2022-06-15 05:16:33,406 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-06-15 05:16:34,379 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-06-15 05:16:35.206  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Jun 15, 2022 5:16:37 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jun 15, 2022 5:16:37 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jun 15, 2022 5:16:37 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jun 15, 2022 5:16:37 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-06-15 05:16:37.829 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-06-15 05:16:38.144  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-06-15 05:16:38.311  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-06-15 05:16:38.990 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-06-15 05:16:38.993 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-06-15 05:16:38.994 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-06-15 05:16:38.998 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-06-15 05:16:39.038 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-06-15 05:16:39.041 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-06-15 05:16:39.174 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-06-15 05:16:39.777 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jun 15, 2022 5:16:40 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-06-15 05:16:40.675  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 8.225 seconds (JVM running for 10.141) Jun 15, 2022 5:17:05 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-06-15 05:17:34.455  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-15 05:17:34.464 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-15 05:17:34.501 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-06-15 05:17:34.505 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-15 05:17:34.522  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-06-15 05:17:34.524  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-15 05:17:34.525  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-15 05:17:34.526 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-15 05:17:34.527 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-15 05:17:34.530 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-15 05:17:34.536 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-15 05:17:34.539 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-15 05:17:34.582 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-15 05:17:34.587 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-15 05:17:34.587 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-15 05:17:34.592 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-15 05:17:35.534  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-15 05:17:35.537  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-15 05:17:35.537 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-15 05:17:35.539 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-15 05:17:35.551  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-15 05:17:35.553  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-15 05:17:35.554 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-15 05:17:35.554 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-15 05:17:35.555 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-15 05:17:35.566 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-15 05:17:35.567 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-15 05:17:35.567 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-15 05:17:35.574 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-15 05:17:35.575 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-15 05:17:35.575 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-15 05:17:35.577 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-15 05:17:35.608 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 352432694724517110097191288886924916916922022618 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 15 05:12:28 UTC 2022 Final Date: Mon Jun 14 05:12:27 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9a:a1:70:95:df:27:07:d7:7f:18:bb:e8:58:97:b7:11:0a:9a:0c:54] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 70358cceba7d4c56f34eb452a95c6b344f18b578 0bd850bdd286b0a8347aee481846a864c61f737d 1a854fa193f4105b1ffefd5bb722aa1a168bb282 78c726f9602be944c7cc26732e8090f2469157dc 209924e39529d0592a480f9bb170fd41d5173fb1 6484f62bae046d9c53d66e2b3997b39e10e5c68d 6ecaf3892bf8e4a960db91f732a8ce4e1fd7c2a0 646dc4a124559db90939d7d242242181dcd5fc49 cf289ea93c69f86339b4b24f0f7e77c8c50de2d5 e3453187f4dbb77ab1c6100cf3b46fc40080ae2e 6feb13e8296909e68f3f74d0a56b943dac6b0fd4 6c230aac50494bb60b2f68fb95cc9ad2f3c3c85b 6436312c6c82ab93585fc9fae29dd293e7b88ee6 51734b802fdf6d25a242ba15e65c8fba3e562fc3 d65c236607d8f54de29bac86965d3440f975efb5 6dbd33ebe1edbb4eb070ebb60d3f8eab483efe14 c39282988065f5de2e65c6b52145a37301e965a0 6a35dd877f3e4889aa8d404ff46399e66fc96b17 aff1d60f5154c7c752a7490f8d17701dcc45f64d efed89c3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [60:ed:d8:5b:17:a0:62:6e:8a:8e:cf:9f:fb:7d:63:4e:62:d2:79:d9] modulus: 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 public exponent: 10001 ] 2022-06-15 06:49:34.941  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-15 06:49:34.948 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-15 06:49:34.964 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-15 06:49:34.970 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-15 06:49:34.972  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-15 06:49:34.974  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-15 06:49:34.974  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-15 06:49:34.975 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-15 06:49:34.975 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-15 06:49:34.976 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-15 06:49:34.987 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-15 06:49:34.989 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-15 06:49:34.989 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-15 06:49:34.990 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-15 06:49:35.796  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-15 06:49:35.797  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-15 06:49:35.797 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-15 06:49:35.798 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-15 06:49:35.801  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-15 06:49:35.801  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-15 06:49:35.802 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-15 06:49:35.802 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-15 06:49:35.803 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-15 06:49:35.804 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-15 06:49:35.804 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-15 06:49:35.805 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-15 06:49:35.806 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-15 06:49:35.806 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-15 06:49:35.806 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-15 06:49:35.807 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-15 06:49:35.813 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 352432694724517110097191288886924916916922022618 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 15 05:12:28 UTC 2022 Final Date: Mon Jun 14 05:12:27 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9a:a1:70:95:df:27:07:d7:7f:18:bb:e8:58:97:b7:11:0a:9a:0c:54] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 70358cceba7d4c56f34eb452a95c6b344f18b578 0bd850bdd286b0a8347aee481846a864c61f737d 1a854fa193f4105b1ffefd5bb722aa1a168bb282 78c726f9602be944c7cc26732e8090f2469157dc 209924e39529d0592a480f9bb170fd41d5173fb1 6484f62bae046d9c53d66e2b3997b39e10e5c68d 6ecaf3892bf8e4a960db91f732a8ce4e1fd7c2a0 646dc4a124559db90939d7d242242181dcd5fc49 cf289ea93c69f86339b4b24f0f7e77c8c50de2d5 e3453187f4dbb77ab1c6100cf3b46fc40080ae2e 6feb13e8296909e68f3f74d0a56b943dac6b0fd4 6c230aac50494bb60b2f68fb95cc9ad2f3c3c85b 6436312c6c82ab93585fc9fae29dd293e7b88ee6 51734b802fdf6d25a242ba15e65c8fba3e562fc3 d65c236607d8f54de29bac86965d3440f975efb5 6dbd33ebe1edbb4eb070ebb60d3f8eab483efe14 c39282988065f5de2e65c6b52145a37301e965a0 6a35dd877f3e4889aa8d404ff46399e66fc96b17 aff1d60f5154c7c752a7490f8d17701dcc45f64d efed89c3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [73:2a:c7:67:5d:5d:06:c8:aa:ce:a3:c4:07:38:69:fc:63:1b:b7:ee] modulus: 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 public exponent: 10001 ] 2022-06-15 06:52:36.588  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-15 06:52:36.589 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-15 06:52:36.591 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-15 06:52:36.592 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-15 06:52:36.593  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-15 06:52:36.594  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-15 06:52:36.595  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-15 06:52:36.596 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-15 06:52:36.596 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-15 06:52:36.597 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-15 06:52:36.604 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-15 06:52:36.605 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-15 06:52:36.606 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-15 06:52:36.606 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-15 06:52:36.967  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-15 06:52:36.969  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-15 06:52:36.973 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-15 06:52:36.974 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-15 06:52:36.977  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-15 06:52:36.978  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-15 06:52:36.978 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-15 06:52:36.979 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-15 06:52:36.979 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-15 06:52:36.982 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-15 06:52:36.982 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-15 06:52:36.983 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-15 06:52:36.984 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-15 06:52:36.985 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-15 06:52:36.985 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-15 06:52:36.987 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-15 06:52:37.004 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 352432694724517110097191288886924916916922022618 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 15 05:12:28 UTC 2022 Final Date: Mon Jun 14 05:12:27 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9a:a1:70:95:df:27:07:d7:7f:18:bb:e8:58:97:b7:11:0a:9a:0c:54] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 70358cceba7d4c56f34eb452a95c6b344f18b578 0bd850bdd286b0a8347aee481846a864c61f737d 1a854fa193f4105b1ffefd5bb722aa1a168bb282 78c726f9602be944c7cc26732e8090f2469157dc 209924e39529d0592a480f9bb170fd41d5173fb1 6484f62bae046d9c53d66e2b3997b39e10e5c68d 6ecaf3892bf8e4a960db91f732a8ce4e1fd7c2a0 646dc4a124559db90939d7d242242181dcd5fc49 cf289ea93c69f86339b4b24f0f7e77c8c50de2d5 e3453187f4dbb77ab1c6100cf3b46fc40080ae2e 6feb13e8296909e68f3f74d0a56b943dac6b0fd4 6c230aac50494bb60b2f68fb95cc9ad2f3c3c85b 6436312c6c82ab93585fc9fae29dd293e7b88ee6 51734b802fdf6d25a242ba15e65c8fba3e562fc3 d65c236607d8f54de29bac86965d3440f975efb5 6dbd33ebe1edbb4eb070ebb60d3f8eab483efe14 c39282988065f5de2e65c6b52145a37301e965a0 6a35dd877f3e4889aa8d404ff46399e66fc96b17 aff1d60f5154c7c752a7490f8d17701dcc45f64d efed89c3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1a:fe:2f:c4:ae:35:d9:8f:53:45:18:c3:63:76:c2:70:4b:c0:10:74] modulus: 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 public exponent: 10001 ] 2022-06-15 06:53:57.122  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-15 06:53:57.123 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-15 06:53:57.126 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-15 06:53:57.127 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-15 06:53:57.134  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-15 06:53:57.135  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-15 06:53:57.136  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-15 06:53:57.137 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-15 06:53:57.138 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-15 06:53:57.139 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-15 06:53:57.149 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-15 06:53:57.149 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-15 06:53:57.150 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-15 06:53:57.150 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-15 06:53:57.560  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-15 06:53:57.562  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-15 06:53:57.562 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-15 06:53:57.563 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-15 06:53:57.565  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-15 06:53:57.566  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-15 06:53:57.574 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-15 06:53:57.575 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-15 06:53:57.576 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-15 06:53:57.578 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-15 06:53:57.579 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-15 06:53:57.579 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-15 06:53:57.581 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-15 06:53:57.581 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-15 06:53:57.581 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-15 06:53:57.585 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-15 06:53:57.591 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 352432694724517110097191288886924916916922022618 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 15 05:12:28 UTC 2022 Final Date: Mon Jun 14 05:12:27 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9a:a1:70:95:df:27:07:d7:7f:18:bb:e8:58:97:b7:11:0a:9a:0c:54] modulus: bed468283037f9b5ff38e1ae3287c1dd768a714c8016e6b69eb16c490e98cf23eb2eb109bbca517635ac215e12102d317646a3eb0270ebe66cce27447358454b9508f365084ec87c1db30f2f4058fdba047bc1693f217038080d2b3d65c574e739d8013b680160a3954daac7128a8684fb67bc5a4f5d2bd813822ee519991e548db692e975a9531f419da4d47a3588d93aeab1f5a02bc0dba2012ad99b0724c1eed32480a8e9a7d784dbb14e63d3c203dff6fb39a6d369f407c4e7895a0708e4d15c5bd35366102096bd46f99a22466a4e4a92e1dc187c075ae80c62296f2b972e0e4b0d150adc1d7bbf5285d5622db66b4db8346d6e05ad7abf104e15d9d969d48002acd9c835a6bb284ea24d7421f342cc7d95d09857d22b0d88f7db950d48624f51a3055cc99140911bd09fd2da70e66d54319c1991fc9a24c2ba302c875be2f8d5b183032af1349d255be17ffe87477aeb99583e08d4013f93e328968bec3fb9e681f3898ba5d27143d0a9525a49b39c6d5ee263fc2c443594bb76836723 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 70358cceba7d4c56f34eb452a95c6b344f18b578 0bd850bdd286b0a8347aee481846a864c61f737d 1a854fa193f4105b1ffefd5bb722aa1a168bb282 78c726f9602be944c7cc26732e8090f2469157dc 209924e39529d0592a480f9bb170fd41d5173fb1 6484f62bae046d9c53d66e2b3997b39e10e5c68d 6ecaf3892bf8e4a960db91f732a8ce4e1fd7c2a0 646dc4a124559db90939d7d242242181dcd5fc49 cf289ea93c69f86339b4b24f0f7e77c8c50de2d5 e3453187f4dbb77ab1c6100cf3b46fc40080ae2e 6feb13e8296909e68f3f74d0a56b943dac6b0fd4 6c230aac50494bb60b2f68fb95cc9ad2f3c3c85b 6436312c6c82ab93585fc9fae29dd293e7b88ee6 51734b802fdf6d25a242ba15e65c8fba3e562fc3 d65c236607d8f54de29bac86965d3440f975efb5 6dbd33ebe1edbb4eb070ebb60d3f8eab483efe14 c39282988065f5de2e65c6b52145a37301e965a0 6a35dd877f3e4889aa8d404ff46399e66fc96b17 aff1d60f5154c7c752a7490f8d17701dcc45f64d efed89c3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1e:c1:86:ff:3a:3a:fa:58:f0:f7:f5:77:76:eb:9a:cf:d2:9a:05:00] modulus: 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 public exponent: 10001 ] 2022-06-15 06:56:18.405  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-15 06:56:18.407 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-15 06:56:18.410 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-15 06:56:18.411 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-15 06:56:18.412  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-15 06:56:18.413  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-15 06:56:18.414  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-15 06:56:18.415 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-15 06:56:18.415 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-15 06:56:18.416 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-15 06:56:18.422 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-15 06:56:18.423 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-15 06:56:18.423 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-15 06:56:18.423 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-15 06:56:18.827  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-15 06:56:18.828  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-15 06:56:18.829 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-15 06:56:18.830 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-15 06:56:18.834  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-15 06:56:18.835  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-15 06:56:18.839 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-15 06:56:18.840 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-15 06:56:18.840 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-15 06:56:18.841 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-15 06:56:18.841 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-15 06:56:18.844 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-15 06:56:18.853 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-15 06:56:18.854 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-15 06:56:18.855 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-15 06:56:18.856 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-15 06:56:18.862 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 352432694724517110097191288886924916916922022618 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 15 05:12:28 UTC 2022 Final Date: Mon Jun 14 05:12:27 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9a:a1:70:95:df:27:07:d7:7f:18:bb:e8:58:97:b7:11:0a:9a:0c:54] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 70358cceba7d4c56f34eb452a95c6b344f18b578 0bd850bdd286b0a8347aee481846a864c61f737d 1a854fa193f4105b1ffefd5bb722aa1a168bb282 78c726f9602be944c7cc26732e8090f2469157dc 209924e39529d0592a480f9bb170fd41d5173fb1 6484f62bae046d9c53d66e2b3997b39e10e5c68d 6ecaf3892bf8e4a960db91f732a8ce4e1fd7c2a0 646dc4a124559db90939d7d242242181dcd5fc49 cf289ea93c69f86339b4b24f0f7e77c8c50de2d5 e3453187f4dbb77ab1c6100cf3b46fc40080ae2e 6feb13e8296909e68f3f74d0a56b943dac6b0fd4 6c230aac50494bb60b2f68fb95cc9ad2f3c3c85b 6436312c6c82ab93585fc9fae29dd293e7b88ee6 51734b802fdf6d25a242ba15e65c8fba3e562fc3 d65c236607d8f54de29bac86965d3440f975efb5 6dbd33ebe1edbb4eb070ebb60d3f8eab483efe14 c39282988065f5de2e65c6b52145a37301e965a0 6a35dd877f3e4889aa8d404ff46399e66fc96b17 aff1d60f5154c7c752a7490f8d17701dcc45f64d efed89c3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c2:61:03:2f:88:2b:6e:4a:de:6b:80:45:9f:1a:4d:80:f9:d6:38:65] modulus: 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 public exponent: 10001 ] 2022-06-15 06:58:25.974  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-15 06:58:25.975 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-15 06:58:25.977 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-15 06:58:25.977 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-15 06:58:25.978  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-15 06:58:25.979  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-15 06:58:25.979  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-15 06:58:25.979 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-15 06:58:25.980 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-15 06:58:25.980 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-15 06:58:25.986 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-15 06:58:25.987 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-15 06:58:25.987 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-15 06:58:25.987 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-15 06:58:26.404  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-15 06:58:26.405  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-15 06:58:26.406 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-15 06:58:26.407 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-15 06:58:26.409  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-15 06:58:26.409  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-15 06:58:26.410 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-15 06:58:26.411 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-15 06:58:26.411 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-15 06:58:26.412 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-15 06:58:26.413 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-15 06:58:26.414 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-15 06:58:26.415 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-15 06:58:26.415 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-15 06:58:26.416 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-15 06:58:26.417 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-15 06:58:26.421 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 352432694724517110097191288886924916916922022618 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 15 05:12:28 UTC 2022 Final Date: Mon Jun 14 05:12:27 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9a:a1:70:95:df:27:07:d7:7f:18:bb:e8:58:97:b7:11:0a:9a:0c:54] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 70358cceba7d4c56f34eb452a95c6b344f18b578 0bd850bdd286b0a8347aee481846a864c61f737d 1a854fa193f4105b1ffefd5bb722aa1a168bb282 78c726f9602be944c7cc26732e8090f2469157dc 209924e39529d0592a480f9bb170fd41d5173fb1 6484f62bae046d9c53d66e2b3997b39e10e5c68d 6ecaf3892bf8e4a960db91f732a8ce4e1fd7c2a0 646dc4a124559db90939d7d242242181dcd5fc49 cf289ea93c69f86339b4b24f0f7e77c8c50de2d5 e3453187f4dbb77ab1c6100cf3b46fc40080ae2e 6feb13e8296909e68f3f74d0a56b943dac6b0fd4 6c230aac50494bb60b2f68fb95cc9ad2f3c3c85b 6436312c6c82ab93585fc9fae29dd293e7b88ee6 51734b802fdf6d25a242ba15e65c8fba3e562fc3 d65c236607d8f54de29bac86965d3440f975efb5 6dbd33ebe1edbb4eb070ebb60d3f8eab483efe14 c39282988065f5de2e65c6b52145a37301e965a0 6a35dd877f3e4889aa8d404ff46399e66fc96b17 aff1d60f5154c7c752a7490f8d17701dcc45f64d efed89c3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [54:5f:54:43:87:66:54:6d:6f:2a:d2:90:19:b3:91:09:eb:51:81:26] modulus: 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 public exponent: 10001 ] 2022-06-15 07:03:01.367  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-15 07:03:01.370 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-15 07:03:01.373 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-15 07:03:01.374 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-15 07:03:01.374  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-15 07:03:01.375  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-15 07:03:01.375  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-15 07:03:01.375 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-15 07:03:01.376 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-15 07:03:01.376 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-15 07:03:01.382 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-15 07:03:01.383 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-15 07:03:01.383 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-15 07:03:01.383 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-15 07:03:01.675  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-15 07:03:01.676  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-15 07:03:01.676 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-15 07:03:01.677 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-15 07:03:01.678  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-15 07:03:01.679  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-15 07:03:01.680 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-15 07:03:01.680 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-15 07:03:01.681 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-15 07:03:01.683 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-15 07:03:01.684 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-15 07:03:01.684 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-15 07:03:01.685 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-15 07:03:01.686 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-15 07:03:01.686 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-15 07:03:01.687 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-15 07:03:01.691 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 352432694724517110097191288886924916916922022618 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 15 05:12:28 UTC 2022 Final Date: Mon Jun 14 05:12:27 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9a:a1:70:95:df:27:07:d7:7f:18:bb:e8:58:97:b7:11:0a:9a:0c:54] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 70358cceba7d4c56f34eb452a95c6b344f18b578 0bd850bdd286b0a8347aee481846a864c61f737d 1a854fa193f4105b1ffefd5bb722aa1a168bb282 78c726f9602be944c7cc26732e8090f2469157dc 209924e39529d0592a480f9bb170fd41d5173fb1 6484f62bae046d9c53d66e2b3997b39e10e5c68d 6ecaf3892bf8e4a960db91f732a8ce4e1fd7c2a0 646dc4a124559db90939d7d242242181dcd5fc49 cf289ea93c69f86339b4b24f0f7e77c8c50de2d5 e3453187f4dbb77ab1c6100cf3b46fc40080ae2e 6feb13e8296909e68f3f74d0a56b943dac6b0fd4 6c230aac50494bb60b2f68fb95cc9ad2f3c3c85b 6436312c6c82ab93585fc9fae29dd293e7b88ee6 51734b802fdf6d25a242ba15e65c8fba3e562fc3 d65c236607d8f54de29bac86965d3440f975efb5 6dbd33ebe1edbb4eb070ebb60d3f8eab483efe14 c39282988065f5de2e65c6b52145a37301e965a0 6a35dd877f3e4889aa8d404ff46399e66fc96b17 aff1d60f5154c7c752a7490f8d17701dcc45f64d efed89c3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a8:ff:ab:f3:7c:18:30:7a:71:6a:33:c4:3d:ff:55:71:52:68:80:53] modulus: cc9bbee3c51a29873c047d093e909791668be757c761bf7b5ea74dc247dfe9b5d3e76b0ba18bf541ae66c258c1173d0fd824cea1ad3c8b92b20f131ea85da0a6f259649ca9fbdcca5bde28bfbfde30d9017dfb3bfe78e1554a6bf271e2df70ff3055c9fd7f74c247564b119205f8e93106cb6aa6a1cab0a7f98ba2b52429545653c8c513ca9f9ea4c9fc863d94f4f0a8b916edeadc292218d26e74cc0d534bd705cea5dec0936d4ad00aed78ad026567f9f475f8810c62945e4c9853799f5d47b96c10f914466b05d3588d8205ad49d9963460bf97f59d4c997b20fb3ce5a169ef721475a39ca32a052ec16478a3600734e19749c608b97994a5b0aa31a20e17 public exponent: 10001 ] 2022-06-15 07:04:52.623  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-15 07:04:52.624 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-15 07:04:52.626 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-15 07:04:52.627 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-15 07:04:52.627  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-15 07:04:52.628  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-15 07:04:52.628  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-15 07:04:52.628 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-15 07:04:52.629 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-15 07:04:52.629 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-15 07:04:52.636 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-15 07:04:52.637 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-15 07:04:52.637 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-15 07:04:52.638 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-15 07:04:53.030  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-15 07:04:53.030  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-15 07:04:53.031 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-15 07:04:53.031 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-15 07:04:53.032  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-15 07:04:53.033  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-15 07:04:53.033 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-15 07:04:53.033 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-15 07:04:53.034 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-15 07:04:53.034 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-15 07:04:53.035 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-15 07:04:53.035 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-15 07:04:53.036 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-15 07:04:53.036 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-15 07:04:53.036 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-15 07:04:53.037 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-15 07:04:53.041 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 352432694724517110097191288886924916916922022618 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 15 05:12:28 UTC 2022 Final Date: Mon Jun 14 05:12:27 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9a:a1:70:95:df:27:07:d7:7f:18:bb:e8:58:97:b7:11:0a:9a:0c:54] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 70358cceba7d4c56f34eb452a95c6b344f18b578 0bd850bdd286b0a8347aee481846a864c61f737d 1a854fa193f4105b1ffefd5bb722aa1a168bb282 78c726f9602be944c7cc26732e8090f2469157dc 209924e39529d0592a480f9bb170fd41d5173fb1 6484f62bae046d9c53d66e2b3997b39e10e5c68d 6ecaf3892bf8e4a960db91f732a8ce4e1fd7c2a0 646dc4a124559db90939d7d242242181dcd5fc49 cf289ea93c69f86339b4b24f0f7e77c8c50de2d5 e3453187f4dbb77ab1c6100cf3b46fc40080ae2e 6feb13e8296909e68f3f74d0a56b943dac6b0fd4 6c230aac50494bb60b2f68fb95cc9ad2f3c3c85b 6436312c6c82ab93585fc9fae29dd293e7b88ee6 51734b802fdf6d25a242ba15e65c8fba3e562fc3 d65c236607d8f54de29bac86965d3440f975efb5 6dbd33ebe1edbb4eb070ebb60d3f8eab483efe14 c39282988065f5de2e65c6b52145a37301e965a0 6a35dd877f3e4889aa8d404ff46399e66fc96b17 aff1d60f5154c7c752a7490f8d17701dcc45f64d efed89c3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [10:41:b2:c6:b0:a4:51:0f:44:60:a4:6d:1f:01:51:b8:8c:b9:c1:5f] modulus: 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 public exponent: 10001 ] 2022-06-15 07:07:16.621  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-15 07:07:16.623 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-15 07:07:16.624 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-15 07:07:16.625 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-15 07:07:16.625  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-15 07:07:16.626  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-15 07:07:16.626  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-15 07:07:16.626 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-15 07:07:16.627 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-15 07:07:16.627 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-15 07:07:16.631 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-15 07:07:16.632 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-15 07:07:16.632 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-15 07:07:16.632 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-15 07:07:17.665  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-15 07:07:17.666  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-15 07:07:17.666 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-15 07:07:17.667 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-15 07:07:17.668  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-15 07:07:17.669  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-15 07:07:17.670 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-15 07:07:17.670 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-15 07:07:17.671 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-15 07:07:17.672 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-15 07:07:17.672 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-15 07:07:17.673 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-15 07:07:17.673 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-15 07:07:17.674 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-15 07:07:17.674 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-15 07:07:17.675 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-15 07:07:17.679 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 352432694724517110097191288886924916916922022618 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 15 05:12:28 UTC 2022 Final Date: Mon Jun 14 05:12:27 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9a:a1:70:95:df:27:07:d7:7f:18:bb:e8:58:97:b7:11:0a:9a:0c:54] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 70358cceba7d4c56f34eb452a95c6b344f18b578 0bd850bdd286b0a8347aee481846a864c61f737d 1a854fa193f4105b1ffefd5bb722aa1a168bb282 78c726f9602be944c7cc26732e8090f2469157dc 209924e39529d0592a480f9bb170fd41d5173fb1 6484f62bae046d9c53d66e2b3997b39e10e5c68d 6ecaf3892bf8e4a960db91f732a8ce4e1fd7c2a0 646dc4a124559db90939d7d242242181dcd5fc49 cf289ea93c69f86339b4b24f0f7e77c8c50de2d5 e3453187f4dbb77ab1c6100cf3b46fc40080ae2e 6feb13e8296909e68f3f74d0a56b943dac6b0fd4 6c230aac50494bb60b2f68fb95cc9ad2f3c3c85b 6436312c6c82ab93585fc9fae29dd293e7b88ee6 51734b802fdf6d25a242ba15e65c8fba3e562fc3 d65c236607d8f54de29bac86965d3440f975efb5 6dbd33ebe1edbb4eb070ebb60d3f8eab483efe14 c39282988065f5de2e65c6b52145a37301e965a0 6a35dd877f3e4889aa8d404ff46399e66fc96b17 aff1d60f5154c7c752a7490f8d17701dcc45f64d efed89c3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c4:9e:bc:eb:2c:6c:86:7f:62:f5:20:8d:ab:33:6d:21:36:57:96:0c] modulus: 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 public exponent: 10001 ] 2022-06-15 07:09:42.083  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-15 07:09:42.085 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-15 07:09:42.087 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-15 07:09:42.088 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-15 07:09:42.088  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-15 07:09:42.089  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-15 07:09:42.089  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-15 07:09:42.090 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-15 07:09:42.090 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-15 07:09:42.090 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-15 07:09:42.096 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-15 07:09:42.097 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-15 07:09:42.097 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-15 07:09:42.097 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-15 07:09:42.394  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-15 07:09:42.395  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-15 07:09:42.395 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-15 07:09:42.396 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-15 07:09:42.398  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-15 07:09:42.398  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-15 07:09:42.399 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-15 07:09:42.399 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-15 07:09:42.400 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-15 07:09:42.401 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-15 07:09:42.401 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-15 07:09:42.401 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-15 07:09:42.402 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-15 07:09:42.403 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-15 07:09:42.403 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-15 07:09:42.404 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-15 07:09:42.409 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 352432694724517110097191288886924916916922022618 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 15 05:12:28 UTC 2022 Final Date: Mon Jun 14 05:12:27 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9a:a1:70:95:df:27:07:d7:7f:18:bb:e8:58:97:b7:11:0a:9a:0c:54] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 70358cceba7d4c56f34eb452a95c6b344f18b578 0bd850bdd286b0a8347aee481846a864c61f737d 1a854fa193f4105b1ffefd5bb722aa1a168bb282 78c726f9602be944c7cc26732e8090f2469157dc 209924e39529d0592a480f9bb170fd41d5173fb1 6484f62bae046d9c53d66e2b3997b39e10e5c68d 6ecaf3892bf8e4a960db91f732a8ce4e1fd7c2a0 646dc4a124559db90939d7d242242181dcd5fc49 cf289ea93c69f86339b4b24f0f7e77c8c50de2d5 e3453187f4dbb77ab1c6100cf3b46fc40080ae2e 6feb13e8296909e68f3f74d0a56b943dac6b0fd4 6c230aac50494bb60b2f68fb95cc9ad2f3c3c85b 6436312c6c82ab93585fc9fae29dd293e7b88ee6 51734b802fdf6d25a242ba15e65c8fba3e562fc3 d65c236607d8f54de29bac86965d3440f975efb5 6dbd33ebe1edbb4eb070ebb60d3f8eab483efe14 c39282988065f5de2e65c6b52145a37301e965a0 6a35dd877f3e4889aa8d404ff46399e66fc96b17 aff1d60f5154c7c752a7490f8d17701dcc45f64d efed89c3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [05:28:67:6c:70:f6:e0:2f:87:54:59:07:9c:ce:ec:ac:17:62:19:22] modulus: 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 public exponent: 10001 ] 2022-06-15 07:10:02.448  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-15 07:10:02.450 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-15 07:10:02.451 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-15 07:10:02.452 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-15 07:10:02.452  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-15 07:10:02.454  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-15 07:10:02.455  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-15 07:10:02.455 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-15 07:10:02.456 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-15 07:10:02.456 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-15 07:10:02.461 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-15 07:10:02.462 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-15 07:10:02.462 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-15 07:10:02.462 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-15 07:10:02.722  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-15 07:10:02.722  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-15 07:10:02.723 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-15 07:10:02.723 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-15 07:10:02.724  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-15 07:10:02.724  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-15 07:10:02.725 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-15 07:10:02.725 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-15 07:10:02.725 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-15 07:10:02.726 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-15 07:10:02.726 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-15 07:10:02.726 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-15 07:10:02.727 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-15 07:10:02.727 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-15 07:10:02.727 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-15 07:10:02.728 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-15 07:10:02.731 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 352432694724517110097191288886924916916922022618 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 15 05:12:28 UTC 2022 Final Date: Mon Jun 14 05:12:27 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9a:a1:70:95:df:27:07:d7:7f:18:bb:e8:58:97:b7:11:0a:9a:0c:54] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 70358cceba7d4c56f34eb452a95c6b344f18b578 0bd850bdd286b0a8347aee481846a864c61f737d 1a854fa193f4105b1ffefd5bb722aa1a168bb282 78c726f9602be944c7cc26732e8090f2469157dc 209924e39529d0592a480f9bb170fd41d5173fb1 6484f62bae046d9c53d66e2b3997b39e10e5c68d 6ecaf3892bf8e4a960db91f732a8ce4e1fd7c2a0 646dc4a124559db90939d7d242242181dcd5fc49 cf289ea93c69f86339b4b24f0f7e77c8c50de2d5 e3453187f4dbb77ab1c6100cf3b46fc40080ae2e 6feb13e8296909e68f3f74d0a56b943dac6b0fd4 6c230aac50494bb60b2f68fb95cc9ad2f3c3c85b 6436312c6c82ab93585fc9fae29dd293e7b88ee6 51734b802fdf6d25a242ba15e65c8fba3e562fc3 d65c236607d8f54de29bac86965d3440f975efb5 6dbd33ebe1edbb4eb070ebb60d3f8eab483efe14 c39282988065f5de2e65c6b52145a37301e965a0 6a35dd877f3e4889aa8d404ff46399e66fc96b17 aff1d60f5154c7c752a7490f8d17701dcc45f64d efed89c3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a9:2f:7c:b9:ca:a1:cf:c3:c7:de:6f:4a:43:66:42:f6:40:6f:8e:94] modulus: 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 public exponent: 10001 ] 2022-06-15 07:12:04.337  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-15 07:12:04.340 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-15 07:12:04.344 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-15 07:12:04.345 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-15 07:12:04.345  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-15 07:12:04.346  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-15 07:12:04.346  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-15 07:12:04.347 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-15 07:12:04.347 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-15 07:12:04.348 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-15 07:12:04.353 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-15 07:12:04.354 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-15 07:12:04.354 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-15 07:12:04.355 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-15 07:12:05.041  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-15 07:12:05.041  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-15 07:12:05.042 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-15 07:12:05.042 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-15 07:12:05.043  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-15 07:12:05.044  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-15 07:12:05.044 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-15 07:12:05.044 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-15 07:12:05.045 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-15 07:12:05.046 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-15 07:12:05.046 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-15 07:12:05.047 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-15 07:12:05.048 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-15 07:12:05.048 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-15 07:12:05.048 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-15 07:12:05.049 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-15 07:12:05.054 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 352432694724517110097191288886924916916922022618 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 15 05:12:28 UTC 2022 Final Date: Mon Jun 14 05:12:27 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9a:a1:70:95:df:27:07:d7:7f:18:bb:e8:58:97:b7:11:0a:9a:0c:54] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 70358cceba7d4c56f34eb452a95c6b344f18b578 0bd850bdd286b0a8347aee481846a864c61f737d 1a854fa193f4105b1ffefd5bb722aa1a168bb282 78c726f9602be944c7cc26732e8090f2469157dc 209924e39529d0592a480f9bb170fd41d5173fb1 6484f62bae046d9c53d66e2b3997b39e10e5c68d 6ecaf3892bf8e4a960db91f732a8ce4e1fd7c2a0 646dc4a124559db90939d7d242242181dcd5fc49 cf289ea93c69f86339b4b24f0f7e77c8c50de2d5 e3453187f4dbb77ab1c6100cf3b46fc40080ae2e 6feb13e8296909e68f3f74d0a56b943dac6b0fd4 6c230aac50494bb60b2f68fb95cc9ad2f3c3c85b 6436312c6c82ab93585fc9fae29dd293e7b88ee6 51734b802fdf6d25a242ba15e65c8fba3e562fc3 d65c236607d8f54de29bac86965d3440f975efb5 6dbd33ebe1edbb4eb070ebb60d3f8eab483efe14 c39282988065f5de2e65c6b52145a37301e965a0 6a35dd877f3e4889aa8d404ff46399e66fc96b17 aff1d60f5154c7c752a7490f8d17701dcc45f64d efed89c3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [df:90:2c:cd:f9:c1:da:f6:e8:b4:b7:1a:90:01:2b:75:ff:00:5f:7b] modulus: af29a7fa3de07683b3fcc72adcaee46ddfda9b8d04c659e2000a39091116a6259a917568d58faf5065b41cce99f6af9f23c3f190fc9032f0624c996a6c6a98bcf6c0afbb268c08b824322448090c70ae9611e2f3693e971243e89605fd050f9a6fbd536e78b88a490e2231118133f9893b2957d134152f385e7439116eac2e7570a0068d6095384fc2c232f2cbe9d19dc0b28da0a18ac600cacad92cf0c3cda9c6b69b42981465a1459997aaba95726c3cf1dd67b181a90a77f11fef5b625e5e6f16e8bd1dbca7201c6dfa7658313185189f0fa1f7a70bfcf606be13344eb8511d29594d5e8aeeb6450095f811f9464b418b6889ce447cc1c39abe111a289ceb public exponent: 10001 ] 2022-06-15 07:16:01.553  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-15 07:16:01.555 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-15 07:16:01.557 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-15 07:16:01.558 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-15 07:16:01.559  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-15 07:16:01.559  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-15 07:16:01.559  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-15 07:16:01.560 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-15 07:16:01.560 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-15 07:16:01.560 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-15 07:16:01.565 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-15 07:16:01.566 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-15 07:16:01.566 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-15 07:16:01.566 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-15 07:16:01.865  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-15 07:16:01.865  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-15 07:16:01.866 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-15 07:16:01.866 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-15 07:16:01.867  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-15 07:16:01.868  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-15 07:16:01.868 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-15 07:16:01.868 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-15 07:16:01.868 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-15 07:16:01.869 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-15 07:16:01.869 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-15 07:16:01.870 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-15 07:16:01.870 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-15 07:16:01.870 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-15 07:16:01.871 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-15 07:16:01.871 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-15 07:16:01.875 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 352432694724517110097191288886924916916922022618 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 15 05:12:28 UTC 2022 Final Date: Mon Jun 14 05:12:27 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9a:a1:70:95:df:27:07:d7:7f:18:bb:e8:58:97:b7:11:0a:9a:0c:54] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 70358cceba7d4c56f34eb452a95c6b344f18b578 0bd850bdd286b0a8347aee481846a864c61f737d 1a854fa193f4105b1ffefd5bb722aa1a168bb282 78c726f9602be944c7cc26732e8090f2469157dc 209924e39529d0592a480f9bb170fd41d5173fb1 6484f62bae046d9c53d66e2b3997b39e10e5c68d 6ecaf3892bf8e4a960db91f732a8ce4e1fd7c2a0 646dc4a124559db90939d7d242242181dcd5fc49 cf289ea93c69f86339b4b24f0f7e77c8c50de2d5 e3453187f4dbb77ab1c6100cf3b46fc40080ae2e 6feb13e8296909e68f3f74d0a56b943dac6b0fd4 6c230aac50494bb60b2f68fb95cc9ad2f3c3c85b 6436312c6c82ab93585fc9fae29dd293e7b88ee6 51734b802fdf6d25a242ba15e65c8fba3e562fc3 d65c236607d8f54de29bac86965d3440f975efb5 6dbd33ebe1edbb4eb070ebb60d3f8eab483efe14 c39282988065f5de2e65c6b52145a37301e965a0 6a35dd877f3e4889aa8d404ff46399e66fc96b17 aff1d60f5154c7c752a7490f8d17701dcc45f64d efed89c3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [00:a0:50:f0:c4:39:78:0a:75:b8:45:53:97:d3:d8:21:89:a8:04:50] modulus: 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 public exponent: 10001 ] 2022-06-15 07:20:38.584  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-15 07:20:38.587 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-15 07:20:38.589 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-15 07:20:38.590 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-15 07:20:38.591  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-15 07:20:38.592  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-15 07:20:38.593  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-15 07:20:38.594 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-15 07:20:38.594 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-15 07:20:38.595 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-15 07:20:38.604 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-15 07:20:38.606 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-15 07:20:38.606 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-15 07:20:38.607 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-15 07:20:38.850  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-15 07:20:38.852  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-15 07:20:38.852 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-15 07:20:38.853 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-15 07:20:38.854  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-15 07:20:38.854  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-15 07:20:38.855 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-15 07:20:38.855 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-15 07:20:38.855 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-15 07:20:38.856 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-15 07:20:38.856 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-15 07:20:38.857 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-15 07:20:38.857 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-15 07:20:38.858 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-15 07:20:38.858 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-15 07:20:38.859 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-15 07:20:38.862 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 352432694724517110097191288886924916916922022618 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 15 05:12:28 UTC 2022 Final Date: Mon Jun 14 05:12:27 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9a:a1:70:95:df:27:07:d7:7f:18:bb:e8:58:97:b7:11:0a:9a:0c:54] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 70358cceba7d4c56f34eb452a95c6b344f18b578 0bd850bdd286b0a8347aee481846a864c61f737d 1a854fa193f4105b1ffefd5bb722aa1a168bb282 78c726f9602be944c7cc26732e8090f2469157dc 209924e39529d0592a480f9bb170fd41d5173fb1 6484f62bae046d9c53d66e2b3997b39e10e5c68d 6ecaf3892bf8e4a960db91f732a8ce4e1fd7c2a0 646dc4a124559db90939d7d242242181dcd5fc49 cf289ea93c69f86339b4b24f0f7e77c8c50de2d5 e3453187f4dbb77ab1c6100cf3b46fc40080ae2e 6feb13e8296909e68f3f74d0a56b943dac6b0fd4 6c230aac50494bb60b2f68fb95cc9ad2f3c3c85b 6436312c6c82ab93585fc9fae29dd293e7b88ee6 51734b802fdf6d25a242ba15e65c8fba3e562fc3 d65c236607d8f54de29bac86965d3440f975efb5 6dbd33ebe1edbb4eb070ebb60d3f8eab483efe14 c39282988065f5de2e65c6b52145a37301e965a0 6a35dd877f3e4889aa8d404ff46399e66fc96b17 aff1d60f5154c7c752a7490f8d17701dcc45f64d efed89c3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [18:b9:05:6a:1d:4f:b2:b2:85:70:57:11:08:1a:a4:65:b7:a7:3e:b5] modulus: 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 public exponent: 10001 ] 2022-06-15 07:25:09.046  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-15 07:25:09.048 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-15 07:25:09.049 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-15 07:25:09.050 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-15 07:25:09.050  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-15 07:25:09.050  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-15 07:25:09.051  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-15 07:25:09.051 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-15 07:25:09.051 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-15 07:25:09.052 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-15 07:25:09.057 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-15 07:25:09.058 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-15 07:25:09.058 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-15 07:25:09.058 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-15 07:25:09.510  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-15 07:25:09.511  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-15 07:25:09.512 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-15 07:25:09.512 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-15 07:25:09.513  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-15 07:25:09.514  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-15 07:25:09.514 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-15 07:25:09.514 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-15 07:25:09.517 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-15 07:25:09.518 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-15 07:25:09.518 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-15 07:25:09.518 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-15 07:25:09.520 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-15 07:25:09.520 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-15 07:25:09.520 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-15 07:25:09.522 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-15 07:25:09.528 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 352432694724517110097191288886924916916922022618 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 15 05:12:28 UTC 2022 Final Date: Mon Jun 14 05:12:27 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9a:a1:70:95:df:27:07:d7:7f:18:bb:e8:58:97:b7:11:0a:9a:0c:54] modulus: bed468283037f9b5ff38e1ae3287c1dd768a714c8016e6b69eb16c490e98cf23eb2eb109bbca517635ac215e12102d317646a3eb0270ebe66cce27447358454b9508f365084ec87c1db30f2f4058fdba047bc1693f217038080d2b3d65c574e739d8013b680160a3954daac7128a8684fb67bc5a4f5d2bd813822ee519991e548db692e975a9531f419da4d47a3588d93aeab1f5a02bc0dba2012ad99b0724c1eed32480a8e9a7d784dbb14e63d3c203dff6fb39a6d369f407c4e7895a0708e4d15c5bd35366102096bd46f99a22466a4e4a92e1dc187c075ae80c62296f2b972e0e4b0d150adc1d7bbf5285d5622db66b4db8346d6e05ad7abf104e15d9d969d48002acd9c835a6bb284ea24d7421f342cc7d95d09857d22b0d88f7db950d48624f51a3055cc99140911bd09fd2da70e66d54319c1991fc9a24c2ba302c875be2f8d5b183032af1349d255be17ffe87477aeb99583e08d4013f93e328968bec3fb9e681f3898ba5d27143d0a9525a49b39c6d5ee263fc2c443594bb76836723 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 70358cceba7d4c56f34eb452a95c6b344f18b578 0bd850bdd286b0a8347aee481846a864c61f737d 1a854fa193f4105b1ffefd5bb722aa1a168bb282 78c726f9602be944c7cc26732e8090f2469157dc 209924e39529d0592a480f9bb170fd41d5173fb1 6484f62bae046d9c53d66e2b3997b39e10e5c68d 6ecaf3892bf8e4a960db91f732a8ce4e1fd7c2a0 646dc4a124559db90939d7d242242181dcd5fc49 cf289ea93c69f86339b4b24f0f7e77c8c50de2d5 e3453187f4dbb77ab1c6100cf3b46fc40080ae2e 6feb13e8296909e68f3f74d0a56b943dac6b0fd4 6c230aac50494bb60b2f68fb95cc9ad2f3c3c85b 6436312c6c82ab93585fc9fae29dd293e7b88ee6 51734b802fdf6d25a242ba15e65c8fba3e562fc3 d65c236607d8f54de29bac86965d3440f975efb5 6dbd33ebe1edbb4eb070ebb60d3f8eab483efe14 c39282988065f5de2e65c6b52145a37301e965a0 6a35dd877f3e4889aa8d404ff46399e66fc96b17 aff1d60f5154c7c752a7490f8d17701dcc45f64d efed89c3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7d:13:b0:e7:a8:46:7e:bb:0a:4f:5d:ee:52:d5:33:45:34:75:1e:d6] modulus: d0f247c40467803b1a867be4ad40e4767098e8ac4677f54cd1a869e92c8b45b2314617ccf645c96b24db0645f83b470da13f77f87c488008a3951608f2f155fdceb798b6970dab24e9423d8f0783d2bf54a7728ed5c882e4065aa0910c29b573bcc36235b822d70609f0d4ebe8c03c43766efed5c2dc41c95b818c4866c20b7b93284f04a138fb9b7c9064e9621332c550297ad23ed79de857391dbad81e30921c021109687a473d4bb74841931af6eca2c1ce3868f2e71dc82905932333ab53c3e2cdcd838bd59b6afd15d3ced269d9c835b43af8484903abbb331a8f7665be2b10e0bce1ebfc1beb524e9c562eeb6e5451ec3655c405b7c50678185d5f48a5 public exponent: 10001 ] 2022-06-15 07:30:01.374  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-15 07:30:01.376 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-15 07:30:01.378 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-15 07:30:01.378 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-15 07:30:01.379  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-15 07:30:01.380  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-15 07:30:01.381  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-15 07:30:01.381 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-15 07:30:01.381 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-15 07:30:01.382 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-15 07:30:01.387 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-15 07:30:01.388 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-15 07:30:01.388 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-15 07:30:01.388 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-15 07:30:01.775  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-15 07:30:01.776  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-15 07:30:01.776 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-15 07:30:01.777 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-15 07:30:01.778  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-15 07:30:01.779  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-15 07:30:01.779 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-15 07:30:01.779 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-15 07:30:01.779 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-15 07:30:01.780 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-15 07:30:01.780 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-15 07:30:01.781 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-15 07:30:01.781 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-15 07:30:01.781 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-15 07:30:01.782 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-15 07:30:01.782 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-15 07:30:01.786 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 352432694724517110097191288886924916916922022618 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 15 05:12:28 UTC 2022 Final Date: Mon Jun 14 05:12:27 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9a:a1:70:95:df:27:07:d7:7f:18:bb:e8:58:97:b7:11:0a:9a:0c:54] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 70358cceba7d4c56f34eb452a95c6b344f18b578 0bd850bdd286b0a8347aee481846a864c61f737d 1a854fa193f4105b1ffefd5bb722aa1a168bb282 78c726f9602be944c7cc26732e8090f2469157dc 209924e39529d0592a480f9bb170fd41d5173fb1 6484f62bae046d9c53d66e2b3997b39e10e5c68d 6ecaf3892bf8e4a960db91f732a8ce4e1fd7c2a0 646dc4a124559db90939d7d242242181dcd5fc49 cf289ea93c69f86339b4b24f0f7e77c8c50de2d5 e3453187f4dbb77ab1c6100cf3b46fc40080ae2e 6feb13e8296909e68f3f74d0a56b943dac6b0fd4 6c230aac50494bb60b2f68fb95cc9ad2f3c3c85b 6436312c6c82ab93585fc9fae29dd293e7b88ee6 51734b802fdf6d25a242ba15e65c8fba3e562fc3 d65c236607d8f54de29bac86965d3440f975efb5 6dbd33ebe1edbb4eb070ebb60d3f8eab483efe14 c39282988065f5de2e65c6b52145a37301e965a0 6a35dd877f3e4889aa8d404ff46399e66fc96b17 aff1d60f5154c7c752a7490f8d17701dcc45f64d efed89c3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6e:53:21:d2:c6:b6:62:88:bb:b8:8e:7f:5c:a6:99:14:21:fa:3b:be] modulus: 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 public exponent: 10001 ]