2022-07-05 05:25:31,771 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-07-05 05:25:33,564 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-07-05 05:25:34.537  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Jul 05, 2022 5:25:37 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jul 05, 2022 5:25:37 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jul 05, 2022 5:25:37 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jul 05, 2022 5:25:37 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-07-05 05:25:38.096 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-07-05 05:25:38.437  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-07-05 05:25:38.630  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-07-05 05:25:39.629 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-07-05 05:25:39.634 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-07-05 05:25:39.636 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-07-05 05:25:39.644 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-07-05 05:25:39.709 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-07-05 05:25:39.714 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-07-05 05:25:39.885 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-07-05 05:25:40.557 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jul 05, 2022 5:25:41 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-07-05 05:25:41.847  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 11.236 seconds (JVM running for 13.47) Jul 05, 2022 5:26:05 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-07-05 05:26:32.958  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-05 05:26:32.969 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-05 05:26:33.020 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-07-05 05:26:33.027 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-05 05:26:33.058  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-07-05 05:26:33.061  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-05 05:26:33.063  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-05 05:26:33.065 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-05 05:26:33.068 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-05 05:26:33.073 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-05 05:26:33.083 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-05 05:26:33.087 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-05 05:26:33.139 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-05 05:26:33.146 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-05 05:26:33.146 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-05 05:26:33.151 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-05 05:26:33.749  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-05 05:26:33.752  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-05 05:26:33.753 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-05 05:26:33.754 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-05 05:26:33.764  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-05 05:26:33.765  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-05 05:26:33.766 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-05 05:26:33.766 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-05 05:26:33.767 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-05 05:26:33.782 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-05 05:26:33.783 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-05 05:26:33.783 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-05 05:26:33.793 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-05 05:26:33.794 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-05 05:26:33.795 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-05 05:26:33.798 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-05 05:26:33.834 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 56701228914413366416416818001197424139426869767 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jul 05 05:23:30 UTC 2022 Final Date: Sun Jul 04 05:23:29 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [00:cc:de:10:94:f4:d7:e2:0f:3c:72:d0:d5:c9:ec:4a:b1:a5:d3:03] modulus: b9b8a35919b655ef0690e1ec1ec4a8be2e8cb73db0a9e1d6fcde91bd9337dfa02bbb0590c4e01314f61e8dc71ea94d5ddd0e767387d825a28aaa36a1c0be30633dbe4bbfcfb9f3a6c22c088b686558210dcd933ce9856eaa26bde52493b45479f28df7f1f4eaad4de2c54200f094ab100efcf993592835e789ca16ce2aad1c590b768851523601a203549b5fbe2ddf395006e99cfc1f2d79ef20ef9ee3acaaefc280110d423887d982de7c7644790d1ac2835a9e3331b046a00f487e501631d69ab846dc276567de8342e5e540843f7494bc741db940ecd79b3a1bc1f2bb6129c46ae2297e440095ae1ca8dba29a8c9236c1b11271946349240c74723cfe020cb41e9b4570005102624613ddca14cfe86f48675c4a30e65a85bdaeb2b2166fce470a9510bc7bb0e625ad80721541e2e7282f1174e6e79c16a1a05789466c62545316e674e739e97cde4f04d4ac13e8db6eedf45c5f18747e84ddd29f3dc211e03166ece83184b4987695778e31825e22dd08b0ac2dc172ffdf8f3669cac22fd1 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 723c4d9322db3bd60254918e26e653c8052cfac0 2622261a5fb609832fd57a38861741b9a8118a84 372b0262cb03e1601bf927ce0c6b12ea37635673 d5fe403e192fb78c9fa8cddfae26a57249f0350e 79925d3db0204c3240ae6e894b74f61ed011b3b0 55b5c38322d51ae5b430a31d834fa88207763543 786f3806d18c503254699aa91c8ff23e5da66c48 5f801e7f68feca1e17567860bb3549f41fbfaf9b dfe725ac727bb72886582c04fa757553dd0e9460 f6762c7d0d98383797b309f61c7b41c1eae1d32d c346b4159ea87d2c5fb548e59c1c957d79ac955b 1cea869bb4c0a78bec9debb19205f868fcd1b358 d124e0b42bebcb490bfb7fd17b4e417c5d8ca9cc 6d5b70370ab00d3385d7da9f60d6a65cf778d857 680f76f5d2fb5b1843ff1f97f395c59ef092d082 82366cd03fddbbe5f2037d4739b4a9c5ded36c40 c1b69534bf68ca939b636d18b8fd626d639e5b00 64966bfee6957d8e052b515051c715ed12fcf2e5 83160d672d12884ed9ad9a51c81ad21e3a9f243e d98f079b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [71:e4:a1:e4:a7:c0:14:d0:e9:b0:cb:22:c5:4c:cd:97:5d:c9:6b:da] modulus: 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 public exponent: 10001 ] 2022-07-05 06:51:03.806  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-05 06:51:03.814 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-05 06:51:03.819 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-05 06:51:03.832 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-05 06:51:03.834  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-05 06:51:03.836  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-05 06:51:03.837  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-05 06:51:03.838 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-05 06:51:03.839 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-05 06:51:03.840 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-05 06:51:03.852 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-05 06:51:03.854 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-05 06:51:03.855 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-05 06:51:03.856 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-05 06:51:04.111  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-05 06:51:04.112  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-05 06:51:04.113 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-05 06:51:04.113 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-05 06:51:04.119  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-05 06:51:04.120  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-05 06:51:04.121 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-05 06:51:04.122 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-05 06:51:04.122 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-05 06:51:04.125 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-05 06:51:04.125 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-05 06:51:04.126 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-05 06:51:04.128 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-05 06:51:04.128 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-05 06:51:04.129 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-05 06:51:04.131 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-05 06:51:04.141 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 56701228914413366416416818001197424139426869767 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jul 05 05:23:30 UTC 2022 Final Date: Sun Jul 04 05:23:29 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [00:cc:de:10:94:f4:d7:e2:0f:3c:72:d0:d5:c9:ec:4a:b1:a5:d3:03] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 723c4d9322db3bd60254918e26e653c8052cfac0 2622261a5fb609832fd57a38861741b9a8118a84 372b0262cb03e1601bf927ce0c6b12ea37635673 d5fe403e192fb78c9fa8cddfae26a57249f0350e 79925d3db0204c3240ae6e894b74f61ed011b3b0 55b5c38322d51ae5b430a31d834fa88207763543 786f3806d18c503254699aa91c8ff23e5da66c48 5f801e7f68feca1e17567860bb3549f41fbfaf9b dfe725ac727bb72886582c04fa757553dd0e9460 f6762c7d0d98383797b309f61c7b41c1eae1d32d c346b4159ea87d2c5fb548e59c1c957d79ac955b 1cea869bb4c0a78bec9debb19205f868fcd1b358 d124e0b42bebcb490bfb7fd17b4e417c5d8ca9cc 6d5b70370ab00d3385d7da9f60d6a65cf778d857 680f76f5d2fb5b1843ff1f97f395c59ef092d082 82366cd03fddbbe5f2037d4739b4a9c5ded36c40 c1b69534bf68ca939b636d18b8fd626d639e5b00 64966bfee6957d8e052b515051c715ed12fcf2e5 83160d672d12884ed9ad9a51c81ad21e3a9f243e d98f079b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [25:b3:e3:d4:de:c3:e5:48:9e:57:0e:c3:7d:df:8a:b2:4c:42:74:76] modulus: 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 public exponent: 10001 ] 2022-07-05 06:52:51.434  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-05 06:52:51.437 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-05 06:52:51.439 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-07-05 06:52:51.440 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-05 06:52:51.440  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-07-05 06:52:51.442  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-05 06:52:51.442  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-05 06:52:51.443 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-05 06:52:51.443 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-05 06:52:51.445 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-05 06:52:51.464 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-05 06:52:51.465 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-05 06:52:51.465 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-05 06:52:51.466 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-05 06:52:51.619  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-05 06:52:51.621  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-05 06:52:51.621 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-05 06:52:51.622 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-05 06:52:51.625  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-05 06:52:51.625  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-05 06:52:51.626 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-05 06:52:51.626 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-05 06:52:51.627 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-05 06:52:51.628 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-05 06:52:51.629 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-05 06:52:51.629 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-05 06:52:51.630 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-05 06:52:51.631 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-05 06:52:51.631 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-05 06:52:51.633 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-05 06:52:51.640 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 56701228914413366416416818001197424139426869767 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jul 05 05:23:30 UTC 2022 Final Date: Sun Jul 04 05:23:29 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [00:cc:de:10:94:f4:d7:e2:0f:3c:72:d0:d5:c9:ec:4a:b1:a5:d3:03] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 723c4d9322db3bd60254918e26e653c8052cfac0 2622261a5fb609832fd57a38861741b9a8118a84 372b0262cb03e1601bf927ce0c6b12ea37635673 d5fe403e192fb78c9fa8cddfae26a57249f0350e 79925d3db0204c3240ae6e894b74f61ed011b3b0 55b5c38322d51ae5b430a31d834fa88207763543 786f3806d18c503254699aa91c8ff23e5da66c48 5f801e7f68feca1e17567860bb3549f41fbfaf9b dfe725ac727bb72886582c04fa757553dd0e9460 f6762c7d0d98383797b309f61c7b41c1eae1d32d c346b4159ea87d2c5fb548e59c1c957d79ac955b 1cea869bb4c0a78bec9debb19205f868fcd1b358 d124e0b42bebcb490bfb7fd17b4e417c5d8ca9cc 6d5b70370ab00d3385d7da9f60d6a65cf778d857 680f76f5d2fb5b1843ff1f97f395c59ef092d082 82366cd03fddbbe5f2037d4739b4a9c5ded36c40 c1b69534bf68ca939b636d18b8fd626d639e5b00 64966bfee6957d8e052b515051c715ed12fcf2e5 83160d672d12884ed9ad9a51c81ad21e3a9f243e d98f079b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [40:5b:44:da:03:75:82:2e:c3:98:79:a7:28:bf:46:32:ce:d7:6e:d6] modulus: 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 public exponent: 10001 ] 2022-07-05 06:54:28.293  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-05 06:54:28.294 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-05 06:54:28.296 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-07-05 06:54:28.297 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-05 06:54:28.298  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-07-05 06:54:28.299  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-05 06:54:28.300  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-05 06:54:28.300 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-05 06:54:28.301 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-05 06:54:28.301 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-05 06:54:28.307 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-05 06:54:28.309 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-05 06:54:28.309 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-05 06:54:28.310 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-05 06:54:28.442  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-05 06:54:28.445  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-05 06:54:28.447 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-05 06:54:28.449 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-05 06:54:28.455  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-05 06:54:28.460  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-05 06:54:28.463 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-05 06:54:28.463 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-05 06:54:28.464 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-05 06:54:28.465 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-05 06:54:28.466 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-05 06:54:28.466 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-05 06:54:28.469 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-05 06:54:28.469 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-05 06:54:28.470 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-05 06:54:28.471 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-05 06:54:28.478 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 56701228914413366416416818001197424139426869767 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jul 05 05:23:30 UTC 2022 Final Date: Sun Jul 04 05:23:29 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [00:cc:de:10:94:f4:d7:e2:0f:3c:72:d0:d5:c9:ec:4a:b1:a5:d3:03] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 723c4d9322db3bd60254918e26e653c8052cfac0 2622261a5fb609832fd57a38861741b9a8118a84 372b0262cb03e1601bf927ce0c6b12ea37635673 d5fe403e192fb78c9fa8cddfae26a57249f0350e 79925d3db0204c3240ae6e894b74f61ed011b3b0 55b5c38322d51ae5b430a31d834fa88207763543 786f3806d18c503254699aa91c8ff23e5da66c48 5f801e7f68feca1e17567860bb3549f41fbfaf9b dfe725ac727bb72886582c04fa757553dd0e9460 f6762c7d0d98383797b309f61c7b41c1eae1d32d c346b4159ea87d2c5fb548e59c1c957d79ac955b 1cea869bb4c0a78bec9debb19205f868fcd1b358 d124e0b42bebcb490bfb7fd17b4e417c5d8ca9cc 6d5b70370ab00d3385d7da9f60d6a65cf778d857 680f76f5d2fb5b1843ff1f97f395c59ef092d082 82366cd03fddbbe5f2037d4739b4a9c5ded36c40 c1b69534bf68ca939b636d18b8fd626d639e5b00 64966bfee6957d8e052b515051c715ed12fcf2e5 83160d672d12884ed9ad9a51c81ad21e3a9f243e d98f079b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [81:0a:c9:6c:c3:96:6b:5b:e3:0a:af:97:4f:ef:db:6a:77:09:ce:4e] modulus: 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 public exponent: 10001 ] 2022-07-05 06:56:34.989  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-05 06:56:34.991 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-05 06:56:34.994 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-05 06:56:35.001 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-05 06:56:35.002  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-05 06:56:35.005  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-05 06:56:35.007  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-05 06:56:35.008 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-05 06:56:35.009 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-05 06:56:35.009 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-05 06:56:35.017 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-05 06:56:35.019 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-05 06:56:35.019 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-05 06:56:35.020 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-05 06:56:35.168  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-05 06:56:35.169  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-05 06:56:35.170 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-05 06:56:35.170 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-05 06:56:35.172  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-05 06:56:35.173  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-05 06:56:35.174 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-05 06:56:35.174 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-05 06:56:35.175 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-05 06:56:35.176 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-05 06:56:35.176 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-05 06:56:35.176 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-05 06:56:35.178 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-05 06:56:35.178 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-05 06:56:35.178 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-05 06:56:35.179 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-05 06:56:35.183 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 56701228914413366416416818001197424139426869767 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jul 05 05:23:30 UTC 2022 Final Date: Sun Jul 04 05:23:29 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [00:cc:de:10:94:f4:d7:e2:0f:3c:72:d0:d5:c9:ec:4a:b1:a5:d3:03] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 723c4d9322db3bd60254918e26e653c8052cfac0 2622261a5fb609832fd57a38861741b9a8118a84 372b0262cb03e1601bf927ce0c6b12ea37635673 d5fe403e192fb78c9fa8cddfae26a57249f0350e 79925d3db0204c3240ae6e894b74f61ed011b3b0 55b5c38322d51ae5b430a31d834fa88207763543 786f3806d18c503254699aa91c8ff23e5da66c48 5f801e7f68feca1e17567860bb3549f41fbfaf9b dfe725ac727bb72886582c04fa757553dd0e9460 f6762c7d0d98383797b309f61c7b41c1eae1d32d c346b4159ea87d2c5fb548e59c1c957d79ac955b 1cea869bb4c0a78bec9debb19205f868fcd1b358 d124e0b42bebcb490bfb7fd17b4e417c5d8ca9cc 6d5b70370ab00d3385d7da9f60d6a65cf778d857 680f76f5d2fb5b1843ff1f97f395c59ef092d082 82366cd03fddbbe5f2037d4739b4a9c5ded36c40 c1b69534bf68ca939b636d18b8fd626d639e5b00 64966bfee6957d8e052b515051c715ed12fcf2e5 83160d672d12884ed9ad9a51c81ad21e3a9f243e d98f079b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [97:13:a0:a8:ce:82:59:45:6f:d2:27:29:bd:44:8e:0b:e2:6b:71:00] modulus: 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 public exponent: 10001 ] 2022-07-05 07:00:06.587  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-05 07:00:06.589 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-05 07:00:06.592 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-05 07:00:06.593 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-05 07:00:06.593  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-05 07:00:06.594  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-05 07:00:06.594  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-05 07:00:06.594 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-05 07:00:06.595 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-05 07:00:06.595 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-05 07:00:06.602 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-05 07:00:06.603 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-05 07:00:06.603 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-05 07:00:06.604 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-05 07:00:06.737  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-05 07:00:06.738  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-05 07:00:06.739 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-05 07:00:06.739 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-05 07:00:06.742  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-05 07:00:06.743  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-05 07:00:06.744 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-05 07:00:06.744 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-05 07:00:06.745 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-05 07:00:06.746 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-05 07:00:06.746 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-05 07:00:06.747 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-05 07:00:06.748 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-05 07:00:06.748 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-05 07:00:06.748 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-05 07:00:06.749 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-05 07:00:06.754 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 56701228914413366416416818001197424139426869767 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jul 05 05:23:30 UTC 2022 Final Date: Sun Jul 04 05:23:29 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [00:cc:de:10:94:f4:d7:e2:0f:3c:72:d0:d5:c9:ec:4a:b1:a5:d3:03] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 723c4d9322db3bd60254918e26e653c8052cfac0 2622261a5fb609832fd57a38861741b9a8118a84 372b0262cb03e1601bf927ce0c6b12ea37635673 d5fe403e192fb78c9fa8cddfae26a57249f0350e 79925d3db0204c3240ae6e894b74f61ed011b3b0 55b5c38322d51ae5b430a31d834fa88207763543 786f3806d18c503254699aa91c8ff23e5da66c48 5f801e7f68feca1e17567860bb3549f41fbfaf9b dfe725ac727bb72886582c04fa757553dd0e9460 f6762c7d0d98383797b309f61c7b41c1eae1d32d c346b4159ea87d2c5fb548e59c1c957d79ac955b 1cea869bb4c0a78bec9debb19205f868fcd1b358 d124e0b42bebcb490bfb7fd17b4e417c5d8ca9cc 6d5b70370ab00d3385d7da9f60d6a65cf778d857 680f76f5d2fb5b1843ff1f97f395c59ef092d082 82366cd03fddbbe5f2037d4739b4a9c5ded36c40 c1b69534bf68ca939b636d18b8fd626d639e5b00 64966bfee6957d8e052b515051c715ed12fcf2e5 83160d672d12884ed9ad9a51c81ad21e3a9f243e d98f079b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ca:72:5b:6c:f5:4f:4f:45:68:1b:04:15:71:73:ce:97:dd:41:95:0a] modulus: d64b16ab373b082e915ac325ed8b09f39b6ba8b89762e642c45f0c880bb271f83f5f1b13f8997956315c4e9e7da06787e10a4d6ee3f5374397a9840f1b97b6b4bbedeb215234a8d348928f51cb36d92f5c065fb59e3514fccacc22d1075be7448cd3fd9a47c365c604dc7705e813e539fc9c313142bba4b089ea830956460efec6f03003c03b63970ca63e6d3599e726078ab539cf2c6dda87835c901726ff716e7fb7ee01bd9f2cc09719ca8fbaacf903ff0c9756bdc076bc1c65f13033ede8cf021b5f5ab946e5598f12390d04bc00ef1bdae78c4f5ca9d5bed48dfea2b8cfd140824c690aa1d550dbc45e5d4e9e037fad7451e52573ab021626a3c5972cf3 public exponent: 10001 ] 2022-07-05 07:04:15.917  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-05 07:04:15.918 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-05 07:04:15.920 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-05 07:04:15.921 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-05 07:04:15.921  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-05 07:04:15.922  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-05 07:04:15.923  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-05 07:04:15.923 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-05 07:04:15.924 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-05 07:04:15.924 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-05 07:04:15.930 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-05 07:04:15.931 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-05 07:04:15.931 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-05 07:04:15.931 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-05 07:04:16.062  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-05 07:04:16.063  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-05 07:04:16.063 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-05 07:04:16.064 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-05 07:04:16.066  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-05 07:04:16.066  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-05 07:04:16.067 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-05 07:04:16.068 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-05 07:04:16.068 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-05 07:04:16.069 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-05 07:04:16.069 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-05 07:04:16.070 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-05 07:04:16.072 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-05 07:04:16.072 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-05 07:04:16.073 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-05 07:04:16.074 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-05 07:04:16.078 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 56701228914413366416416818001197424139426869767 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jul 05 05:23:30 UTC 2022 Final Date: Sun Jul 04 05:23:29 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [00:cc:de:10:94:f4:d7:e2:0f:3c:72:d0:d5:c9:ec:4a:b1:a5:d3:03] modulus: b9b8a35919b655ef0690e1ec1ec4a8be2e8cb73db0a9e1d6fcde91bd9337dfa02bbb0590c4e01314f61e8dc71ea94d5ddd0e767387d825a28aaa36a1c0be30633dbe4bbfcfb9f3a6c22c088b686558210dcd933ce9856eaa26bde52493b45479f28df7f1f4eaad4de2c54200f094ab100efcf993592835e789ca16ce2aad1c590b768851523601a203549b5fbe2ddf395006e99cfc1f2d79ef20ef9ee3acaaefc280110d423887d982de7c7644790d1ac2835a9e3331b046a00f487e501631d69ab846dc276567de8342e5e540843f7494bc741db940ecd79b3a1bc1f2bb6129c46ae2297e440095ae1ca8dba29a8c9236c1b11271946349240c74723cfe020cb41e9b4570005102624613ddca14cfe86f48675c4a30e65a85bdaeb2b2166fce470a9510bc7bb0e625ad80721541e2e7282f1174e6e79c16a1a05789466c62545316e674e739e97cde4f04d4ac13e8db6eedf45c5f18747e84ddd29f3dc211e03166ece83184b4987695778e31825e22dd08b0ac2dc172ffdf8f3669cac22fd1 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 723c4d9322db3bd60254918e26e653c8052cfac0 2622261a5fb609832fd57a38861741b9a8118a84 372b0262cb03e1601bf927ce0c6b12ea37635673 d5fe403e192fb78c9fa8cddfae26a57249f0350e 79925d3db0204c3240ae6e894b74f61ed011b3b0 55b5c38322d51ae5b430a31d834fa88207763543 786f3806d18c503254699aa91c8ff23e5da66c48 5f801e7f68feca1e17567860bb3549f41fbfaf9b dfe725ac727bb72886582c04fa757553dd0e9460 f6762c7d0d98383797b309f61c7b41c1eae1d32d c346b4159ea87d2c5fb548e59c1c957d79ac955b 1cea869bb4c0a78bec9debb19205f868fcd1b358 d124e0b42bebcb490bfb7fd17b4e417c5d8ca9cc 6d5b70370ab00d3385d7da9f60d6a65cf778d857 680f76f5d2fb5b1843ff1f97f395c59ef092d082 82366cd03fddbbe5f2037d4739b4a9c5ded36c40 c1b69534bf68ca939b636d18b8fd626d639e5b00 64966bfee6957d8e052b515051c715ed12fcf2e5 83160d672d12884ed9ad9a51c81ad21e3a9f243e d98f079b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [05:8f:50:7b:1b:97:ed:75:e3:ba:16:09:9e:2e:41:9e:aa:a1:f5:b1] modulus: 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 public exponent: 10001 ] 2022-07-05 07:06:01.887  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-05 07:06:01.889 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-05 07:06:01.890 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-05 07:06:01.891 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-05 07:06:01.892  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-05 07:06:01.893  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-05 07:06:01.893  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-05 07:06:01.893 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-05 07:06:01.894 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-05 07:06:01.894 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-05 07:06:01.911 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-05 07:06:01.912 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-05 07:06:01.913 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-05 07:06:01.913 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-05 07:06:02.098  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-05 07:06:02.099  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-05 07:06:02.099 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-05 07:06:02.100 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-05 07:06:02.101  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-05 07:06:02.102  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-05 07:06:02.102 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-05 07:06:02.103 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-05 07:06:02.103 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-05 07:06:02.104 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-05 07:06:02.104 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-05 07:06:02.105 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-05 07:06:02.105 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-05 07:06:02.106 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-05 07:06:02.106 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-05 07:06:02.107 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-05 07:06:02.112 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 56701228914413366416416818001197424139426869767 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jul 05 05:23:30 UTC 2022 Final Date: Sun Jul 04 05:23:29 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [00:cc:de:10:94:f4:d7:e2:0f:3c:72:d0:d5:c9:ec:4a:b1:a5:d3:03] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 723c4d9322db3bd60254918e26e653c8052cfac0 2622261a5fb609832fd57a38861741b9a8118a84 372b0262cb03e1601bf927ce0c6b12ea37635673 d5fe403e192fb78c9fa8cddfae26a57249f0350e 79925d3db0204c3240ae6e894b74f61ed011b3b0 55b5c38322d51ae5b430a31d834fa88207763543 786f3806d18c503254699aa91c8ff23e5da66c48 5f801e7f68feca1e17567860bb3549f41fbfaf9b dfe725ac727bb72886582c04fa757553dd0e9460 f6762c7d0d98383797b309f61c7b41c1eae1d32d c346b4159ea87d2c5fb548e59c1c957d79ac955b 1cea869bb4c0a78bec9debb19205f868fcd1b358 d124e0b42bebcb490bfb7fd17b4e417c5d8ca9cc 6d5b70370ab00d3385d7da9f60d6a65cf778d857 680f76f5d2fb5b1843ff1f97f395c59ef092d082 82366cd03fddbbe5f2037d4739b4a9c5ded36c40 c1b69534bf68ca939b636d18b8fd626d639e5b00 64966bfee6957d8e052b515051c715ed12fcf2e5 83160d672d12884ed9ad9a51c81ad21e3a9f243e d98f079b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ad:2b:7b:12:e9:39:e7:d4:81:4b:bf:50:6d:36:97:ba:aa:d9:e4:4f] modulus: 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 public exponent: 10001 ] 2022-07-05 07:10:08.554  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-05 07:10:08.559 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-05 07:10:08.562 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-05 07:10:08.563 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-05 07:10:08.564  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-05 07:10:08.565  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-05 07:10:08.565  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-05 07:10:08.566 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-05 07:10:08.567 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-05 07:10:08.567 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-05 07:10:08.574 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-05 07:10:08.575 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-05 07:10:08.576 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-05 07:10:08.576 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-05 07:10:08.731  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-05 07:10:08.734  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-05 07:10:08.734 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-05 07:10:08.735 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-05 07:10:08.736  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-05 07:10:08.737  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-05 07:10:08.737 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-05 07:10:08.738 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-05 07:10:08.738 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-05 07:10:08.739 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-05 07:10:08.739 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-05 07:10:08.740 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-05 07:10:08.740 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-05 07:10:08.741 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-05 07:10:08.741 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-05 07:10:08.742 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-05 07:10:08.746 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 56701228914413366416416818001197424139426869767 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jul 05 05:23:30 UTC 2022 Final Date: Sun Jul 04 05:23:29 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [00:cc:de:10:94:f4:d7:e2:0f:3c:72:d0:d5:c9:ec:4a:b1:a5:d3:03] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 723c4d9322db3bd60254918e26e653c8052cfac0 2622261a5fb609832fd57a38861741b9a8118a84 372b0262cb03e1601bf927ce0c6b12ea37635673 d5fe403e192fb78c9fa8cddfae26a57249f0350e 79925d3db0204c3240ae6e894b74f61ed011b3b0 55b5c38322d51ae5b430a31d834fa88207763543 786f3806d18c503254699aa91c8ff23e5da66c48 5f801e7f68feca1e17567860bb3549f41fbfaf9b dfe725ac727bb72886582c04fa757553dd0e9460 f6762c7d0d98383797b309f61c7b41c1eae1d32d c346b4159ea87d2c5fb548e59c1c957d79ac955b 1cea869bb4c0a78bec9debb19205f868fcd1b358 d124e0b42bebcb490bfb7fd17b4e417c5d8ca9cc 6d5b70370ab00d3385d7da9f60d6a65cf778d857 680f76f5d2fb5b1843ff1f97f395c59ef092d082 82366cd03fddbbe5f2037d4739b4a9c5ded36c40 c1b69534bf68ca939b636d18b8fd626d639e5b00 64966bfee6957d8e052b515051c715ed12fcf2e5 83160d672d12884ed9ad9a51c81ad21e3a9f243e d98f079b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ac:53:44:20:6b:24:c2:92:05:c4:2a:48:9e:56:85:80:86:ad:73:c6] modulus: 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 public exponent: 10001 ] 2022-07-05 07:11:29.381  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-05 07:11:29.383 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-05 07:11:29.385 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-07-05 07:11:29.386 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-05 07:11:29.387  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-07-05 07:11:29.388  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-05 07:11:29.389  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-05 07:11:29.389 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-05 07:11:29.390 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-05 07:11:29.390 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-05 07:11:29.395 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-05 07:11:29.396 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-05 07:11:29.396 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-05 07:11:29.397 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-05 07:11:29.529  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-05 07:11:29.530  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-05 07:11:29.531 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-05 07:11:29.531 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-05 07:11:29.532  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-05 07:11:29.533  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-05 07:11:29.534 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-05 07:11:29.534 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-05 07:11:29.534 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-05 07:11:29.535 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-05 07:11:29.535 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-05 07:11:29.536 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-05 07:11:29.536 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-05 07:11:29.537 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-05 07:11:29.537 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-05 07:11:29.538 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-05 07:11:29.542 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 56701228914413366416416818001197424139426869767 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jul 05 05:23:30 UTC 2022 Final Date: Sun Jul 04 05:23:29 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [00:cc:de:10:94:f4:d7:e2:0f:3c:72:d0:d5:c9:ec:4a:b1:a5:d3:03] modulus: b9b8a35919b655ef0690e1ec1ec4a8be2e8cb73db0a9e1d6fcde91bd9337dfa02bbb0590c4e01314f61e8dc71ea94d5ddd0e767387d825a28aaa36a1c0be30633dbe4bbfcfb9f3a6c22c088b686558210dcd933ce9856eaa26bde52493b45479f28df7f1f4eaad4de2c54200f094ab100efcf993592835e789ca16ce2aad1c590b768851523601a203549b5fbe2ddf395006e99cfc1f2d79ef20ef9ee3acaaefc280110d423887d982de7c7644790d1ac2835a9e3331b046a00f487e501631d69ab846dc276567de8342e5e540843f7494bc741db940ecd79b3a1bc1f2bb6129c46ae2297e440095ae1ca8dba29a8c9236c1b11271946349240c74723cfe020cb41e9b4570005102624613ddca14cfe86f48675c4a30e65a85bdaeb2b2166fce470a9510bc7bb0e625ad80721541e2e7282f1174e6e79c16a1a05789466c62545316e674e739e97cde4f04d4ac13e8db6eedf45c5f18747e84ddd29f3dc211e03166ece83184b4987695778e31825e22dd08b0ac2dc172ffdf8f3669cac22fd1 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 723c4d9322db3bd60254918e26e653c8052cfac0 2622261a5fb609832fd57a38861741b9a8118a84 372b0262cb03e1601bf927ce0c6b12ea37635673 d5fe403e192fb78c9fa8cddfae26a57249f0350e 79925d3db0204c3240ae6e894b74f61ed011b3b0 55b5c38322d51ae5b430a31d834fa88207763543 786f3806d18c503254699aa91c8ff23e5da66c48 5f801e7f68feca1e17567860bb3549f41fbfaf9b dfe725ac727bb72886582c04fa757553dd0e9460 f6762c7d0d98383797b309f61c7b41c1eae1d32d c346b4159ea87d2c5fb548e59c1c957d79ac955b 1cea869bb4c0a78bec9debb19205f868fcd1b358 d124e0b42bebcb490bfb7fd17b4e417c5d8ca9cc 6d5b70370ab00d3385d7da9f60d6a65cf778d857 680f76f5d2fb5b1843ff1f97f395c59ef092d082 82366cd03fddbbe5f2037d4739b4a9c5ded36c40 c1b69534bf68ca939b636d18b8fd626d639e5b00 64966bfee6957d8e052b515051c715ed12fcf2e5 83160d672d12884ed9ad9a51c81ad21e3a9f243e d98f079b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e0:27:82:0a:05:91:00:64:49:fb:70:39:bc:bb:9a:2c:fc:b7:e1:96] modulus: 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 public exponent: 10001 ] 2022-07-05 07:17:44.247  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-05 07:17:44.251 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-05 07:17:44.254 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-07-05 07:17:44.256 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-05 07:17:44.256  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-07-05 07:17:44.258  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-05 07:17:44.259  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-05 07:17:44.260 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-05 07:17:44.261 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-05 07:17:44.262 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-05 07:17:44.270 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-05 07:17:44.271 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-05 07:17:44.272 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-05 07:17:44.272 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-05 07:17:44.450  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-05 07:17:44.451  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-05 07:17:44.451 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-05 07:17:44.451 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-05 07:17:44.453  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-05 07:17:44.453  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-05 07:17:44.454 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-05 07:17:44.454 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-05 07:17:44.454 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-05 07:17:44.458 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-05 07:17:44.459 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-05 07:17:44.459 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-05 07:17:44.460 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-05 07:17:44.460 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-05 07:17:44.461 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-05 07:17:44.462 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-05 07:17:44.467 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 56701228914413366416416818001197424139426869767 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jul 05 05:23:30 UTC 2022 Final Date: Sun Jul 04 05:23:29 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [00:cc:de:10:94:f4:d7:e2:0f:3c:72:d0:d5:c9:ec:4a:b1:a5:d3:03] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 723c4d9322db3bd60254918e26e653c8052cfac0 2622261a5fb609832fd57a38861741b9a8118a84 372b0262cb03e1601bf927ce0c6b12ea37635673 d5fe403e192fb78c9fa8cddfae26a57249f0350e 79925d3db0204c3240ae6e894b74f61ed011b3b0 55b5c38322d51ae5b430a31d834fa88207763543 786f3806d18c503254699aa91c8ff23e5da66c48 5f801e7f68feca1e17567860bb3549f41fbfaf9b dfe725ac727bb72886582c04fa757553dd0e9460 f6762c7d0d98383797b309f61c7b41c1eae1d32d c346b4159ea87d2c5fb548e59c1c957d79ac955b 1cea869bb4c0a78bec9debb19205f868fcd1b358 d124e0b42bebcb490bfb7fd17b4e417c5d8ca9cc 6d5b70370ab00d3385d7da9f60d6a65cf778d857 680f76f5d2fb5b1843ff1f97f395c59ef092d082 82366cd03fddbbe5f2037d4739b4a9c5ded36c40 c1b69534bf68ca939b636d18b8fd626d639e5b00 64966bfee6957d8e052b515051c715ed12fcf2e5 83160d672d12884ed9ad9a51c81ad21e3a9f243e d98f079b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f5:50:e8:63:a9:9f:c6:9a:3e:3b:8c:0a:c9:23:43:46:68:17:5c:84] modulus: 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 public exponent: 10001 ] 2022-07-05 07:19:01.304  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-05 07:19:01.306 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-05 07:19:01.311 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-07-05 07:19:01.312 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-05 07:19:01.313  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-07-05 07:19:01.314  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-05 07:19:01.314  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-05 07:19:01.316 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-05 07:19:01.317 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-05 07:19:01.318 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-05 07:19:01.324 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-05 07:19:01.326 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-05 07:19:01.326 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-05 07:19:01.326 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-05 07:19:01.446  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-05 07:19:01.448  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-05 07:19:01.449 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-05 07:19:01.450 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-05 07:19:01.452  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-05 07:19:01.452  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-05 07:19:01.453 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-05 07:19:01.453 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-05 07:19:01.453 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-05 07:19:01.454 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-05 07:19:01.454 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-05 07:19:01.455 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-05 07:19:01.456 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-05 07:19:01.456 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-05 07:19:01.456 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-05 07:19:01.457 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-05 07:19:01.462 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 56701228914413366416416818001197424139426869767 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jul 05 05:23:30 UTC 2022 Final Date: Sun Jul 04 05:23:29 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [00:cc:de:10:94:f4:d7:e2:0f:3c:72:d0:d5:c9:ec:4a:b1:a5:d3:03] modulus: b9b8a35919b655ef0690e1ec1ec4a8be2e8cb73db0a9e1d6fcde91bd9337dfa02bbb0590c4e01314f61e8dc71ea94d5ddd0e767387d825a28aaa36a1c0be30633dbe4bbfcfb9f3a6c22c088b686558210dcd933ce9856eaa26bde52493b45479f28df7f1f4eaad4de2c54200f094ab100efcf993592835e789ca16ce2aad1c590b768851523601a203549b5fbe2ddf395006e99cfc1f2d79ef20ef9ee3acaaefc280110d423887d982de7c7644790d1ac2835a9e3331b046a00f487e501631d69ab846dc276567de8342e5e540843f7494bc741db940ecd79b3a1bc1f2bb6129c46ae2297e440095ae1ca8dba29a8c9236c1b11271946349240c74723cfe020cb41e9b4570005102624613ddca14cfe86f48675c4a30e65a85bdaeb2b2166fce470a9510bc7bb0e625ad80721541e2e7282f1174e6e79c16a1a05789466c62545316e674e739e97cde4f04d4ac13e8db6eedf45c5f18747e84ddd29f3dc211e03166ece83184b4987695778e31825e22dd08b0ac2dc172ffdf8f3669cac22fd1 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 723c4d9322db3bd60254918e26e653c8052cfac0 2622261a5fb609832fd57a38861741b9a8118a84 372b0262cb03e1601bf927ce0c6b12ea37635673 d5fe403e192fb78c9fa8cddfae26a57249f0350e 79925d3db0204c3240ae6e894b74f61ed011b3b0 55b5c38322d51ae5b430a31d834fa88207763543 786f3806d18c503254699aa91c8ff23e5da66c48 5f801e7f68feca1e17567860bb3549f41fbfaf9b dfe725ac727bb72886582c04fa757553dd0e9460 f6762c7d0d98383797b309f61c7b41c1eae1d32d c346b4159ea87d2c5fb548e59c1c957d79ac955b 1cea869bb4c0a78bec9debb19205f868fcd1b358 d124e0b42bebcb490bfb7fd17b4e417c5d8ca9cc 6d5b70370ab00d3385d7da9f60d6a65cf778d857 680f76f5d2fb5b1843ff1f97f395c59ef092d082 82366cd03fddbbe5f2037d4739b4a9c5ded36c40 c1b69534bf68ca939b636d18b8fd626d639e5b00 64966bfee6957d8e052b515051c715ed12fcf2e5 83160d672d12884ed9ad9a51c81ad21e3a9f243e d98f079b Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [18:c3:59:42:62:fa:87:e1:4a:6d:33:c3:2d:08:f4:e2:1e:7c:2d:2e] modulus: bb839a3bf9290473232a30f4c01f8b53d6b27d96623bce25d6ce248e2d8689b8b80245876d007b77ce0d6f9ef71cdef3333847805f38e7251beb98a88308f0b9bf22e73edacb17187420a8e2f5bebdbea416957962006bfe7b0825eaed5ac32a90e4a0e321d09309255f4593bc1276028584f2a4292c872e3234a2dc58343a8cc45d53b48490bf43294afad2f4f2093ef80ac43fd35b7d6de29bc14734186b430993651e828f58ac09c444371a67eb6aeacc24bf7ed3e95c4e0e81595c488577e2a9bc14a123936be2dc6273ed42ff857b01bc0880b86c7f7d5e931ecb39cd505bcc5a9a5b077fc205abfddc90140bd8b2db1fd20fb9707225822748b6202d37 public exponent: 10001 ]