391933751d06e216d4d72de3 db5b5ad2138bf7e96180a36450c1300b97ee6fa8 61ee04b3668a02a416248c11a72eb9ac5ab236f4 6b0ff261d1aae67ced34f0c7804d5244369eac7d 226c3060ccaadadd0cc49690a2558093ab71d3e1 d100135829c9cac1da04e3aac299d2cf2178cd05 c507c0e1d2dd74ae460b0c8ad9b4f25ad5d63745 78d1c6d6217bac53f80a025d5894d310c9226085 a6d9accd302fa1611cf73b9c26cec6307d65918c e505242f637c57b884bbac0375f0626bfe87ff82 d2904959defea076827c6287d578acc4c00a748a 1f022b4718e40e651d892bc09cacd3e10a911535 78c9723e0e1cf48378e067a6f505c08ce06e7e9a b7463c0d979775f1f360ef1290669997cda40427 d6ee94e4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a1:2b:89:c0:c4:c9:1d:71:4a:6d:7b:21:49:63:ba:dd:12:c5:0f:30] modulus: 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 public exponent: 10001 ] 2022-05-21 06:10:14.375  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-21 06:10:14.379 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-21 06:10:14.383 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-21 06:10:14.384 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-21 06:10:14.385  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-21 06:10:14.386  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-21 06:10:14.387  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-21 06:10:14.387 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-21 06:10:14.388 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-21 06:10:14.388 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-21 06:10:14.395 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-21 06:10:14.397 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-21 06:10:14.397 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-21 06:10:14.398 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-21 06:10:14.575  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-21 06:10:14.575  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-21 06:10:14.576 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-21 06:10:14.576 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-21 06:10:14.578  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-21 06:10:14.578  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-21 06:10:14.579 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-21 06:10:14.579 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-21 06:10:14.580 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-21 06:10:14.581 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-21 06:10:14.581 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-21 06:10:14.581 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-21 06:10:14.582 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-21 06:10:14.583 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-21 06:10:14.583 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-21 06:10:14.584 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-21 06:10:14.589 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 559266934618921041374131635737909767184287317820 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 21 04:50:53 UTC 2022 Final Date: Thu May 20 04:50:52 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [46:16:83:d8:65:a0:7a:65:08:94:50:b6:ae:30:b1:92:7c:3f:96:a7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 94f7e14d7f550d18fa0bfaab0a0fcb4020c9d558 31eedd548fc0daff69b55767622aab873b39eede ca4cd79639e61c80263fe1e5b9f5ea2b0c90b09b fe74817f237706c871b40ea5f3eebec5f16c308e 32f3983140d9fa3240c6e5c430fd3358092ee382 0a5fb29a75b2740f391933751d06e216d4d72de3 db5b5ad2138bf7e96180a36450c1300b97ee6fa8 61ee04b3668a02a416248c11a72eb9ac5ab236f4 6b0ff261d1aae67ced34f0c7804d5244369eac7d 226c3060ccaadadd0cc49690a2558093ab71d3e1 d100135829c9cac1da04e3aac299d2cf2178cd05 c507c0e1d2dd74ae460b0c8ad9b4f25ad5d63745 78d1c6d6217bac53f80a025d5894d310c9226085 a6d9accd302fa1611cf73b9c26cec6307d65918c e505242f637c57b884bbac0375f0626bfe87ff82 d2904959defea076827c6287d578acc4c00a748a 1f022b4718e40e651d892bc09cacd3e10a911535 78c9723e0e1cf48378e067a6f505c08ce06e7e9a b7463c0d979775f1f360ef1290669997cda40427 d6ee94e4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [fc:1f:74:6e:81:7f:51:f8:61:c7:48:2b:82:3e:2d:a1:be:44:02:e5] modulus: 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 public exponent: 10001 ] 2022-05-21 06:15:05.808  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-21 06:15:05.810 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-21 06:15:05.812 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-21 06:15:05.813 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-21 06:15:05.813  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-21 06:15:05.814  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-21 06:15:05.814  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-21 06:15:05.815 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-21 06:15:05.815 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-21 06:15:05.815 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-21 06:15:05.821 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-21 06:15:05.822 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-21 06:15:05.822 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-21 06:15:05.822 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-21 06:15:05.986  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-21 06:15:05.987  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-21 06:15:05.988 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-21 06:15:05.990 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-21 06:15:05.993  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-21 06:15:05.994  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-21 06:15:05.995 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-21 06:15:05.995 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-21 06:15:05.995 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-21 06:15:05.996 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-21 06:15:05.997 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-21 06:15:05.997 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-21 06:15:05.998 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-21 06:15:05.998 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-21 06:15:05.998 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-21 06:15:05.999 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-21 06:15:06.003 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 559266934618921041374131635737909767184287317820 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 21 04:50:53 UTC 2022 Final Date: Thu May 20 04:50:52 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [46:16:83:d8:65:a0:7a:65:08:94:50:b6:ae:30:b1:92:7c:3f:96:a7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 94f7e14d7f550d18fa0bfaab0a0fcb4020c9d558 31eedd548fc0daff69b55767622aab873b39eede ca4cd79639e61c80263fe1e5b9f5ea2b0c90b09b fe74817f237706c871b40ea5f3eebec5f16c308e 32f3983140d9fa3240c6e5c430fd3358092ee382 0a5fb29a75b2740f391933751d06e216d4d72de3 db5b5ad2138bf7e96180a36450c1300b97ee6fa8 61ee04b3668a02a416248c11a72eb9ac5ab236f4 6b0ff261d1aae67ced34f0c7804d5244369eac7d 226c3060ccaadadd0cc49690a2558093ab71d3e1 d100135829c9cac1da04e3aac299d2cf2178cd05 c507c0e1d2dd74ae460b0c8ad9b4f25ad5d63745 78d1c6d6217bac53f80a025d5894d310c9226085 a6d9accd302fa1611cf73b9c26cec6307d65918c e505242f637c57b884bbac0375f0626bfe87ff82 d2904959defea076827c6287d578acc4c00a748a 1f022b4718e40e651d892bc09cacd3e10a911535 78c9723e0e1cf48378e067a6f505c08ce06e7e9a b7463c0d979775f1f360ef1290669997cda40427 d6ee94e4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f5:b1:90:23:78:2d:a5:47:9e:3b:fb:61:31:5e:80:fa:10:cf:be:49] modulus: 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 public exponent: 10001 ] 2022-05-21 06:19:25.190  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-21 06:19:25.193 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-21 06:19:25.195 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-05-21 06:19:25.196 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-21 06:19:25.197  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-05-21 06:19:25.198  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-21 06:19:25.198  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-21 06:19:25.198 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-21 06:19:25.199 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-21 06:19:25.200 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-21 06:19:25.206 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-21 06:19:25.208 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-21 06:19:25.208 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-21 06:19:25.208 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-21 06:19:25.355  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-21 06:19:25.356  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-21 06:19:25.356 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-21 06:19:25.357 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-21 06:19:25.359  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-21 06:19:25.359  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-21 06:19:25.360 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-21 06:19:25.360 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-21 06:19:25.361 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-21 06:19:25.362 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-21 06:19:25.362 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-21 06:19:25.362 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-21 06:19:25.364 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-21 06:19:25.365 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-21 06:19:25.365 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-21 06:19:25.366 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-21 06:19:25.371 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 559266934618921041374131635737909767184287317820 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 21 04:50:53 UTC 2022 Final Date: Thu May 20 04:50:52 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [46:16:83:d8:65:a0:7a:65:08:94:50:b6:ae:30:b1:92:7c:3f:96:a7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 94f7e14d7f550d18fa0bfaab0a0fcb4020c9d558 31eedd548fc0daff69b55767622aab873b39eede ca4cd79639e61c80263fe1e5b9f5ea2b0c90b09b fe74817f237706c871b40ea5f3eebec5f16c308e 32f3983140d9fa3240c6e5c430fd3358092ee382 0a5fb29a75b2740f391933751d06e216d4d72de3 db5b5ad2138bf7e96180a36450c1300b97ee6fa8 61ee04b3668a02a416248c11a72eb9ac5ab236f4 6b0ff261d1aae67ced34f0c7804d5244369eac7d 226c3060ccaadadd0cc49690a2558093ab71d3e1 d100135829c9cac1da04e3aac299d2cf2178cd05 c507c0e1d2dd74ae460b0c8ad9b4f25ad5d63745 78d1c6d6217bac53f80a025d5894d310c9226085 a6d9accd302fa1611cf73b9c26cec6307d65918c e505242f637c57b884bbac0375f0626bfe87ff82 d2904959defea076827c6287d578acc4c00a748a 1f022b4718e40e651d892bc09cacd3e10a911535 78c9723e0e1cf48378e067a6f505c08ce06e7e9a b7463c0d979775f1f360ef1290669997cda40427 d6ee94e4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [24:15:1b:2f:f7:16:1f:81:60:83:ce:45:15:69:1b:3b:ac:a7:ce:1b] modulus: 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 public exponent: 10001 ] 2022-05-21 06:19:30.244  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-21 06:19:30.245 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-21 06:19:30.246 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-05-21 06:19:30.247 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-21 06:19:30.248  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-05-21 06:19:30.248  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-21 06:19:30.249  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-21 06:19:30.249 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-21 06:19:30.250 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-21 06:19:30.250 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-21 06:19:30.255 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-21 06:19:30.255 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-21 06:19:30.256 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-21 06:19:30.256 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-21 06:19:30.352  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-21 06:19:30.353  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-21 06:19:30.354 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-21 06:19:30.354 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-21 06:19:30.356  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-21 06:19:30.357  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-21 06:19:30.357 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-21 06:19:30.357 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-21 06:19:30.358 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-21 06:19:30.358 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-21 06:19:30.359 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-21 06:19:30.359 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-21 06:19:30.360 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-21 06:19:30.360 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-21 06:19:30.361 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-21 06:19:30.362 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-21 06:19:30.365 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 559266934618921041374131635737909767184287317820 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 21 04:50:53 UTC 2022 Final Date: Thu May 20 04:50:52 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [46:16:83:d8:65:a0:7a:65:08:94:50:b6:ae:30:b1:92:7c:3f:96:a7] modulus: b26648efe5bd064c10147807f23fcd907863ea7665ae7cac9a604bce176c7c38f6a1849663a6f19d898869ba7379b631804ef39ebb4500ccb45b3f190d36f0fc1b38aea4fe836529cfea1363247d12b3aa0cdf90902d80dec62feedbe1c137507e772a0b0d2aa401ee66b08f3bcbff8078f5d6201b9044644232b31674de5734603579b93ba4d16d9cca0c79ec27b6322a41772ff8fde5eae82f479cef66090ca90263b368918305a9e8808053155d079b6b9da92396d1c501719d50d6ee2cec3b9e4db734d0b57bfe550f0c9870e5f16a9a4911b7e79b06eee90cae37fd0cde4e065d59eff7e929bbd95e01bd4909afa38bf2ae518b24622bcc952983979a5bc69388e9ed47b802b9bc0c9bf5284d3e7c77e7218572221835f3af43ee7ae5dfcf796c75cad89cd502ed6168aefb383838763cf7370186aa491299b5d4a2b754c0ca37fa387df14c2a81705e94fd5f4b476397e311382a118f7e6d5f0f6c375fd26a87c8da0e583bf74896c8a3b440393d1912e941eab0561dd15c51547908ad public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 94f7e14d7f550d18fa0bfaab0a0fcb4020c9d558 31eedd548fc0daff69b55767622aab873b39eede ca4cd79639e61c80263fe1e5b9f5ea2b0c90b09b fe74817f237706c871b40ea5f3eebec5f16c308e 32f3983140d9fa3240c6e5c430fd3358092ee382 0a5fb29a75b2740f391933751d06e216d4d72de3 db5b5ad2138bf7e96180a36450c1300b97ee6fa8 61ee04b3668a02a416248c11a72eb9ac5ab236f4 6b0ff261d1aae67ced34f0c7804d5244369eac7d 226c3060ccaadadd0cc49690a2558093ab71d3e1 d100135829c9cac1da04e3aac299d2cf2178cd05 c507c0e1d2dd74ae460b0c8ad9b4f25ad5d63745 78d1c6d6217bac53f80a025d5894d310c9226085 a6d9accd302fa1611cf73b9c26cec6307d65918c e505242f637c57b884bbac0375f0626bfe87ff82 d2904959defea076827c6287d578acc4c00a748a 1f022b4718e40e651d892bc09cacd3e10a911535 78c9723e0e1cf48378e067a6f505c08ce06e7e9a b7463c0d979775f1f360ef1290669997cda40427 d6ee94e4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [48:fc:bc:78:6a:27:2d:f0:38:fe:0b:d3:a3:06:f3:85:ce:48:f2:ee] modulus: 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 public exponent: 10001 ] 2022-05-21 06:19:43.299  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-21 06:19:43.300 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-21 06:19:43.302 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-21 06:19:43.303 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-21 06:19:43.304  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-21 06:19:43.305  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-21 06:19:43.305  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-21 06:19:43.306 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-21 06:19:43.306 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-21 06:19:43.307 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-21 06:19:43.315 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-21 06:19:43.316 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-21 06:19:43.316 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-21 06:19:43.316 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-21 06:19:43.432  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-21 06:19:43.433  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-21 06:19:43.433 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-21 06:19:43.433 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-21 06:19:43.435  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-21 06:19:43.437  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-21 06:19:43.438 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-21 06:19:43.440 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-21 06:19:43.440 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-21 06:19:43.441 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-21 06:19:43.441 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-21 06:19:43.441 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-21 06:19:43.442 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-21 06:19:43.442 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-21 06:19:43.442 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-21 06:19:43.443 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-21 06:19:43.449 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 559266934618921041374131635737909767184287317820 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 21 04:50:53 UTC 2022 Final Date: Thu May 20 04:50:52 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [46:16:83:d8:65:a0:7a:65:08:94:50:b6:ae:30:b1:92:7c:3f:96:a7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 94f7e14d7f550d18fa0bfaab0a0fcb4020c9d558 31eedd548fc0daff69b55767622aab873b39eede ca4cd79639e61c80263fe1e5b9f5ea2b0c90b09b fe74817f237706c871b40ea5f3eebec5f16c308e 32f3983140d9fa3240c6e5c430fd3358092ee382 0a5fb29a75b2740f391933751d06e216d4d72de3 db5b5ad2138bf7e96180a36450c1300b97ee6fa8 61ee04b3668a02a416248c11a72eb9ac5ab236f4 6b0ff261d1aae67ced34f0c7804d5244369eac7d 226c3060ccaadadd0cc49690a2558093ab71d3e1 d100135829c9cac1da04e3aac299d2cf2178cd05 c507c0e1d2dd74ae460b0c8ad9b4f25ad5d63745 78d1c6d6217bac53f80a025d5894d310c9226085 a6d9accd302fa1611cf73b9c26cec6307d65918c e505242f637c57b884bbac0375f0626bfe87ff82 d2904959defea076827c6287d578acc4c00a748a 1f022b4718e40e651d892bc09cacd3e10a911535 78c9723e0e1cf48378e067a6f505c08ce06e7e9a b7463c0d979775f1f360ef1290669997cda40427 d6ee94e4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a9:de:36:6c:3a:23:6c:0c:1f:5c:77:a3:a7:f8:b8:11:70:ee:81:7f] modulus: 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 public exponent: 10001 ] 2022-05-21 06:23:26.155  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-21 06:23:26.157 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-21 06:23:26.160 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-21 06:23:26.161 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-21 06:23:26.161  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-21 06:23:26.163  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-21 06:23:26.163  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-21 06:23:26.163 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-21 06:23:26.164 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-21 06:23:26.164 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-21 06:23:26.169 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-21 06:23:26.170 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-21 06:23:26.170 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-21 06:23:26.171 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-21 06:23:26.337  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-21 06:23:26.338  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-21 06:23:26.339 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-21 06:23:26.339 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-21 06:23:26.340  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-21 06:23:26.340  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-21 06:23:26.341 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-21 06:23:26.341 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-21 06:23:26.341 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-21 06:23:26.342 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-21 06:23:26.342 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-21 06:23:26.343 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-21 06:23:26.343 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-21 06:23:26.344 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-21 06:23:26.344 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-21 06:23:26.345 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-21 06:23:26.348 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 559266934618921041374131635737909767184287317820 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 21 04:50:53 UTC 2022 Final Date: Thu May 20 04:50:52 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [46:16:83:d8:65:a0:7a:65:08:94:50:b6:ae:30:b1:92:7c:3f:96:a7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 94f7e14d7f550d18fa0bfaab0a0fcb4020c9d558 31eedd548fc0daff69b55767622aab873b39eede ca4cd79639e61c80263fe1e5b9f5ea2b0c90b09b fe74817f237706c871b40ea5f3eebec5f16c308e 32f3983140d9fa3240c6e5c430fd3358092ee382 0a5fb29a75b2740f391933751d06e216d4d72de3 db5b5ad2138bf7e96180a36450c1300b97ee6fa8 61ee04b3668a02a416248c11a72eb9ac5ab236f4 6b0ff261d1aae67ced34f0c7804d5244369eac7d 226c3060ccaadadd0cc49690a2558093ab71d3e1 d100135829c9cac1da04e3aac299d2cf2178cd05 c507c0e1d2dd74ae460b0c8ad9b4f25ad5d63745 78d1c6d6217bac53f80a025d5894d310c9226085 a6d9accd302fa1611cf73b9c26cec6307d65918c e505242f637c57b884bbac0375f0626bfe87ff82 d2904959defea076827c6287d578acc4c00a748a 1f022b4718e40e651d892bc09cacd3e10a911535 78c9723e0e1cf48378e067a6f505c08ce06e7e9a b7463c0d979775f1f360ef1290669997cda40427 d6ee94e4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a0:ee:0c:df:3c:6b:9e:3b:7c:55:d5:e0:b0:d8:2c:4e:47:b0:80:10] modulus: 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 public exponent: 10001 ] 2022-05-21 06:27:26.541  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-21 06:27:26.544 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-21 06:27:26.546 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-21 06:27:26.547 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-21 06:27:26.547  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-21 06:27:26.548  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-21 06:27:26.548  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-21 06:27:26.549 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-21 06:27:26.549 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-21 06:27:26.550 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-21 06:27:26.556 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-21 06:27:26.557 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-21 06:27:26.557 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-21 06:27:26.557 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-21 06:27:26.739  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-21 06:27:26.740  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-21 06:27:26.740 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-21 06:27:26.741 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-21 06:27:26.743  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-21 06:27:26.743  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-21 06:27:26.744 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-21 06:27:26.744 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-21 06:27:26.744 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-21 06:27:26.746 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-21 06:27:26.746 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-21 06:27:26.746 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-21 06:27:26.747 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-21 06:27:26.747 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-21 06:27:26.748 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-21 06:27:26.749 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-21 06:27:26.753 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 559266934618921041374131635737909767184287317820 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat May 21 04:50:53 UTC 2022 Final Date: Thu May 20 04:50:52 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [46:16:83:d8:65:a0:7a:65:08:94:50:b6:ae:30:b1:92:7c:3f:96:a7] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 94f7e14d7f550d18fa0bfaab0a0fcb4020c9d558 31eedd548fc0daff69b55767622aab873b39eede ca4cd79639e61c80263fe1e5b9f5ea2b0c90b09b fe74817f237706c871b40ea5f3eebec5f16c308e 32f3983140d9fa3240c6e5c430fd3358092ee382 0a5fb29a75b2740f391933751d06e216d4d72de3 db5b5ad2138bf7e96180a36450c1300b97ee6fa8 61ee04b3668a02a416248c11a72eb9ac5ab236f4 6b0ff261d1aae67ced34f0c7804d5244369eac7d 226c3060ccaadadd0cc49690a2558093ab71d3e1 d100135829c9cac1da04e3aac299d2cf2178cd05 c507c0e1d2dd74ae460b0c8ad9b4f25ad5d63745 78d1c6d6217bac53f80a025d5894d310c9226085 a6d9accd302fa1611cf73b9c26cec6307d65918c e505242f637c57b884bbac0375f0626bfe87ff82 d2904959defea076827c6287d578acc4c00a748a 1f022b4718e40e651d892bc09cacd3e10a911535 78c9723e0e1cf48378e067a6f505c08ce06e7e9a b7463c0d979775f1f360ef1290669997cda40427 d6ee94e4 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [00:43:dd:6f:22:74:e9:a1:a6:dc:43:29:82:71:06:19:fc:b8:b8:6b] modulus: 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 public exponent: 10001 ]