2022-06-22 05:44:48,436 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-06-22 05:44:51,219 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-06-22 05:44:52.866  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Jun 22, 2022 5:44:56 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jun 22, 2022 5:44:56 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jun 22, 2022 5:44:56 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jun 22, 2022 5:44:57 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-06-22 05:44:58.490 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-06-22 05:44:59.088  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-06-22 05:44:59.449  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-06-22 05:45:01.290 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-06-22 05:45:01.298 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-06-22 05:45:01.302 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-06-22 05:45:01.311 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-06-22 05:45:01.395 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-06-22 05:45:01.402 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-06-22 05:45:01.769 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-06-22 05:45:04.083 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jun 22, 2022 5:45:05 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-06-22 05:45:06.728  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 20.813 seconds (JVM running for 26.959) Jun 22, 2022 5:45:13 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-06-22 06:49:16.770  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-22 06:49:16.854 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-22 06:49:17.023 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-22 06:49:17.035 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-22 06:49:17.090  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-22 06:49:17.095  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-22 06:49:17.097  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-22 06:49:17.100 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-22 06:49:17.101 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-22 06:49:17.113 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-22 06:49:17.127 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-22 06:49:17.132 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-22 06:49:17.368 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-22 06:49:17.377 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-22 06:49:17.378 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-22 06:49:17.387 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-22 06:49:19.031  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-22 06:49:19.047  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-22 06:49:19.049 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-22 06:49:19.052 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-22 06:49:19.080  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-22 06:49:19.082  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-22 06:49:19.085 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 06:49:19.086 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-22 06:49:19.087 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-22 06:49:19.119 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 06:49:19.120 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-22 06:49:19.121 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-22 06:49:19.134 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 06:49:19.136 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-22 06:49:19.137 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-22 06:49:19.164 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-22 06:49:19.268 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 163854456281514721574663494806366618526828341794 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 22 05:21:26 UTC 2022 Final Date: Mon Jun 21 05:21:25 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c3:3c:ef:6d:5c:0a:f3:02:58:49:80:a2:10:37:a7:4e:8a:aa:5a:83] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: d393aaf2914d163e135a6d84d238979fa4edb18e 8a8f2ee08090b0918138131e10d245d6449ee4cf 41cb5087dba2bb2acd0cbc0b07690e7ace2b45fe cefaa61964129da418e7bea9dca4488699a3019e 87b2ccf5809320df79a71a6afc71f7a1918d44a2 a0226fe59948bf3f82909d1b1579d0bd2c54aeb1 954e427e865abc8305b45cfe8ef64b946ac58b12 5a86a3c398e677ac924d6bf1dd1fab42a7ae22ab 684fea302a1fcadf86f3dd82f999e5c395c6ccf5 166ed9a14eb59339212c43b4e754b97ad2d1ebcb e7a2a3130cebff30e0eda746c310522ad61d0d4f aa1967deb4d50abb70c166428feff947bf525e05 d8cb2c1394b3bd4637bd9bbba32f8010a71f8feb 2717b16df8b280b160227230578d7571e12d3bb7 75cc4472b011eae0466ebf73dd70a6c9c318c6a4 c92a62dd3f7fec0fea40a871e37cd96202593d4c a34cd93b9848ef11fdd8c8430171196d5a2dd3f5 35560a0a11b1a2b48e3fa63615b8d0c77233a600 d571ee89296acc3345a643663891bec3d05ba9b6 21306b50 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [51:e1:24:ba:bc:eb:81:ef:41:4a:72:90:08:90:d4:03:30:e9:89:8b] modulus: d9d6c8e5dcc42bf811a8561e41beeb1cc33b8a26f4efd87dad68b18c8e8fb4a5e02873c624e6b3a1f1061b371b93eb7782567bde67ed9cee6fd4912128335581541af7f9c8b44a19010ad5b06f784ec1fcd820b434f2750db38c1935e264b8aaec6b7c1f78fa12c70869e5456b12576e8215f6831ec189c78d7869676c9bd14ac0994213a3f4ed13da9674712f9a6aef0e5699e543133d1e294a9e5a6c27cfa807d4ac29c865f480cc10a5a817efed163d7d6b419886a0f40a781698e52375bae4587c83b652d5563dbc2b0ae08ebecc0dd50357a4fca68ffd06c89b6e61200784bbc0383a0bdca5fa1da51a407b4c622f3ea3ba6eea8932d855e1adde680445 public exponent: 10001 ] 2022-06-22 06:51:04.372  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-22 06:51:04.376 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-22 06:51:04.380 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-22 06:51:04.382 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-22 06:51:04.383  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-22 06:51:04.385  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-22 06:51:04.387  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-22 06:51:04.389 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-22 06:51:04.390 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-22 06:51:04.391 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-22 06:51:04.436 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-22 06:51:04.440 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-22 06:51:04.442 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-22 06:51:04.443 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-22 06:51:04.751  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-22 06:51:04.752  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-22 06:51:04.753 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-22 06:51:04.754 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-22 06:51:04.767  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-22 06:51:04.768  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-22 06:51:04.770 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 06:51:04.771 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-22 06:51:04.771 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-22 06:51:04.775 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 06:51:04.776 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-22 06:51:04.776 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-22 06:51:04.783 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 06:51:04.786 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-22 06:51:04.788 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-22 06:51:04.795 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-22 06:51:04.824 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 163854456281514721574663494806366618526828341794 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 22 05:21:26 UTC 2022 Final Date: Mon Jun 21 05:21:25 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c3:3c:ef:6d:5c:0a:f3:02:58:49:80:a2:10:37:a7:4e:8a:aa:5a:83] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: d393aaf2914d163e135a6d84d238979fa4edb18e 8a8f2ee08090b0918138131e10d245d6449ee4cf 41cb5087dba2bb2acd0cbc0b07690e7ace2b45fe cefaa61964129da418e7bea9dca4488699a3019e 87b2ccf5809320df79a71a6afc71f7a1918d44a2 a0226fe59948bf3f82909d1b1579d0bd2c54aeb1 954e427e865abc8305b45cfe8ef64b946ac58b12 5a86a3c398e677ac924d6bf1dd1fab42a7ae22ab 684fea302a1fcadf86f3dd82f999e5c395c6ccf5 166ed9a14eb59339212c43b4e754b97ad2d1ebcb e7a2a3130cebff30e0eda746c310522ad61d0d4f aa1967deb4d50abb70c166428feff947bf525e05 d8cb2c1394b3bd4637bd9bbba32f8010a71f8feb 2717b16df8b280b160227230578d7571e12d3bb7 75cc4472b011eae0466ebf73dd70a6c9c318c6a4 c92a62dd3f7fec0fea40a871e37cd96202593d4c a34cd93b9848ef11fdd8c8430171196d5a2dd3f5 35560a0a11b1a2b48e3fa63615b8d0c77233a600 d571ee89296acc3345a643663891bec3d05ba9b6 21306b50 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [36:0a:c6:be:11:9f:86:56:b0:2c:ab:96:d4:71:d9:f9:e8:c6:f2:73] modulus: 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 public exponent: 10001 ] 2022-06-22 06:52:20.236  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-22 06:52:20.238 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-22 06:52:20.245 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-22 06:52:20.249 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-22 06:52:20.253  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-22 06:52:20.264  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-22 06:52:20.266  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-22 06:52:20.266 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-22 06:52:20.267 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-22 06:52:20.277 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-22 06:52:20.303 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-22 06:52:20.308 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-22 06:52:20.309 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-22 06:52:20.310 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-22 06:52:20.569  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-22 06:52:20.570  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-22 06:52:20.571 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-22 06:52:20.572 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-22 06:52:20.576  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-22 06:52:20.577  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-22 06:52:20.579 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 06:52:20.581 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-22 06:52:20.581 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-22 06:52:20.583 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 06:52:20.584 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-22 06:52:20.585 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-22 06:52:20.587 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 06:52:20.587 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-22 06:52:20.588 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-22 06:52:20.590 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-22 06:52:20.614 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 163854456281514721574663494806366618526828341794 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 22 05:21:26 UTC 2022 Final Date: Mon Jun 21 05:21:25 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c3:3c:ef:6d:5c:0a:f3:02:58:49:80:a2:10:37:a7:4e:8a:aa:5a:83] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: d393aaf2914d163e135a6d84d238979fa4edb18e 8a8f2ee08090b0918138131e10d245d6449ee4cf 41cb5087dba2bb2acd0cbc0b07690e7ace2b45fe cefaa61964129da418e7bea9dca4488699a3019e 87b2ccf5809320df79a71a6afc71f7a1918d44a2 a0226fe59948bf3f82909d1b1579d0bd2c54aeb1 954e427e865abc8305b45cfe8ef64b946ac58b12 5a86a3c398e677ac924d6bf1dd1fab42a7ae22ab 684fea302a1fcadf86f3dd82f999e5c395c6ccf5 166ed9a14eb59339212c43b4e754b97ad2d1ebcb e7a2a3130cebff30e0eda746c310522ad61d0d4f aa1967deb4d50abb70c166428feff947bf525e05 d8cb2c1394b3bd4637bd9bbba32f8010a71f8feb 2717b16df8b280b160227230578d7571e12d3bb7 75cc4472b011eae0466ebf73dd70a6c9c318c6a4 c92a62dd3f7fec0fea40a871e37cd96202593d4c a34cd93b9848ef11fdd8c8430171196d5a2dd3f5 35560a0a11b1a2b48e3fa63615b8d0c77233a600 d571ee89296acc3345a643663891bec3d05ba9b6 21306b50 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [11:8c:79:72:ba:34:c0:11:a9:3f:07:6f:0b:43:8b:c9:df:67:c2:c5] modulus: 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 public exponent: 10001 ] 2022-06-22 06:54:23.369  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-22 06:54:23.373 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-22 06:54:23.379 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-22 06:54:23.382 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-22 06:54:23.383  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-22 06:54:23.424  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-22 06:54:23.427  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-22 06:54:23.432 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-22 06:54:23.441 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-22 06:54:23.443 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-22 06:54:23.471 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-22 06:54:23.473 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-22 06:54:23.475 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-22 06:54:23.476 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-22 06:54:23.763  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-22 06:54:23.765  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-22 06:54:23.774 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-22 06:54:23.776 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-22 06:54:23.786  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-22 06:54:23.788  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-22 06:54:23.800 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 06:54:23.801 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-22 06:54:23.802 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-22 06:54:23.804 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 06:54:23.804 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-22 06:54:23.805 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-22 06:54:23.808 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 06:54:23.809 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-22 06:54:23.810 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-22 06:54:23.811 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-22 06:54:23.828 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 163854456281514721574663494806366618526828341794 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 22 05:21:26 UTC 2022 Final Date: Mon Jun 21 05:21:25 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c3:3c:ef:6d:5c:0a:f3:02:58:49:80:a2:10:37:a7:4e:8a:aa:5a:83] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: d393aaf2914d163e135a6d84d238979fa4edb18e 8a8f2ee08090b0918138131e10d245d6449ee4cf 41cb5087dba2bb2acd0cbc0b07690e7ace2b45fe cefaa61964129da418e7bea9dca4488699a3019e 87b2ccf5809320df79a71a6afc71f7a1918d44a2 a0226fe59948bf3f82909d1b1579d0bd2c54aeb1 954e427e865abc8305b45cfe8ef64b946ac58b12 5a86a3c398e677ac924d6bf1dd1fab42a7ae22ab 684fea302a1fcadf86f3dd82f999e5c395c6ccf5 166ed9a14eb59339212c43b4e754b97ad2d1ebcb e7a2a3130cebff30e0eda746c310522ad61d0d4f aa1967deb4d50abb70c166428feff947bf525e05 d8cb2c1394b3bd4637bd9bbba32f8010a71f8feb 2717b16df8b280b160227230578d7571e12d3bb7 75cc4472b011eae0466ebf73dd70a6c9c318c6a4 c92a62dd3f7fec0fea40a871e37cd96202593d4c a34cd93b9848ef11fdd8c8430171196d5a2dd3f5 35560a0a11b1a2b48e3fa63615b8d0c77233a600 d571ee89296acc3345a643663891bec3d05ba9b6 21306b50 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8a:e6:d1:18:d8:c5:43:b7:00:c9:59:b4:b4:a8:3d:8c:a6:b9:de:ea] modulus: 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 public exponent: 10001 ] 2022-06-22 06:58:24.826  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-22 06:58:24.831 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-22 06:58:24.834 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-22 06:58:24.836 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-22 06:58:24.837  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-22 06:58:24.838  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-22 06:58:24.838  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-22 06:58:24.839 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-22 06:58:24.839 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-22 06:58:24.840 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-22 06:58:24.857 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-22 06:58:24.864 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-22 06:58:24.866 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-22 06:58:24.867 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-22 06:58:25.174  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-22 06:58:25.175  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-22 06:58:25.176 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-22 06:58:25.176 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-22 06:58:25.183  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-22 06:58:25.184  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-22 06:58:25.185 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 06:58:25.186 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-22 06:58:25.186 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-22 06:58:25.191 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 06:58:25.192 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-22 06:58:25.193 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-22 06:58:25.195 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 06:58:25.199 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-22 06:58:25.199 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-22 06:58:25.201 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-22 06:58:25.209 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 163854456281514721574663494806366618526828341794 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 22 05:21:26 UTC 2022 Final Date: Mon Jun 21 05:21:25 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c3:3c:ef:6d:5c:0a:f3:02:58:49:80:a2:10:37:a7:4e:8a:aa:5a:83] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: d393aaf2914d163e135a6d84d238979fa4edb18e 8a8f2ee08090b0918138131e10d245d6449ee4cf 41cb5087dba2bb2acd0cbc0b07690e7ace2b45fe cefaa61964129da418e7bea9dca4488699a3019e 87b2ccf5809320df79a71a6afc71f7a1918d44a2 a0226fe59948bf3f82909d1b1579d0bd2c54aeb1 954e427e865abc8305b45cfe8ef64b946ac58b12 5a86a3c398e677ac924d6bf1dd1fab42a7ae22ab 684fea302a1fcadf86f3dd82f999e5c395c6ccf5 166ed9a14eb59339212c43b4e754b97ad2d1ebcb e7a2a3130cebff30e0eda746c310522ad61d0d4f aa1967deb4d50abb70c166428feff947bf525e05 d8cb2c1394b3bd4637bd9bbba32f8010a71f8feb 2717b16df8b280b160227230578d7571e12d3bb7 75cc4472b011eae0466ebf73dd70a6c9c318c6a4 c92a62dd3f7fec0fea40a871e37cd96202593d4c a34cd93b9848ef11fdd8c8430171196d5a2dd3f5 35560a0a11b1a2b48e3fa63615b8d0c77233a600 d571ee89296acc3345a643663891bec3d05ba9b6 21306b50 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [59:e7:6a:9f:b6:07:eb:7a:35:bd:f0:b0:34:33:19:c8:89:47:d2:c1] modulus: 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 public exponent: 10001 ] 2022-06-22 07:02:23.574  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-22 07:02:23.578 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-22 07:02:23.582 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-22 07:02:23.584 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-22 07:02:23.584  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-22 07:02:23.586  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-22 07:02:23.586  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-22 07:02:23.587 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-22 07:02:23.588 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-22 07:02:23.588 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-22 07:02:23.608 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-22 07:02:23.618 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-22 07:02:23.619 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-22 07:02:23.620 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-22 07:02:23.907  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-22 07:02:23.909  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-22 07:02:23.909 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-22 07:02:23.910 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-22 07:02:23.913  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-22 07:02:23.913  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-22 07:02:23.915 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 07:02:23.915 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-22 07:02:23.916 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-22 07:02:23.930 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 07:02:23.931 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-22 07:02:23.931 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-22 07:02:23.937 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 07:02:23.938 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-22 07:02:23.939 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-22 07:02:23.940 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-22 07:02:23.948 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 163854456281514721574663494806366618526828341794 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 22 05:21:26 UTC 2022 Final Date: Mon Jun 21 05:21:25 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c3:3c:ef:6d:5c:0a:f3:02:58:49:80:a2:10:37:a7:4e:8a:aa:5a:83] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: d393aaf2914d163e135a6d84d238979fa4edb18e 8a8f2ee08090b0918138131e10d245d6449ee4cf 41cb5087dba2bb2acd0cbc0b07690e7ace2b45fe cefaa61964129da418e7bea9dca4488699a3019e 87b2ccf5809320df79a71a6afc71f7a1918d44a2 a0226fe59948bf3f82909d1b1579d0bd2c54aeb1 954e427e865abc8305b45cfe8ef64b946ac58b12 5a86a3c398e677ac924d6bf1dd1fab42a7ae22ab 684fea302a1fcadf86f3dd82f999e5c395c6ccf5 166ed9a14eb59339212c43b4e754b97ad2d1ebcb e7a2a3130cebff30e0eda746c310522ad61d0d4f aa1967deb4d50abb70c166428feff947bf525e05 d8cb2c1394b3bd4637bd9bbba32f8010a71f8feb 2717b16df8b280b160227230578d7571e12d3bb7 75cc4472b011eae0466ebf73dd70a6c9c318c6a4 c92a62dd3f7fec0fea40a871e37cd96202593d4c a34cd93b9848ef11fdd8c8430171196d5a2dd3f5 35560a0a11b1a2b48e3fa63615b8d0c77233a600 d571ee89296acc3345a643663891bec3d05ba9b6 21306b50 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3d:c7:e9:4b:c2:c0:1f:ff:87:a3:ed:47:69:a9:8e:dd:5b:c3:49:77] modulus: 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 public exponent: 10001 ] 2022-06-22 07:04:51.705  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-22 07:04:51.716 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-22 07:04:51.721 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-22 07:04:51.723 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-22 07:04:51.728  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-22 07:04:51.729  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-22 07:04:51.729  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-22 07:04:51.730 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-22 07:04:51.731 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-22 07:04:51.732 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-22 07:04:51.740 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-22 07:04:51.742 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-22 07:04:51.742 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-22 07:04:51.743 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-22 07:04:52.151  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-22 07:04:52.152  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-22 07:04:52.152 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-22 07:04:52.152 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-22 07:04:52.154  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-22 07:04:52.154  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-22 07:04:52.155 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 07:04:52.155 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-22 07:04:52.156 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-22 07:04:52.157 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 07:04:52.157 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-22 07:04:52.158 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-22 07:04:52.159 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 07:04:52.160 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-22 07:04:52.160 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-22 07:04:52.162 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-22 07:04:52.172 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 163854456281514721574663494806366618526828341794 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 22 05:21:26 UTC 2022 Final Date: Mon Jun 21 05:21:25 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c3:3c:ef:6d:5c:0a:f3:02:58:49:80:a2:10:37:a7:4e:8a:aa:5a:83] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: d393aaf2914d163e135a6d84d238979fa4edb18e 8a8f2ee08090b0918138131e10d245d6449ee4cf 41cb5087dba2bb2acd0cbc0b07690e7ace2b45fe cefaa61964129da418e7bea9dca4488699a3019e 87b2ccf5809320df79a71a6afc71f7a1918d44a2 a0226fe59948bf3f82909d1b1579d0bd2c54aeb1 954e427e865abc8305b45cfe8ef64b946ac58b12 5a86a3c398e677ac924d6bf1dd1fab42a7ae22ab 684fea302a1fcadf86f3dd82f999e5c395c6ccf5 166ed9a14eb59339212c43b4e754b97ad2d1ebcb e7a2a3130cebff30e0eda746c310522ad61d0d4f aa1967deb4d50abb70c166428feff947bf525e05 d8cb2c1394b3bd4637bd9bbba32f8010a71f8feb 2717b16df8b280b160227230578d7571e12d3bb7 75cc4472b011eae0466ebf73dd70a6c9c318c6a4 c92a62dd3f7fec0fea40a871e37cd96202593d4c a34cd93b9848ef11fdd8c8430171196d5a2dd3f5 35560a0a11b1a2b48e3fa63615b8d0c77233a600 d571ee89296acc3345a643663891bec3d05ba9b6 21306b50 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1c:d5:62:60:62:31:b2:8a:31:e5:e5:3b:8e:86:08:93:a5:8d:c6:d0] modulus: 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 public exponent: 10001 ] 2022-06-22 07:07:37.607  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-22 07:07:37.612 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-22 07:07:37.617 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-22 07:07:37.618 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-22 07:07:37.619  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-22 07:07:37.620  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-22 07:07:37.621  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-22 07:07:37.621 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-22 07:07:37.622 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-22 07:07:37.622 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-22 07:07:37.630 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-22 07:07:37.633 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-22 07:07:37.633 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-22 07:07:37.634 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-22 07:07:37.989  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-22 07:07:37.990  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-22 07:07:37.991 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-22 07:07:37.991 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-22 07:07:37.994  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-22 07:07:37.994  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-22 07:07:37.996 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 07:07:37.996 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-22 07:07:37.996 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-22 07:07:37.997 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 07:07:37.998 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-22 07:07:37.998 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-22 07:07:37.999 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 07:07:38.000 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-22 07:07:38.000 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-22 07:07:38.002 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-22 07:07:38.011 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 163854456281514721574663494806366618526828341794 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 22 05:21:26 UTC 2022 Final Date: Mon Jun 21 05:21:25 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c3:3c:ef:6d:5c:0a:f3:02:58:49:80:a2:10:37:a7:4e:8a:aa:5a:83] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: d393aaf2914d163e135a6d84d238979fa4edb18e 8a8f2ee08090b0918138131e10d245d6449ee4cf 41cb5087dba2bb2acd0cbc0b07690e7ace2b45fe cefaa61964129da418e7bea9dca4488699a3019e 87b2ccf5809320df79a71a6afc71f7a1918d44a2 a0226fe59948bf3f82909d1b1579d0bd2c54aeb1 954e427e865abc8305b45cfe8ef64b946ac58b12 5a86a3c398e677ac924d6bf1dd1fab42a7ae22ab 684fea302a1fcadf86f3dd82f999e5c395c6ccf5 166ed9a14eb59339212c43b4e754b97ad2d1ebcb e7a2a3130cebff30e0eda746c310522ad61d0d4f aa1967deb4d50abb70c166428feff947bf525e05 d8cb2c1394b3bd4637bd9bbba32f8010a71f8feb 2717b16df8b280b160227230578d7571e12d3bb7 75cc4472b011eae0466ebf73dd70a6c9c318c6a4 c92a62dd3f7fec0fea40a871e37cd96202593d4c a34cd93b9848ef11fdd8c8430171196d5a2dd3f5 35560a0a11b1a2b48e3fa63615b8d0c77233a600 d571ee89296acc3345a643663891bec3d05ba9b6 21306b50 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [97:19:2b:bd:22:17:18:41:12:d0:a1:4f:de:4f:9a:d3:f0:2b:a7:7b] modulus: 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 public exponent: 10001 ] 2022-06-22 07:09:54.729  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-22 07:09:54.733 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-22 07:09:54.738 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-22 07:09:54.740 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-22 07:09:54.741  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-22 07:09:54.742  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-22 07:09:54.743  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-22 07:09:54.744 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-22 07:09:54.745 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-22 07:09:54.745 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-22 07:09:54.759 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-22 07:09:54.762 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-22 07:09:54.762 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-22 07:09:54.763 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-22 07:09:55.105  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-22 07:09:55.106  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-22 07:09:55.106 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-22 07:09:55.106 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-22 07:09:55.108  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-22 07:09:55.109  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-22 07:09:55.110 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 07:09:55.110 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-22 07:09:55.111 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-22 07:09:55.112 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 07:09:55.113 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-22 07:09:55.113 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-22 07:09:55.114 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 07:09:55.115 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-22 07:09:55.115 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-22 07:09:55.116 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-22 07:09:55.123 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 163854456281514721574663494806366618526828341794 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 22 05:21:26 UTC 2022 Final Date: Mon Jun 21 05:21:25 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c3:3c:ef:6d:5c:0a:f3:02:58:49:80:a2:10:37:a7:4e:8a:aa:5a:83] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: d393aaf2914d163e135a6d84d238979fa4edb18e 8a8f2ee08090b0918138131e10d245d6449ee4cf 41cb5087dba2bb2acd0cbc0b07690e7ace2b45fe cefaa61964129da418e7bea9dca4488699a3019e 87b2ccf5809320df79a71a6afc71f7a1918d44a2 a0226fe59948bf3f82909d1b1579d0bd2c54aeb1 954e427e865abc8305b45cfe8ef64b946ac58b12 5a86a3c398e677ac924d6bf1dd1fab42a7ae22ab 684fea302a1fcadf86f3dd82f999e5c395c6ccf5 166ed9a14eb59339212c43b4e754b97ad2d1ebcb e7a2a3130cebff30e0eda746c310522ad61d0d4f aa1967deb4d50abb70c166428feff947bf525e05 d8cb2c1394b3bd4637bd9bbba32f8010a71f8feb 2717b16df8b280b160227230578d7571e12d3bb7 75cc4472b011eae0466ebf73dd70a6c9c318c6a4 c92a62dd3f7fec0fea40a871e37cd96202593d4c a34cd93b9848ef11fdd8c8430171196d5a2dd3f5 35560a0a11b1a2b48e3fa63615b8d0c77233a600 d571ee89296acc3345a643663891bec3d05ba9b6 21306b50 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [17:81:f0:c4:b3:e0:93:9a:9a:f3:2b:26:d4:81:e8:12:5b:56:16:2d] modulus: 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 public exponent: 10001 ] 2022-06-22 07:11:47.844  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-22 07:11:47.847 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-22 07:11:47.849 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-22 07:11:47.850 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-22 07:11:47.852  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-22 07:11:47.852  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-22 07:11:47.853  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-22 07:11:47.853 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-22 07:11:47.854 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-22 07:11:47.854 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-22 07:11:47.869 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-22 07:11:47.871 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-22 07:11:47.871 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-22 07:11:47.872 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-22 07:11:48.566  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-22 07:11:48.567  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-22 07:11:48.568 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-22 07:11:48.569 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-22 07:11:48.572  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-22 07:11:48.574  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-22 07:11:48.575 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 07:11:48.575 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-22 07:11:48.576 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-22 07:11:48.577 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 07:11:48.578 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-22 07:11:48.579 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-22 07:11:48.580 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 07:11:48.595 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-22 07:11:48.599 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-22 07:11:48.609 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-22 07:11:48.617 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 163854456281514721574663494806366618526828341794 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 22 05:21:26 UTC 2022 Final Date: Mon Jun 21 05:21:25 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c3:3c:ef:6d:5c:0a:f3:02:58:49:80:a2:10:37:a7:4e:8a:aa:5a:83] modulus: f9fb763216aaa4c10b1b99f2f83512d1f28b7cbdeb63777e37b014646ec7477213a989b3505e49f80657e700311b1318e6d53f61cd4e86dfcc1cf518dd01d15d69aa87d49cb15ea721a8700401065dd000eaf2feeca23b243b8c25698a95c434e24d48672c0ca8275961d06ce2d57632ff8ecb356c9fd5389380e15a678df593fa24dbd7214cfeb3bb9afaa037cfcafb3974db6fbf20f0fa54e3051fe66275009228fcae069154c674d84433707045f617848fe9ffd7e1c1b80f44044bac4a6b43766621aafa6ec013a7c0825268f11e8ce7cd9be1edca8200fe76d15fcba7a53678413027fdd96a883f318ebaea217a18bd4ffaaef252e6ef366fc1e265a3ce4566f69b84ee7fee75da0b964d43fce041b7eb6aaea33ae66ea858a40033059d05574fd648428d85b44f5f5782c6673a8acdb35a3cec9323ad19232c00edff55b486abd43ed80e2342321e90ea74181dabd4f8d097321c0a5bf187e39ce9c59a220c5d768c2967a783a5ae6f4694c736c01f05a5c888d148b6786ab95d10a3f1 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: d393aaf2914d163e135a6d84d238979fa4edb18e 8a8f2ee08090b0918138131e10d245d6449ee4cf 41cb5087dba2bb2acd0cbc0b07690e7ace2b45fe cefaa61964129da418e7bea9dca4488699a3019e 87b2ccf5809320df79a71a6afc71f7a1918d44a2 a0226fe59948bf3f82909d1b1579d0bd2c54aeb1 954e427e865abc8305b45cfe8ef64b946ac58b12 5a86a3c398e677ac924d6bf1dd1fab42a7ae22ab 684fea302a1fcadf86f3dd82f999e5c395c6ccf5 166ed9a14eb59339212c43b4e754b97ad2d1ebcb e7a2a3130cebff30e0eda746c310522ad61d0d4f aa1967deb4d50abb70c166428feff947bf525e05 d8cb2c1394b3bd4637bd9bbba32f8010a71f8feb 2717b16df8b280b160227230578d7571e12d3bb7 75cc4472b011eae0466ebf73dd70a6c9c318c6a4 c92a62dd3f7fec0fea40a871e37cd96202593d4c a34cd93b9848ef11fdd8c8430171196d5a2dd3f5 35560a0a11b1a2b48e3fa63615b8d0c77233a600 d571ee89296acc3345a643663891bec3d05ba9b6 21306b50 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [05:cf:2d:c1:0e:9d:4d:45:72:23:c9:ad:c4:2c:1b:52:60:a2:b5:9e] modulus: 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 public exponent: 10001 ] 2022-06-22 07:15:18.132  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-22 07:15:18.136 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-22 07:15:18.140 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-22 07:15:18.142 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-22 07:15:18.144  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-22 07:15:18.145  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-22 07:15:18.146  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-22 07:15:18.147 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-22 07:15:18.148 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-22 07:15:18.149 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-22 07:15:18.163 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-22 07:15:18.165 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-22 07:15:18.166 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-22 07:15:18.168 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-22 07:15:18.377  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-22 07:15:18.378  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-22 07:15:18.379 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-22 07:15:18.379 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-22 07:15:18.382  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-22 07:15:18.383  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-22 07:15:18.383 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 07:15:18.384 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-22 07:15:18.384 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-22 07:15:18.386 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 07:15:18.386 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-22 07:15:18.387 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-22 07:15:18.388 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 07:15:18.389 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-22 07:15:18.390 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-22 07:15:18.401 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-22 07:15:18.420 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 163854456281514721574663494806366618526828341794 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 22 05:21:26 UTC 2022 Final Date: Mon Jun 21 05:21:25 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c3:3c:ef:6d:5c:0a:f3:02:58:49:80:a2:10:37:a7:4e:8a:aa:5a:83] modulus: f9fb763216aaa4c10b1b99f2f83512d1f28b7cbdeb63777e37b014646ec7477213a989b3505e49f80657e700311b1318e6d53f61cd4e86dfcc1cf518dd01d15d69aa87d49cb15ea721a8700401065dd000eaf2feeca23b243b8c25698a95c434e24d48672c0ca8275961d06ce2d57632ff8ecb356c9fd5389380e15a678df593fa24dbd7214cfeb3bb9afaa037cfcafb3974db6fbf20f0fa54e3051fe66275009228fcae069154c674d84433707045f617848fe9ffd7e1c1b80f44044bac4a6b43766621aafa6ec013a7c0825268f11e8ce7cd9be1edca8200fe76d15fcba7a53678413027fdd96a883f318ebaea217a18bd4ffaaef252e6ef366fc1e265a3ce4566f69b84ee7fee75da0b964d43fce041b7eb6aaea33ae66ea858a40033059d05574fd648428d85b44f5f5782c6673a8acdb35a3cec9323ad19232c00edff55b486abd43ed80e2342321e90ea74181dabd4f8d097321c0a5bf187e39ce9c59a220c5d768c2967a783a5ae6f4694c736c01f05a5c888d148b6786ab95d10a3f1 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: d393aaf2914d163e135a6d84d238979fa4edb18e 8a8f2ee08090b0918138131e10d245d6449ee4cf 41cb5087dba2bb2acd0cbc0b07690e7ace2b45fe cefaa61964129da418e7bea9dca4488699a3019e 87b2ccf5809320df79a71a6afc71f7a1918d44a2 a0226fe59948bf3f82909d1b1579d0bd2c54aeb1 954e427e865abc8305b45cfe8ef64b946ac58b12 5a86a3c398e677ac924d6bf1dd1fab42a7ae22ab 684fea302a1fcadf86f3dd82f999e5c395c6ccf5 166ed9a14eb59339212c43b4e754b97ad2d1ebcb e7a2a3130cebff30e0eda746c310522ad61d0d4f aa1967deb4d50abb70c166428feff947bf525e05 d8cb2c1394b3bd4637bd9bbba32f8010a71f8feb 2717b16df8b280b160227230578d7571e12d3bb7 75cc4472b011eae0466ebf73dd70a6c9c318c6a4 c92a62dd3f7fec0fea40a871e37cd96202593d4c a34cd93b9848ef11fdd8c8430171196d5a2dd3f5 35560a0a11b1a2b48e3fa63615b8d0c77233a600 d571ee89296acc3345a643663891bec3d05ba9b6 21306b50 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9f:e2:c2:8c:33:9e:7d:1e:4a:94:17:a5:0e:f4:be:bc:81:37:97:61] modulus: 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 public exponent: 10001 ] 2022-06-22 07:15:37.555  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-22 07:15:37.557 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-22 07:15:37.570 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-22 07:15:37.571 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-22 07:15:37.572  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-22 07:15:37.573  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-22 07:15:37.573  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-22 07:15:37.574 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-22 07:15:37.574 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-22 07:15:37.575 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-22 07:15:37.589 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-22 07:15:37.594 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-22 07:15:37.596 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-22 07:15:37.596 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-22 07:15:37.825  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-22 07:15:37.829  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-22 07:15:37.832 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-22 07:15:37.833 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-22 07:15:37.844  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-22 07:15:37.845  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-22 07:15:37.846 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 07:15:37.850 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-22 07:15:37.851 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-22 07:15:37.855 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 07:15:37.855 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-22 07:15:37.859 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-22 07:15:37.869 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 07:15:37.875 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-22 07:15:37.881 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-22 07:15:37.887 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-22 07:15:37.896 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 163854456281514721574663494806366618526828341794 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 22 05:21:26 UTC 2022 Final Date: Mon Jun 21 05:21:25 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c3:3c:ef:6d:5c:0a:f3:02:58:49:80:a2:10:37:a7:4e:8a:aa:5a:83] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: d393aaf2914d163e135a6d84d238979fa4edb18e 8a8f2ee08090b0918138131e10d245d6449ee4cf 41cb5087dba2bb2acd0cbc0b07690e7ace2b45fe cefaa61964129da418e7bea9dca4488699a3019e 87b2ccf5809320df79a71a6afc71f7a1918d44a2 a0226fe59948bf3f82909d1b1579d0bd2c54aeb1 954e427e865abc8305b45cfe8ef64b946ac58b12 5a86a3c398e677ac924d6bf1dd1fab42a7ae22ab 684fea302a1fcadf86f3dd82f999e5c395c6ccf5 166ed9a14eb59339212c43b4e754b97ad2d1ebcb e7a2a3130cebff30e0eda746c310522ad61d0d4f aa1967deb4d50abb70c166428feff947bf525e05 d8cb2c1394b3bd4637bd9bbba32f8010a71f8feb 2717b16df8b280b160227230578d7571e12d3bb7 75cc4472b011eae0466ebf73dd70a6c9c318c6a4 c92a62dd3f7fec0fea40a871e37cd96202593d4c a34cd93b9848ef11fdd8c8430171196d5a2dd3f5 35560a0a11b1a2b48e3fa63615b8d0c77233a600 d571ee89296acc3345a643663891bec3d05ba9b6 21306b50 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b5:3f:04:3d:5c:e6:25:83:af:b3:2c:11:ec:e9:99:e7:c9:07:d1:bd] modulus: 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 public exponent: 10001 ] 2022-06-22 07:17:03.962  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-22 07:17:03.965 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-22 07:17:03.969 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-22 07:17:03.970 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-22 07:17:03.970  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-22 07:17:03.972  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-22 07:17:03.973  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-22 07:17:03.974 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-22 07:17:03.974 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-22 07:17:03.975 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-22 07:17:03.985 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-22 07:17:03.988 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-22 07:17:03.989 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-22 07:17:03.989 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-22 07:17:04.206  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-22 07:17:04.207  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-22 07:17:04.208 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-22 07:17:04.208 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-22 07:17:04.211  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-22 07:17:04.212  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-22 07:17:04.214 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 07:17:04.214 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-22 07:17:04.215 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-22 07:17:04.216 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 07:17:04.216 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-22 07:17:04.216 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-22 07:17:04.217 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 07:17:04.217 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-22 07:17:04.218 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-22 07:17:04.218 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-22 07:17:04.228 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 163854456281514721574663494806366618526828341794 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 22 05:21:26 UTC 2022 Final Date: Mon Jun 21 05:21:25 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c3:3c:ef:6d:5c:0a:f3:02:58:49:80:a2:10:37:a7:4e:8a:aa:5a:83] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: d393aaf2914d163e135a6d84d238979fa4edb18e 8a8f2ee08090b0918138131e10d245d6449ee4cf 41cb5087dba2bb2acd0cbc0b07690e7ace2b45fe cefaa61964129da418e7bea9dca4488699a3019e 87b2ccf5809320df79a71a6afc71f7a1918d44a2 a0226fe59948bf3f82909d1b1579d0bd2c54aeb1 954e427e865abc8305b45cfe8ef64b946ac58b12 5a86a3c398e677ac924d6bf1dd1fab42a7ae22ab 684fea302a1fcadf86f3dd82f999e5c395c6ccf5 166ed9a14eb59339212c43b4e754b97ad2d1ebcb e7a2a3130cebff30e0eda746c310522ad61d0d4f aa1967deb4d50abb70c166428feff947bf525e05 d8cb2c1394b3bd4637bd9bbba32f8010a71f8feb 2717b16df8b280b160227230578d7571e12d3bb7 75cc4472b011eae0466ebf73dd70a6c9c318c6a4 c92a62dd3f7fec0fea40a871e37cd96202593d4c a34cd93b9848ef11fdd8c8430171196d5a2dd3f5 35560a0a11b1a2b48e3fa63615b8d0c77233a600 d571ee89296acc3345a643663891bec3d05ba9b6 21306b50 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a2:12:5b:05:77:c0:34:89:c2:43:6c:ae:6a:9a:af:f2:b7:ca:03:9a] modulus: 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 public exponent: 10001 ] 2022-06-22 07:22:04.922  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-22 07:22:04.933 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-22 07:22:04.938 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-22 07:22:04.940 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-22 07:22:04.942  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-22 07:22:04.943  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-22 07:22:04.944  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-22 07:22:04.945 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-22 07:22:04.948 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-22 07:22:04.950 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-22 07:22:04.960 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-22 07:22:04.965 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-22 07:22:04.967 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-22 07:22:04.967 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-22 07:22:05.258  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-22 07:22:05.259  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-22 07:22:05.259 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-22 07:22:05.260 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-22 07:22:05.262  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-22 07:22:05.263  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-22 07:22:05.264 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 07:22:05.264 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-22 07:22:05.265 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-22 07:22:05.266 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 07:22:05.266 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-22 07:22:05.267 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-22 07:22:05.268 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-22 07:22:05.269 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-22 07:22:05.269 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-22 07:22:05.270 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-22 07:22:05.277 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 163854456281514721574663494806366618526828341794 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jun 22 05:21:26 UTC 2022 Final Date: Mon Jun 21 05:21:25 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c3:3c:ef:6d:5c:0a:f3:02:58:49:80:a2:10:37:a7:4e:8a:aa:5a:83] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: d393aaf2914d163e135a6d84d238979fa4edb18e 8a8f2ee08090b0918138131e10d245d6449ee4cf 41cb5087dba2bb2acd0cbc0b07690e7ace2b45fe cefaa61964129da418e7bea9dca4488699a3019e 87b2ccf5809320df79a71a6afc71f7a1918d44a2 a0226fe59948bf3f82909d1b1579d0bd2c54aeb1 954e427e865abc8305b45cfe8ef64b946ac58b12 5a86a3c398e677ac924d6bf1dd1fab42a7ae22ab 684fea302a1fcadf86f3dd82f999e5c395c6ccf5 166ed9a14eb59339212c43b4e754b97ad2d1ebcb e7a2a3130cebff30e0eda746c310522ad61d0d4f aa1967deb4d50abb70c166428feff947bf525e05 d8cb2c1394b3bd4637bd9bbba32f8010a71f8feb 2717b16df8b280b160227230578d7571e12d3bb7 75cc4472b011eae0466ebf73dd70a6c9c318c6a4 c92a62dd3f7fec0fea40a871e37cd96202593d4c a34cd93b9848ef11fdd8c8430171196d5a2dd3f5 35560a0a11b1a2b48e3fa63615b8d0c77233a600 d571ee89296acc3345a643663891bec3d05ba9b6 21306b50 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [21:b8:5a:6c:b0:5f:4b:47:e5:a4:c3:ca:67:e9:44:d0:0b:84:e0:fa] modulus: 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 public exponent: 10001 ]