2022-07-06 05:35:31,069 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-07-06 05:35:32,030 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-07-06 05:35:32.858  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Jul 06, 2022 5:35:34 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jul 06, 2022 5:35:35 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jul 06, 2022 5:35:35 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jul 06, 2022 5:35:35 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-07-06 05:35:35.683 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-07-06 05:35:35.977  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-07-06 05:35:36.148  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-07-06 05:35:36.977 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-07-06 05:35:36.981 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-07-06 05:35:36.982 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-07-06 05:35:36.987 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-07-06 05:35:37.041 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-07-06 05:35:37.046 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-07-06 05:35:37.237 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-07-06 05:35:38.014 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jul 06, 2022 5:35:38 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-07-06 05:35:39.103  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 8.909 seconds (JVM running for 10.978) Jul 06, 2022 5:36:01 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-07-06 05:36:14.750  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-06 05:36:14.761 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-06 05:36:14.805 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-07-06 05:36:14.810 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-06 05:36:14.834  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-07-06 05:36:14.837  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-06 05:36:14.838  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-06 05:36:14.839 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-06 05:36:14.840 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-06 05:36:14.846 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-06 05:36:14.854 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-06 05:36:14.858 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-06 05:36:14.908 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-06 05:36:14.915 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-06 05:36:14.916 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-06 05:36:14.921 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-06 05:36:15.580  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-06 05:36:15.583  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-06 05:36:15.584 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-06 05:36:15.585 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-06 05:36:15.596  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-06 05:36:15.597  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-06 05:36:15.599 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 05:36:15.599 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 05:36:15.599 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 05:36:15.613 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 05:36:15.614 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 05:36:15.614 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 05:36:15.624 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 05:36:15.625 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 05:36:15.625 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 05:36:15.628 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-06 05:36:15.665 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 250658815183872363155882473769762911461481016713 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jul 06 05:33:10 UTC 2022 Final Date: Mon Jul 05 05:33:09 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [de:d4:09:85:50:cf:b6:cc:ee:cb:9b:9f:1d:28:5f:ec:64:ca:e0:83] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 14304620010312ad59178d0f27611e4457475feb 287c61ab2d8e78c32e3daa4d0851ea8d8019ad9b b5905e310d9184c126b3a396a1cc9f8bddf08fb3 82e94cb4ce8424a1e87c689f544e2e50fa33a564 43dd0e37710f409452ca75dc499c4c3adff276a2 49466a5932942ca02b6edae9eb27f2710d4abb3a b6aaa0bc8ca21cf1018116620ab47dea76bca633 7d29a1ff0af002171246990cc9bfd726a31bd331 682ad66f2cf6a9da66fbf70684d8a79bf63ebc33 2a4614366470d3313e9d10fc3728dc70111e3c68 c84cb0848128a4982c39c9cae822b1de3cbb5032 aa2da724de4590ce6c683625e55a70d33055b4be 93a0ebdfa69ef0d433248cedf3e672280071ddfc 28439f4b2bb0dc36a04e31e5b0f5122178d0b9b5 ea50e2c65d332999e5a7f7d2ddeb47f8391af8c6 4c63487581bc4288da78ed3e5c62d9fb21cad09f 4826cade755ec485679a8de747816b333a8fe627 7431c27b70539f984607a4d89ad6f0eb14b52020 5490fffe67d5b276d1d4bb35826b6c68e900c861 369b0daf Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d2:63:68:2c:00:b6:7e:e7:e3:52:b6:c9:0f:6e:69:4e:c3:af:28:6c] modulus: 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 public exponent: 10001 ] 2022-07-06 07:04:26.059  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-06 07:04:26.064 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-06 07:04:26.068 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-06 07:04:26.069 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-06 07:04:26.070  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-06 07:04:26.071  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-06 07:04:26.071  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-06 07:04:26.072 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-06 07:04:26.072 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-06 07:04:26.073 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-06 07:04:26.080 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-06 07:04:26.082 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-06 07:04:26.082 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-06 07:04:26.083 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-06 07:04:26.301  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-06 07:04:26.302  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-06 07:04:26.303 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-06 07:04:26.303 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-06 07:04:26.306  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-06 07:04:26.307  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-06 07:04:26.308 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 07:04:26.309 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 07:04:26.309 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 07:04:26.311 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 07:04:26.311 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 07:04:26.312 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 07:04:26.313 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 07:04:26.313 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 07:04:26.314 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 07:04:26.316 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-06 07:04:26.322 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 250658815183872363155882473769762911461481016713 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jul 06 05:33:10 UTC 2022 Final Date: Mon Jul 05 05:33:09 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [de:d4:09:85:50:cf:b6:cc:ee:cb:9b:9f:1d:28:5f:ec:64:ca:e0:83] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 14304620010312ad59178d0f27611e4457475feb 287c61ab2d8e78c32e3daa4d0851ea8d8019ad9b b5905e310d9184c126b3a396a1cc9f8bddf08fb3 82e94cb4ce8424a1e87c689f544e2e50fa33a564 43dd0e37710f409452ca75dc499c4c3adff276a2 49466a5932942ca02b6edae9eb27f2710d4abb3a b6aaa0bc8ca21cf1018116620ab47dea76bca633 7d29a1ff0af002171246990cc9bfd726a31bd331 682ad66f2cf6a9da66fbf70684d8a79bf63ebc33 2a4614366470d3313e9d10fc3728dc70111e3c68 c84cb0848128a4982c39c9cae822b1de3cbb5032 aa2da724de4590ce6c683625e55a70d33055b4be 93a0ebdfa69ef0d433248cedf3e672280071ddfc 28439f4b2bb0dc36a04e31e5b0f5122178d0b9b5 ea50e2c65d332999e5a7f7d2ddeb47f8391af8c6 4c63487581bc4288da78ed3e5c62d9fb21cad09f 4826cade755ec485679a8de747816b333a8fe627 7431c27b70539f984607a4d89ad6f0eb14b52020 5490fffe67d5b276d1d4bb35826b6c68e900c861 369b0daf Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7c:59:e2:a8:45:39:31:60:d1:56:ab:88:0e:94:4b:8b:8b:3b:20:6e] modulus: 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 public exponent: 10001 ] 2022-07-06 07:06:28.101  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-06 07:06:28.105 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-06 07:06:28.108 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-07-06 07:06:28.109 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-06 07:06:28.109  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-07-06 07:06:28.110  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-06 07:06:28.111  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-06 07:06:28.112 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-06 07:06:28.112 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-06 07:06:28.116 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-06 07:06:28.130 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-06 07:06:28.132 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-06 07:06:28.132 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-06 07:06:28.133 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-06 07:06:28.340  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-06 07:06:28.341  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-06 07:06:28.342 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-06 07:06:28.342 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-06 07:06:28.346  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-06 07:06:28.347  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-06 07:06:28.348 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 07:06:28.348 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 07:06:28.349 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 07:06:28.351 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 07:06:28.352 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 07:06:28.353 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 07:06:28.354 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 07:06:28.355 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 07:06:28.356 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 07:06:28.358 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-06 07:06:28.365 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 250658815183872363155882473769762911461481016713 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jul 06 05:33:10 UTC 2022 Final Date: Mon Jul 05 05:33:09 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [de:d4:09:85:50:cf:b6:cc:ee:cb:9b:9f:1d:28:5f:ec:64:ca:e0:83] modulus: 8ce511d0173185ed1058a615d2c1c2461d8228e187fde3529bde14101ee6e24ed6d4f65d62ba148289a6fd2bf68270b8b17d9d667fdf8bd2f00843cd9e36e907894e704c8e823f27e760373981dadaae53ef4c49056dddc1aeca074f6bd1d81d44af8207e9c01ed8d943619a40494f8040b00e96194d63a6234adf2937f27df3cf7de29d28c5a7bb7e5acfef864b75ecd9bcf97e5884158cb017895845244f57442c8426a1266f7b360ae18e84f108cde643447f44f8362e5035c310a2b79a17f80239c4ec9b493a528a3b9d4fada29346ee5392882705ee0ba4a2903480f0c04f266da0c9b0324f2c30fdc0e6fe36963743fcf7fad3e40790f7eefec087d6f106b3695843487c1c75a69bfe2f36eed664ecbef8d747b87f459eb0d3678e0ec7b65d2f09943d4348fd460bd37b773bfdc5eec810d960e9931a4d04b0945791776aec2c170fd9b435296dcb6cea40b93ba8b9d3825ce627974a084001bb8a3745bf37f70397a6dd423232a807820ae442cb01f0d42e6589aa20020a1ab3b6a9bd public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 14304620010312ad59178d0f27611e4457475feb 287c61ab2d8e78c32e3daa4d0851ea8d8019ad9b b5905e310d9184c126b3a396a1cc9f8bddf08fb3 82e94cb4ce8424a1e87c689f544e2e50fa33a564 43dd0e37710f409452ca75dc499c4c3adff276a2 49466a5932942ca02b6edae9eb27f2710d4abb3a b6aaa0bc8ca21cf1018116620ab47dea76bca633 7d29a1ff0af002171246990cc9bfd726a31bd331 682ad66f2cf6a9da66fbf70684d8a79bf63ebc33 2a4614366470d3313e9d10fc3728dc70111e3c68 c84cb0848128a4982c39c9cae822b1de3cbb5032 aa2da724de4590ce6c683625e55a70d33055b4be 93a0ebdfa69ef0d433248cedf3e672280071ddfc 28439f4b2bb0dc36a04e31e5b0f5122178d0b9b5 ea50e2c65d332999e5a7f7d2ddeb47f8391af8c6 4c63487581bc4288da78ed3e5c62d9fb21cad09f 4826cade755ec485679a8de747816b333a8fe627 7431c27b70539f984607a4d89ad6f0eb14b52020 5490fffe67d5b276d1d4bb35826b6c68e900c861 369b0daf Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f6:7a:56:a6:bc:57:6e:59:63:d4:13:35:5c:3f:fa:66:90:af:cc:ce] modulus: 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 public exponent: 10001 ] 2022-07-06 07:07:30.602  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-06 07:07:30.603 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-06 07:07:30.606 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-07-06 07:07:30.609 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-06 07:07:30.612  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-07-06 07:07:30.613  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-06 07:07:30.614  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-06 07:07:30.615 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-06 07:07:30.615 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-06 07:07:30.616 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-06 07:07:30.622 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-06 07:07:30.623 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-06 07:07:30.624 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-06 07:07:30.624 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-06 07:07:30.817  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-06 07:07:30.818  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-06 07:07:30.818 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-06 07:07:30.819 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-06 07:07:30.829  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-06 07:07:30.830  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-06 07:07:30.831 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 07:07:30.831 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 07:07:30.831 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 07:07:30.832 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 07:07:30.833 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 07:07:30.833 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 07:07:30.834 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 07:07:30.834 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 07:07:30.835 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 07:07:30.836 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-06 07:07:30.840 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 250658815183872363155882473769762911461481016713 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jul 06 05:33:10 UTC 2022 Final Date: Mon Jul 05 05:33:09 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [de:d4:09:85:50:cf:b6:cc:ee:cb:9b:9f:1d:28:5f:ec:64:ca:e0:83] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 14304620010312ad59178d0f27611e4457475feb 287c61ab2d8e78c32e3daa4d0851ea8d8019ad9b b5905e310d9184c126b3a396a1cc9f8bddf08fb3 82e94cb4ce8424a1e87c689f544e2e50fa33a564 43dd0e37710f409452ca75dc499c4c3adff276a2 49466a5932942ca02b6edae9eb27f2710d4abb3a b6aaa0bc8ca21cf1018116620ab47dea76bca633 7d29a1ff0af002171246990cc9bfd726a31bd331 682ad66f2cf6a9da66fbf70684d8a79bf63ebc33 2a4614366470d3313e9d10fc3728dc70111e3c68 c84cb0848128a4982c39c9cae822b1de3cbb5032 aa2da724de4590ce6c683625e55a70d33055b4be 93a0ebdfa69ef0d433248cedf3e672280071ddfc 28439f4b2bb0dc36a04e31e5b0f5122178d0b9b5 ea50e2c65d332999e5a7f7d2ddeb47f8391af8c6 4c63487581bc4288da78ed3e5c62d9fb21cad09f 4826cade755ec485679a8de747816b333a8fe627 7431c27b70539f984607a4d89ad6f0eb14b52020 5490fffe67d5b276d1d4bb35826b6c68e900c861 369b0daf Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [bc:52:53:8a:e8:a7:0e:f4:57:9e:63:b1:22:5b:be:c3:b2:38:52:26] modulus: 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 public exponent: 10001 ] 2022-07-06 07:10:08.668  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-06 07:10:08.671 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-06 07:10:08.673 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-06 07:10:08.674 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-06 07:10:08.675  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-06 07:10:08.676  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-06 07:10:08.677  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-06 07:10:08.678 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-06 07:10:08.678 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-06 07:10:08.679 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-06 07:10:08.687 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-06 07:10:08.690 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-06 07:10:08.695 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-06 07:10:08.696 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-06 07:10:08.887  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-06 07:10:08.888  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-06 07:10:08.890 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-06 07:10:08.890 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-06 07:10:08.892  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-06 07:10:08.893  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-06 07:10:08.894 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 07:10:08.894 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 07:10:08.895 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 07:10:08.896 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 07:10:08.896 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 07:10:08.896 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 07:10:08.898 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 07:10:08.898 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 07:10:08.898 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 07:10:08.900 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-06 07:10:08.905 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 250658815183872363155882473769762911461481016713 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jul 06 05:33:10 UTC 2022 Final Date: Mon Jul 05 05:33:09 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [de:d4:09:85:50:cf:b6:cc:ee:cb:9b:9f:1d:28:5f:ec:64:ca:e0:83] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 14304620010312ad59178d0f27611e4457475feb 287c61ab2d8e78c32e3daa4d0851ea8d8019ad9b b5905e310d9184c126b3a396a1cc9f8bddf08fb3 82e94cb4ce8424a1e87c689f544e2e50fa33a564 43dd0e37710f409452ca75dc499c4c3adff276a2 49466a5932942ca02b6edae9eb27f2710d4abb3a b6aaa0bc8ca21cf1018116620ab47dea76bca633 7d29a1ff0af002171246990cc9bfd726a31bd331 682ad66f2cf6a9da66fbf70684d8a79bf63ebc33 2a4614366470d3313e9d10fc3728dc70111e3c68 c84cb0848128a4982c39c9cae822b1de3cbb5032 aa2da724de4590ce6c683625e55a70d33055b4be 93a0ebdfa69ef0d433248cedf3e672280071ddfc 28439f4b2bb0dc36a04e31e5b0f5122178d0b9b5 ea50e2c65d332999e5a7f7d2ddeb47f8391af8c6 4c63487581bc4288da78ed3e5c62d9fb21cad09f 4826cade755ec485679a8de747816b333a8fe627 7431c27b70539f984607a4d89ad6f0eb14b52020 5490fffe67d5b276d1d4bb35826b6c68e900c861 369b0daf Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [67:46:fd:9b:bf:7c:b8:f8:ed:1b:89:a7:19:6a:33:7c:0e:4c:56:f6] modulus: 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 public exponent: 10001 ] 2022-07-06 07:14:11.064  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-06 07:14:11.067 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-06 07:14:11.070 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-06 07:14:11.071 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-06 07:14:11.072  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-06 07:14:11.073  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-06 07:14:11.073  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-06 07:14:11.074 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-06 07:14:11.074 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-06 07:14:11.075 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-06 07:14:11.083 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-06 07:14:11.085 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-06 07:14:11.085 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-06 07:14:11.086 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-06 07:14:11.274  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-06 07:14:11.275  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-06 07:14:11.276 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-06 07:14:11.276 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-06 07:14:11.278  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-06 07:14:11.278  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-06 07:14:11.279 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 07:14:11.279 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 07:14:11.279 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 07:14:11.280 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 07:14:11.280 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 07:14:11.281 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 07:14:11.281 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 07:14:11.282 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 07:14:11.282 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 07:14:11.283 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-06 07:14:11.288 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 250658815183872363155882473769762911461481016713 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jul 06 05:33:10 UTC 2022 Final Date: Mon Jul 05 05:33:09 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [de:d4:09:85:50:cf:b6:cc:ee:cb:9b:9f:1d:28:5f:ec:64:ca:e0:83] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 14304620010312ad59178d0f27611e4457475feb 287c61ab2d8e78c32e3daa4d0851ea8d8019ad9b b5905e310d9184c126b3a396a1cc9f8bddf08fb3 82e94cb4ce8424a1e87c689f544e2e50fa33a564 43dd0e37710f409452ca75dc499c4c3adff276a2 49466a5932942ca02b6edae9eb27f2710d4abb3a b6aaa0bc8ca21cf1018116620ab47dea76bca633 7d29a1ff0af002171246990cc9bfd726a31bd331 682ad66f2cf6a9da66fbf70684d8a79bf63ebc33 2a4614366470d3313e9d10fc3728dc70111e3c68 c84cb0848128a4982c39c9cae822b1de3cbb5032 aa2da724de4590ce6c683625e55a70d33055b4be 93a0ebdfa69ef0d433248cedf3e672280071ddfc 28439f4b2bb0dc36a04e31e5b0f5122178d0b9b5 ea50e2c65d332999e5a7f7d2ddeb47f8391af8c6 4c63487581bc4288da78ed3e5c62d9fb21cad09f 4826cade755ec485679a8de747816b333a8fe627 7431c27b70539f984607a4d89ad6f0eb14b52020 5490fffe67d5b276d1d4bb35826b6c68e900c861 369b0daf Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [26:23:ec:b3:2b:82:d7:25:7d:c2:e9:2b:53:6e:db:f6:ee:5a:e4:9e] modulus: 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 public exponent: 10001 ] 2022-07-06 07:18:20.141  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-06 07:18:20.146 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-06 07:18:20.155 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-06 07:18:20.160 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-06 07:18:20.161  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-06 07:18:20.163  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-06 07:18:20.164  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-06 07:18:20.164 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-06 07:18:20.165 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-06 07:18:20.165 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-06 07:18:20.171 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-06 07:18:20.173 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-06 07:18:20.173 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-06 07:18:20.174 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-06 07:18:20.347  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-06 07:18:20.349  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-06 07:18:20.350 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-06 07:18:20.350 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-06 07:18:20.353  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-06 07:18:20.357  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-06 07:18:20.358 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 07:18:20.359 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 07:18:20.359 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 07:18:20.361 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 07:18:20.361 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 07:18:20.367 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 07:18:20.369 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 07:18:20.371 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 07:18:20.372 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 07:18:20.373 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-06 07:18:20.377 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 250658815183872363155882473769762911461481016713 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jul 06 05:33:10 UTC 2022 Final Date: Mon Jul 05 05:33:09 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [de:d4:09:85:50:cf:b6:cc:ee:cb:9b:9f:1d:28:5f:ec:64:ca:e0:83] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 14304620010312ad59178d0f27611e4457475feb 287c61ab2d8e78c32e3daa4d0851ea8d8019ad9b b5905e310d9184c126b3a396a1cc9f8bddf08fb3 82e94cb4ce8424a1e87c689f544e2e50fa33a564 43dd0e37710f409452ca75dc499c4c3adff276a2 49466a5932942ca02b6edae9eb27f2710d4abb3a b6aaa0bc8ca21cf1018116620ab47dea76bca633 7d29a1ff0af002171246990cc9bfd726a31bd331 682ad66f2cf6a9da66fbf70684d8a79bf63ebc33 2a4614366470d3313e9d10fc3728dc70111e3c68 c84cb0848128a4982c39c9cae822b1de3cbb5032 aa2da724de4590ce6c683625e55a70d33055b4be 93a0ebdfa69ef0d433248cedf3e672280071ddfc 28439f4b2bb0dc36a04e31e5b0f5122178d0b9b5 ea50e2c65d332999e5a7f7d2ddeb47f8391af8c6 4c63487581bc4288da78ed3e5c62d9fb21cad09f 4826cade755ec485679a8de747816b333a8fe627 7431c27b70539f984607a4d89ad6f0eb14b52020 5490fffe67d5b276d1d4bb35826b6c68e900c861 369b0daf Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7f:a2:bb:9b:3d:be:ab:9b:e1:fb:1c:72:b0:07:2c:b8:39:b9:3e:67] modulus: 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 public exponent: 10001 ] 2022-07-06 07:20:20.184  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-06 07:20:20.189 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-06 07:20:20.193 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-06 07:20:20.194 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-06 07:20:20.195  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-06 07:20:20.196  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-06 07:20:20.196  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-06 07:20:20.197 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-06 07:20:20.197 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-06 07:20:20.198 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-06 07:20:20.203 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-06 07:20:20.204 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-06 07:20:20.205 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-06 07:20:20.205 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-06 07:20:20.364  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-06 07:20:20.365  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-06 07:20:20.365 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-06 07:20:20.366 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-06 07:20:20.368  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-06 07:20:20.369  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-06 07:20:20.369 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 07:20:20.370 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 07:20:20.370 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 07:20:20.373 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 07:20:20.373 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 07:20:20.373 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 07:20:20.374 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 07:20:20.374 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 07:20:20.375 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 07:20:20.375 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-06 07:20:20.381 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 250658815183872363155882473769762911461481016713 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jul 06 05:33:10 UTC 2022 Final Date: Mon Jul 05 05:33:09 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [de:d4:09:85:50:cf:b6:cc:ee:cb:9b:9f:1d:28:5f:ec:64:ca:e0:83] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 14304620010312ad59178d0f27611e4457475feb 287c61ab2d8e78c32e3daa4d0851ea8d8019ad9b b5905e310d9184c126b3a396a1cc9f8bddf08fb3 82e94cb4ce8424a1e87c689f544e2e50fa33a564 43dd0e37710f409452ca75dc499c4c3adff276a2 49466a5932942ca02b6edae9eb27f2710d4abb3a b6aaa0bc8ca21cf1018116620ab47dea76bca633 7d29a1ff0af002171246990cc9bfd726a31bd331 682ad66f2cf6a9da66fbf70684d8a79bf63ebc33 2a4614366470d3313e9d10fc3728dc70111e3c68 c84cb0848128a4982c39c9cae822b1de3cbb5032 aa2da724de4590ce6c683625e55a70d33055b4be 93a0ebdfa69ef0d433248cedf3e672280071ddfc 28439f4b2bb0dc36a04e31e5b0f5122178d0b9b5 ea50e2c65d332999e5a7f7d2ddeb47f8391af8c6 4c63487581bc4288da78ed3e5c62d9fb21cad09f 4826cade755ec485679a8de747816b333a8fe627 7431c27b70539f984607a4d89ad6f0eb14b52020 5490fffe67d5b276d1d4bb35826b6c68e900c861 369b0daf Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a0:1f:6c:41:3e:96:33:56:62:7e:5e:39:58:b0:16:d5:6c:43:79:9b] modulus: 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 public exponent: 10001 ] 2022-07-06 07:22:39.779  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-06 07:22:39.781 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-06 07:22:39.784 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-06 07:22:39.785 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-06 07:22:39.785  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-06 07:22:39.787  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-06 07:22:39.787  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-06 07:22:39.788 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-06 07:22:39.788 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-06 07:22:39.788 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-06 07:22:39.793 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-06 07:22:39.794 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-06 07:22:39.794 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-06 07:22:39.795 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-06 07:22:39.924  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-06 07:22:39.925  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-06 07:22:39.925 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-06 07:22:39.925 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-06 07:22:39.927  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-06 07:22:39.928  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-06 07:22:39.928 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 07:22:39.928 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 07:22:39.929 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 07:22:39.930 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 07:22:39.930 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 07:22:39.930 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 07:22:39.931 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 07:22:39.931 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 07:22:39.931 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 07:22:39.933 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-06 07:22:39.937 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 250658815183872363155882473769762911461481016713 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jul 06 05:33:10 UTC 2022 Final Date: Mon Jul 05 05:33:09 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [de:d4:09:85:50:cf:b6:cc:ee:cb:9b:9f:1d:28:5f:ec:64:ca:e0:83] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 14304620010312ad59178d0f27611e4457475feb 287c61ab2d8e78c32e3daa4d0851ea8d8019ad9b b5905e310d9184c126b3a396a1cc9f8bddf08fb3 82e94cb4ce8424a1e87c689f544e2e50fa33a564 43dd0e37710f409452ca75dc499c4c3adff276a2 49466a5932942ca02b6edae9eb27f2710d4abb3a b6aaa0bc8ca21cf1018116620ab47dea76bca633 7d29a1ff0af002171246990cc9bfd726a31bd331 682ad66f2cf6a9da66fbf70684d8a79bf63ebc33 2a4614366470d3313e9d10fc3728dc70111e3c68 c84cb0848128a4982c39c9cae822b1de3cbb5032 aa2da724de4590ce6c683625e55a70d33055b4be 93a0ebdfa69ef0d433248cedf3e672280071ddfc 28439f4b2bb0dc36a04e31e5b0f5122178d0b9b5 ea50e2c65d332999e5a7f7d2ddeb47f8391af8c6 4c63487581bc4288da78ed3e5c62d9fb21cad09f 4826cade755ec485679a8de747816b333a8fe627 7431c27b70539f984607a4d89ad6f0eb14b52020 5490fffe67d5b276d1d4bb35826b6c68e900c861 369b0daf Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a1:9a:2c:a3:12:1e:ea:03:9b:4c:78:a4:c2:ad:38:b1:c7:19:da:d8] modulus: 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 public exponent: 10001 ] 2022-07-06 07:25:07.088  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-06 07:25:07.090 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-06 07:25:07.092 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-07-06 07:25:07.093 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-06 07:25:07.093  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-07-06 07:25:07.094  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-06 07:25:07.094  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-06 07:25:07.095 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-06 07:25:07.095 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-06 07:25:07.096 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-06 07:25:07.101 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-06 07:25:07.103 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-06 07:25:07.103 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-06 07:25:07.104 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-06 07:25:07.261  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-06 07:25:07.264  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-06 07:25:07.265 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-06 07:25:07.265 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-06 07:25:07.267  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-06 07:25:07.267  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-06 07:25:07.269 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 07:25:07.270 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 07:25:07.270 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 07:25:07.271 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 07:25:07.272 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 07:25:07.272 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 07:25:07.273 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 07:25:07.274 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 07:25:07.274 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 07:25:07.276 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-06 07:25:07.295 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 250658815183872363155882473769762911461481016713 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jul 06 05:33:10 UTC 2022 Final Date: Mon Jul 05 05:33:09 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [de:d4:09:85:50:cf:b6:cc:ee:cb:9b:9f:1d:28:5f:ec:64:ca:e0:83] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 14304620010312ad59178d0f27611e4457475feb 287c61ab2d8e78c32e3daa4d0851ea8d8019ad9b b5905e310d9184c126b3a396a1cc9f8bddf08fb3 82e94cb4ce8424a1e87c689f544e2e50fa33a564 43dd0e37710f409452ca75dc499c4c3adff276a2 49466a5932942ca02b6edae9eb27f2710d4abb3a b6aaa0bc8ca21cf1018116620ab47dea76bca633 7d29a1ff0af002171246990cc9bfd726a31bd331 682ad66f2cf6a9da66fbf70684d8a79bf63ebc33 2a4614366470d3313e9d10fc3728dc70111e3c68 c84cb0848128a4982c39c9cae822b1de3cbb5032 aa2da724de4590ce6c683625e55a70d33055b4be 93a0ebdfa69ef0d433248cedf3e672280071ddfc 28439f4b2bb0dc36a04e31e5b0f5122178d0b9b5 ea50e2c65d332999e5a7f7d2ddeb47f8391af8c6 4c63487581bc4288da78ed3e5c62d9fb21cad09f 4826cade755ec485679a8de747816b333a8fe627 7431c27b70539f984607a4d89ad6f0eb14b52020 5490fffe67d5b276d1d4bb35826b6c68e900c861 369b0daf Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [63:26:f1:e6:89:b1:19:90:6e:90:7c:53:86:6d:c4:90:7b:5d:a9:43] modulus: d4d920c50e670e57b8754005b97ef866c371c3cad7284f24625a570fc61958b1d3af63a8a20498b07101f3c3b01dbaec61d8e90064eafbd0819b22ad86ac7186fdd9e236a12e46c278b0895ca9ebb223fc81adb622c605a9dc4e66aecbeb5665e1f3ee3cf55ef9debc4f0da330c0c0d221e0c8473663b2fb9107068da9b20e7fca46d52281bed0ae9424562e5845b58b6721e4acb6ac6e70602c913864fe63588826d5e75a2b789e6bcf853b794378989931fa113d9ea77b17b2117a69c06e9973bd744143423d6bdc2d831f929940fcf21d9aead641ff07b5d459cc741c377905d2d41d0c1fb3c27da3e0d8888c57f6a6d396bf01e0763bae9e0cf117e82eab public exponent: 10001 ] 2022-07-06 07:26:39.209  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-06 07:26:39.211 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-06 07:26:39.213 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-06 07:26:39.214 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-06 07:26:39.214  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-06 07:26:39.215  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-06 07:26:39.215  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-06 07:26:39.216 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-06 07:26:39.216 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-06 07:26:39.217 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-06 07:26:39.223 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-06 07:26:39.224 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-06 07:26:39.224 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-06 07:26:39.225 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-06 07:26:39.384  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-06 07:26:39.386  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-06 07:26:39.386 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-06 07:26:39.386 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-06 07:26:39.389  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-06 07:26:39.389  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-06 07:26:39.390 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 07:26:39.390 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 07:26:39.391 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 07:26:39.392 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 07:26:39.393 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 07:26:39.393 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 07:26:39.394 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 07:26:39.394 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 07:26:39.395 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 07:26:39.396 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-06 07:26:39.402 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 250658815183872363155882473769762911461481016713 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jul 06 05:33:10 UTC 2022 Final Date: Mon Jul 05 05:33:09 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [de:d4:09:85:50:cf:b6:cc:ee:cb:9b:9f:1d:28:5f:ec:64:ca:e0:83] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 14304620010312ad59178d0f27611e4457475feb 287c61ab2d8e78c32e3daa4d0851ea8d8019ad9b b5905e310d9184c126b3a396a1cc9f8bddf08fb3 82e94cb4ce8424a1e87c689f544e2e50fa33a564 43dd0e37710f409452ca75dc499c4c3adff276a2 49466a5932942ca02b6edae9eb27f2710d4abb3a b6aaa0bc8ca21cf1018116620ab47dea76bca633 7d29a1ff0af002171246990cc9bfd726a31bd331 682ad66f2cf6a9da66fbf70684d8a79bf63ebc33 2a4614366470d3313e9d10fc3728dc70111e3c68 c84cb0848128a4982c39c9cae822b1de3cbb5032 aa2da724de4590ce6c683625e55a70d33055b4be 93a0ebdfa69ef0d433248cedf3e672280071ddfc 28439f4b2bb0dc36a04e31e5b0f5122178d0b9b5 ea50e2c65d332999e5a7f7d2ddeb47f8391af8c6 4c63487581bc4288da78ed3e5c62d9fb21cad09f 4826cade755ec485679a8de747816b333a8fe627 7431c27b70539f984607a4d89ad6f0eb14b52020 5490fffe67d5b276d1d4bb35826b6c68e900c861 369b0daf Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4f:ea:a7:d0:40:ce:75:5b:59:5d:ef:b6:74:a1:d4:3a:f0:67:b4:7e] modulus: bf84c9cfa3288955ca911d9eff17e06c84e86c479750cc0ff979fc875d11c54667935fe13d90f0a3673e780892fb1c7dc09f3f73137e59c3739aba9c0be55613a30a133fa7556d007075f669912583f487af9f665cdc9a3452359ac6317e559c1e559fbd53f1d368c16581f42f66004fec34dbdb8098462e331882eff598fc0ad275ca931582f15d753e615f96e4b92cdcaa3e513282688c641c460eec30ac11f4ba63b112c8cca399d3752db9e552329d5208a06f8fee1a637a8a15469e052f76de9edde7cb5b64a4e544734f4895e92c6962a2ba2ae7bfca05013f508accbefe4b115ced3a747e47b4acda2537b55e299e6985d1e9962c6817229df2434ad5 public exponent: 10001 ] 2022-07-06 07:30:52.451  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-06 07:30:52.453 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-06 07:30:52.455 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-06 07:30:52.456 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-06 07:30:52.456  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-06 07:30:52.457  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-06 07:30:52.457  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-06 07:30:52.457 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-06 07:30:52.458 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-06 07:30:52.458 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-06 07:30:52.463 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-06 07:30:52.464 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-06 07:30:52.464 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-06 07:30:52.464 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-06 07:30:52.597  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-06 07:30:52.598  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-06 07:30:52.599 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-06 07:30:52.599 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-06 07:30:52.600  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-06 07:30:52.601  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-06 07:30:52.601 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 07:30:52.601 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 07:30:52.602 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 07:30:52.602 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 07:30:52.603 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 07:30:52.603 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 07:30:52.603 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 07:30:52.604 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 07:30:52.604 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 07:30:52.605 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-06 07:30:52.609 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 250658815183872363155882473769762911461481016713 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jul 06 05:33:10 UTC 2022 Final Date: Mon Jul 05 05:33:09 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [de:d4:09:85:50:cf:b6:cc:ee:cb:9b:9f:1d:28:5f:ec:64:ca:e0:83] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 14304620010312ad59178d0f27611e4457475feb 287c61ab2d8e78c32e3daa4d0851ea8d8019ad9b b5905e310d9184c126b3a396a1cc9f8bddf08fb3 82e94cb4ce8424a1e87c689f544e2e50fa33a564 43dd0e37710f409452ca75dc499c4c3adff276a2 49466a5932942ca02b6edae9eb27f2710d4abb3a b6aaa0bc8ca21cf1018116620ab47dea76bca633 7d29a1ff0af002171246990cc9bfd726a31bd331 682ad66f2cf6a9da66fbf70684d8a79bf63ebc33 2a4614366470d3313e9d10fc3728dc70111e3c68 c84cb0848128a4982c39c9cae822b1de3cbb5032 aa2da724de4590ce6c683625e55a70d33055b4be 93a0ebdfa69ef0d433248cedf3e672280071ddfc 28439f4b2bb0dc36a04e31e5b0f5122178d0b9b5 ea50e2c65d332999e5a7f7d2ddeb47f8391af8c6 4c63487581bc4288da78ed3e5c62d9fb21cad09f 4826cade755ec485679a8de747816b333a8fe627 7431c27b70539f984607a4d89ad6f0eb14b52020 5490fffe67d5b276d1d4bb35826b6c68e900c861 369b0daf Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [de:9a:61:bf:cf:78:57:37:5b:1d:68:6d:64:06:9a:95:a2:cc:15:de] modulus: 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 public exponent: 10001 ] 2022-07-06 07:30:54.360  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-06 07:30:54.361 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-06 07:30:54.362 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-07-06 07:30:54.363 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-06 07:30:54.363  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-07-06 07:30:54.364  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-06 07:30:54.364  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-06 07:30:54.365 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-06 07:30:54.365 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-06 07:30:54.365 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-06 07:30:54.370 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-06 07:30:54.371 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-06 07:30:54.371 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-06 07:30:54.372 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-06 07:30:54.477  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-06 07:30:54.478  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-06 07:30:54.478 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-06 07:30:54.478 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-06 07:30:54.480  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-06 07:30:54.480  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-06 07:30:54.481 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 07:30:54.481 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 07:30:54.481 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 07:30:54.482 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 07:30:54.482 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 07:30:54.482 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 07:30:54.483 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 07:30:54.483 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 07:30:54.483 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 07:30:54.484 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-06 07:30:54.487 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 250658815183872363155882473769762911461481016713 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jul 06 05:33:10 UTC 2022 Final Date: Mon Jul 05 05:33:09 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [de:d4:09:85:50:cf:b6:cc:ee:cb:9b:9f:1d:28:5f:ec:64:ca:e0:83] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 14304620010312ad59178d0f27611e4457475feb 287c61ab2d8e78c32e3daa4d0851ea8d8019ad9b b5905e310d9184c126b3a396a1cc9f8bddf08fb3 82e94cb4ce8424a1e87c689f544e2e50fa33a564 43dd0e37710f409452ca75dc499c4c3adff276a2 49466a5932942ca02b6edae9eb27f2710d4abb3a b6aaa0bc8ca21cf1018116620ab47dea76bca633 7d29a1ff0af002171246990cc9bfd726a31bd331 682ad66f2cf6a9da66fbf70684d8a79bf63ebc33 2a4614366470d3313e9d10fc3728dc70111e3c68 c84cb0848128a4982c39c9cae822b1de3cbb5032 aa2da724de4590ce6c683625e55a70d33055b4be 93a0ebdfa69ef0d433248cedf3e672280071ddfc 28439f4b2bb0dc36a04e31e5b0f5122178d0b9b5 ea50e2c65d332999e5a7f7d2ddeb47f8391af8c6 4c63487581bc4288da78ed3e5c62d9fb21cad09f 4826cade755ec485679a8de747816b333a8fe627 7431c27b70539f984607a4d89ad6f0eb14b52020 5490fffe67d5b276d1d4bb35826b6c68e900c861 369b0daf Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f7:0d:f9:1a:80:27:a6:36:e7:16:8c:55:61:4a:d8:6e:fb:4d:f9:d7] modulus: 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 public exponent: 10001 ] 2022-07-06 07:31:13.395  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-06 07:31:13.397 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-06 07:31:13.399 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-07-06 07:31:13.400 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-06 07:31:13.401  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-07-06 07:31:13.402  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-06 07:31:13.402  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-06 07:31:13.403 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-06 07:31:13.404 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-06 07:31:13.404 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-06 07:31:13.412 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-06 07:31:13.414 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-06 07:31:13.414 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-06 07:31:13.415 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-06 07:31:13.542  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-06 07:31:13.543  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-06 07:31:13.544 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-06 07:31:13.544 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-06 07:31:13.546  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-06 07:31:13.546  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-06 07:31:13.547 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 07:31:13.547 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 07:31:13.548 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 07:31:13.549 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 07:31:13.549 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 07:31:13.549 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 07:31:13.550 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 07:31:13.550 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 07:31:13.551 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 07:31:13.552 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-06 07:31:13.557 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 250658815183872363155882473769762911461481016713 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jul 06 05:33:10 UTC 2022 Final Date: Mon Jul 05 05:33:09 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [de:d4:09:85:50:cf:b6:cc:ee:cb:9b:9f:1d:28:5f:ec:64:ca:e0:83] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 14304620010312ad59178d0f27611e4457475feb 287c61ab2d8e78c32e3daa4d0851ea8d8019ad9b b5905e310d9184c126b3a396a1cc9f8bddf08fb3 82e94cb4ce8424a1e87c689f544e2e50fa33a564 43dd0e37710f409452ca75dc499c4c3adff276a2 49466a5932942ca02b6edae9eb27f2710d4abb3a b6aaa0bc8ca21cf1018116620ab47dea76bca633 7d29a1ff0af002171246990cc9bfd726a31bd331 682ad66f2cf6a9da66fbf70684d8a79bf63ebc33 2a4614366470d3313e9d10fc3728dc70111e3c68 c84cb0848128a4982c39c9cae822b1de3cbb5032 aa2da724de4590ce6c683625e55a70d33055b4be 93a0ebdfa69ef0d433248cedf3e672280071ddfc 28439f4b2bb0dc36a04e31e5b0f5122178d0b9b5 ea50e2c65d332999e5a7f7d2ddeb47f8391af8c6 4c63487581bc4288da78ed3e5c62d9fb21cad09f 4826cade755ec485679a8de747816b333a8fe627 7431c27b70539f984607a4d89ad6f0eb14b52020 5490fffe67d5b276d1d4bb35826b6c68e900c861 369b0daf Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4a:e0:1f:ff:f7:2c:79:49:d0:b4:24:6c:7b:20:9b:ce:13:d9:43:47] modulus: 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 public exponent: 10001 ] 2022-07-06 07:35:31.034  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-06 07:35:31.037 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-06 07:35:31.040 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-06 07:35:31.041 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-06 07:35:31.042  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-06 07:35:31.042  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-06 07:35:31.043  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-06 07:35:31.043 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-06 07:35:31.044 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-06 07:35:31.044 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-06 07:35:31.050 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-06 07:35:31.051 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-06 07:35:31.051 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-06 07:35:31.052 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-06 07:35:31.312  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-06 07:35:31.313  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-06 07:35:31.313 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-06 07:35:31.314 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-06 07:35:31.331  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-06 07:35:31.332  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-06 07:35:31.332 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 07:35:31.333 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 07:35:31.333 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 07:35:31.334 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 07:35:31.335 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 07:35:31.335 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 07:35:31.336 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-06 07:35:31.336 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-06 07:35:31.336 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-06 07:35:31.337 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-06 07:35:31.350 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 250658815183872363155882473769762911461481016713 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jul 06 05:33:10 UTC 2022 Final Date: Mon Jul 05 05:33:09 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [de:d4:09:85:50:cf:b6:cc:ee:cb:9b:9f:1d:28:5f:ec:64:ca:e0:83] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 14304620010312ad59178d0f27611e4457475feb 287c61ab2d8e78c32e3daa4d0851ea8d8019ad9b b5905e310d9184c126b3a396a1cc9f8bddf08fb3 82e94cb4ce8424a1e87c689f544e2e50fa33a564 43dd0e37710f409452ca75dc499c4c3adff276a2 49466a5932942ca02b6edae9eb27f2710d4abb3a b6aaa0bc8ca21cf1018116620ab47dea76bca633 7d29a1ff0af002171246990cc9bfd726a31bd331 682ad66f2cf6a9da66fbf70684d8a79bf63ebc33 2a4614366470d3313e9d10fc3728dc70111e3c68 c84cb0848128a4982c39c9cae822b1de3cbb5032 aa2da724de4590ce6c683625e55a70d33055b4be 93a0ebdfa69ef0d433248cedf3e672280071ddfc 28439f4b2bb0dc36a04e31e5b0f5122178d0b9b5 ea50e2c65d332999e5a7f7d2ddeb47f8391af8c6 4c63487581bc4288da78ed3e5c62d9fb21cad09f 4826cade755ec485679a8de747816b333a8fe627 7431c27b70539f984607a4d89ad6f0eb14b52020 5490fffe67d5b276d1d4bb35826b6c68e900c861 369b0daf Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d4:11:80:a1:72:7b:68:8a:3d:ee:eb:d0:35:74:f7:3f:19:e1:e4:5a] modulus: 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 public exponent: 10001 ]