2022-01-11 02:59:56,877 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-01-11 03:00:00,666 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.2.4.RELEASE) 2022-01-11 03:00:03.568  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default 2022-01-11 03:00:15.384 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-01-11 03:00:16.368  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-01-11 03:00:16.978  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-01-11 03:00:26.375  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 31.607 seconds (JVM running for 37.865) 2022-01-11 03:01:55.271  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-01-11 03:01:55.278 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-01-11 03:01:55.384 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-01-11 03:01:55.387 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-01-11 03:01:55.471  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-01-11 03:01:55.474  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-01-11 03:01:55.475  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-01-11 03:01:55.568 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-01-11 03:01:55.569 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-01-11 03:01:55.573 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-01-11 03:01:55.578 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-01-11 03:01:55.581 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-01-11 03:01:55.768 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-01-11 03:01:55.773 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-01-11 03:01:55.774 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-01-11 03:01:55.777 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-01-11 03:01:57.042  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-01-11 03:01:57.046  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-01-11 03:01:57.046 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-01-11 03:01:57.048 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-01-11 03:01:57.065  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-01-11 03:01:57.067  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-01-11 03:01:57.068 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-01-11 03:01:57.069 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-01-11 03:01:57.069 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-01-11 03:01:57.082 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-01-11 03:01:57.082 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-01-11 03:01:57.083 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-01-11 03:01:57.165 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-01-11 03:01:57.166 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-01-11 03:01:57.167 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-01-11 03:01:57.169 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-01-11 03:01:57.461 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 708974965820370539508482873264016120984971073030 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 11 02:53:22 UTC 2022 Final Date: Sun Jan 11 02:53:21 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9e:79:ff:e4:98:e5:ad:cc:9b:c0:3c:03:3f:80:9e:3e:2c:7b:f8:c8] modulus: c3923a581172fbc0315fe2ab49594c74638ace5b76b903e356cb88493e358e63e5ecae9de16745ecc37a54da2ed31e6b1c85b09981114a7a8279b146012ef429b1a0289e887d9e75b868322714c2dd20bbaffdf89b3e7ed0e148e272ba38163d6a8221f00769aeb5d6ac0d1aecb1efba4ea424d10e8be60abab166218ab107e2500dd23edf8042d9ce7b7cc143cb451cd59413822b7f568a2984f636acbc517a0888c5f5b8bca92086e5466a776607a5d6b8fe697e8c251fbcf274d16ec2fcabc40efeab332c5b5791d5637636122f0c7faa15996fc89e9bc8f6d166b1578695ea7a3030e7d89634e7a9f6426685509916cd8944992c10b5b88b57675a5fd07bc854cffe4e3027685c978bab0685b606c2c8b319abe0d0c7f2a75e506fad29408fdd055f76bd9b0d6aa8117cbe6fdec3e4c0a0d8a5440de470d06b7d76246d3c8f5bc0d8ccff0d856c2d80b4391c19d917c3a636a0d4bd28b943b5f952edf49976d6649a4ec495d2ed5ad2f3215b8077959740dd34abb3f3b3375b00ebbfc08b public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8a0d7f0ff5b3317152fb49a481bfa7ed09d77e01 08362b7f1953e1c737bcf50d7e8fe229db0753cc c7d02c3b61fc66c9d7848572aaf32d5eda2b0491 00e98aeb3660ef164143f60c89ae01d23d5347fd 63267000e63846b03c9eebdf5c9cf4fddef6fefa 55380d7efbc041b70f31de1619eef85a9b1eb354 39d769c94b9eb47475d1e455b79047dcaad027bc 4bab04c453850432b5362400a9191786e9252ea5 325ce2c9cbe205f3a4a3e805f49fd2eeed462049 518cdb157471dbdefebaf0c7c9ed53f0a957359e 55bfdda069197a8a201f8a48625282c5ea9725b6 031c2b09d7ea1e591f5ad1eb6056ef84af0e5d47 c0b06f25e37b4193aee98216cb51262975d1bd82 0a34d4a3dcac3e869fd50145971f395027c1a4df 87fae66bf8ab2f546fe265be75727f78320b7380 324f4f48928911dfb12d8e9545d2e25e342b3e31 7ce6915fdf3346db3fa9c901bc730809b8104e4e 9f092d097a16b0ab98116ee28f9bf4889bfcd2e4 214086009dc4c2b3248ba00d679ed712612acef6 a9fc7102 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [dc:79:43:c4:fe:62:ef:f3:62:77:93:63:43:ae:e5:28:5a:bc:f6:6e] modulus: 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 public exponent: 10001 ] 2022-01-11 06:59:03.824  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-01-11 06:59:03.827 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-01-11 06:59:03.829 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-01-11 06:59:03.830 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-01-11 06:59:03.831  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-01-11 06:59:03.832  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-01-11 06:59:03.860  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-01-11 06:59:03.861 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-01-11 06:59:03.861 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-01-11 06:59:03.862 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-01-11 06:59:03.868 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-01-11 06:59:03.870 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-01-11 06:59:03.870 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-01-11 06:59:03.871 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-01-11 06:59:04.064  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-01-11 06:59:04.065  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-01-11 06:59:04.065 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-01-11 06:59:04.066 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-01-11 06:59:04.068  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-01-11 06:59:04.069  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-01-11 06:59:04.069 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-01-11 06:59:04.070 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-01-11 06:59:04.070 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-01-11 06:59:04.071 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-01-11 06:59:04.072 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-01-11 06:59:04.072 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-01-11 06:59:04.073 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-01-11 06:59:04.074 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-01-11 06:59:04.074 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-01-11 06:59:04.075 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-01-11 06:59:04.079 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 708974965820370539508482873264016120984971073030 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 11 02:53:22 UTC 2022 Final Date: Sun Jan 11 02:53:21 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9e:79:ff:e4:98:e5:ad:cc:9b:c0:3c:03:3f:80:9e:3e:2c:7b:f8:c8] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8a0d7f0ff5b3317152fb49a481bfa7ed09d77e01 08362b7f1953e1c737bcf50d7e8fe229db0753cc c7d02c3b61fc66c9d7848572aaf32d5eda2b0491 00e98aeb3660ef164143f60c89ae01d23d5347fd 63267000e63846b03c9eebdf5c9cf4fddef6fefa 55380d7efbc041b70f31de1619eef85a9b1eb354 39d769c94b9eb47475d1e455b79047dcaad027bc 4bab04c453850432b5362400a9191786e9252ea5 325ce2c9cbe205f3a4a3e805f49fd2eeed462049 518cdb157471dbdefebaf0c7c9ed53f0a957359e 55bfdda069197a8a201f8a48625282c5ea9725b6 031c2b09d7ea1e591f5ad1eb6056ef84af0e5d47 c0b06f25e37b4193aee98216cb51262975d1bd82 0a34d4a3dcac3e869fd50145971f395027c1a4df 87fae66bf8ab2f546fe265be75727f78320b7380 324f4f48928911dfb12d8e9545d2e25e342b3e31 7ce6915fdf3346db3fa9c901bc730809b8104e4e 9f092d097a16b0ab98116ee28f9bf4889bfcd2e4 214086009dc4c2b3248ba00d679ed712612acef6 a9fc7102 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [fd:1c:71:41:8c:37:74:a1:84:4a:f3:33:bc:1b:ef:ee:8a:d4:cf:31] modulus: d1f0f2e011550cf971759cfa22af03be77301f215ccecb2b6762616847e0f7fcd7f7c81bd21f955b7d4fe786b9acfdb4053ae27a13e7ea778e8ef6c94b0057f2a087842ff6ce63074e33ff204c2667688264c4164fd626b68cf6bd9c8a05dc73d3353cf62a764b38aa1e411561c4ed87b8e32365cacf5608b44176c30bccb5d6c0b7e96b4e6f6b96f07f2aca7b9878a7f61ea5de5fe8294b9f99b535108bbd92053854a734f95544f985365e58c05b96869201d524a1c98f12680e677bd00656146fc820157aef816adc60c10660618ec1bd249e6a9337ec0295bea925d70883a5d300f956c727459f360423612055a5e8434b3ab20607c0b84f18cd71cf7feb public exponent: 10001 ] 2022-01-11 07:05:09.073  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-01-11 07:05:09.074 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-01-11 07:05:09.076 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-01-11 07:05:09.077 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-01-11 07:05:09.077  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-01-11 07:05:09.078  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-01-11 07:05:09.078  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-01-11 07:05:09.079 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-01-11 07:05:09.079 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-01-11 07:05:09.080 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-01-11 07:05:09.085 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-01-11 07:05:09.086 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-01-11 07:05:09.086 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-01-11 07:05:09.086 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-01-11 07:05:09.261  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-01-11 07:05:09.262  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-01-11 07:05:09.263 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-01-11 07:05:09.263 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-01-11 07:05:09.264  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-01-11 07:05:09.265  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-01-11 07:05:09.265 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-01-11 07:05:09.266 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-01-11 07:05:09.266 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-01-11 07:05:09.267 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-01-11 07:05:09.267 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-01-11 07:05:09.267 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-01-11 07:05:09.268 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-01-11 07:05:09.269 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-01-11 07:05:09.269 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-01-11 07:05:09.270 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-01-11 07:05:09.274 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 708974965820370539508482873264016120984971073030 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 11 02:53:22 UTC 2022 Final Date: Sun Jan 11 02:53:21 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9e:79:ff:e4:98:e5:ad:cc:9b:c0:3c:03:3f:80:9e:3e:2c:7b:f8:c8] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8a0d7f0ff5b3317152fb49a481bfa7ed09d77e01 08362b7f1953e1c737bcf50d7e8fe229db0753cc c7d02c3b61fc66c9d7848572aaf32d5eda2b0491 00e98aeb3660ef164143f60c89ae01d23d5347fd 63267000e63846b03c9eebdf5c9cf4fddef6fefa 55380d7efbc041b70f31de1619eef85a9b1eb354 39d769c94b9eb47475d1e455b79047dcaad027bc 4bab04c453850432b5362400a9191786e9252ea5 325ce2c9cbe205f3a4a3e805f49fd2eeed462049 518cdb157471dbdefebaf0c7c9ed53f0a957359e 55bfdda069197a8a201f8a48625282c5ea9725b6 031c2b09d7ea1e591f5ad1eb6056ef84af0e5d47 c0b06f25e37b4193aee98216cb51262975d1bd82 0a34d4a3dcac3e869fd50145971f395027c1a4df 87fae66bf8ab2f546fe265be75727f78320b7380 324f4f48928911dfb12d8e9545d2e25e342b3e31 7ce6915fdf3346db3fa9c901bc730809b8104e4e 9f092d097a16b0ab98116ee28f9bf4889bfcd2e4 214086009dc4c2b3248ba00d679ed712612acef6 a9fc7102 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [27:fd:c9:75:41:9c:ad:73:26:9b:a6:03:7a:1d:c5:d9:c2:f1:ed:9c] modulus: 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 public exponent: 10001 ] 2022-01-11 07:07:59.864  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-01-11 07:07:59.865 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-01-11 07:07:59.867 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-01-11 07:07:59.867 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-01-11 07:07:59.869  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-01-11 07:07:59.869  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-01-11 07:07:59.870  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-01-11 07:07:59.870 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-01-11 07:07:59.870 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-01-11 07:07:59.871 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-01-11 07:07:59.877 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-01-11 07:07:59.878 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-01-11 07:07:59.878 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-01-11 07:07:59.878 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-01-11 07:08:00.052  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-01-11 07:08:00.061  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-01-11 07:08:00.061 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-01-11 07:08:00.061 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-01-11 07:08:00.063  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-01-11 07:08:00.064  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-01-11 07:08:00.064 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-01-11 07:08:00.065 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-01-11 07:08:00.065 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-01-11 07:08:00.066 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-01-11 07:08:00.066 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-01-11 07:08:00.066 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-01-11 07:08:00.067 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-01-11 07:08:00.067 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-01-11 07:08:00.068 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-01-11 07:08:00.069 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-01-11 07:08:00.072 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 708974965820370539508482873264016120984971073030 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 11 02:53:22 UTC 2022 Final Date: Sun Jan 11 02:53:21 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9e:79:ff:e4:98:e5:ad:cc:9b:c0:3c:03:3f:80:9e:3e:2c:7b:f8:c8] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8a0d7f0ff5b3317152fb49a481bfa7ed09d77e01 08362b7f1953e1c737bcf50d7e8fe229db0753cc c7d02c3b61fc66c9d7848572aaf32d5eda2b0491 00e98aeb3660ef164143f60c89ae01d23d5347fd 63267000e63846b03c9eebdf5c9cf4fddef6fefa 55380d7efbc041b70f31de1619eef85a9b1eb354 39d769c94b9eb47475d1e455b79047dcaad027bc 4bab04c453850432b5362400a9191786e9252ea5 325ce2c9cbe205f3a4a3e805f49fd2eeed462049 518cdb157471dbdefebaf0c7c9ed53f0a957359e 55bfdda069197a8a201f8a48625282c5ea9725b6 031c2b09d7ea1e591f5ad1eb6056ef84af0e5d47 c0b06f25e37b4193aee98216cb51262975d1bd82 0a34d4a3dcac3e869fd50145971f395027c1a4df 87fae66bf8ab2f546fe265be75727f78320b7380 324f4f48928911dfb12d8e9545d2e25e342b3e31 7ce6915fdf3346db3fa9c901bc730809b8104e4e 9f092d097a16b0ab98116ee28f9bf4889bfcd2e4 214086009dc4c2b3248ba00d679ed712612acef6 a9fc7102 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2d:4d:44:13:36:4a:40:31:98:64:ac:e4:ef:9c:4e:67:ad:89:96:a7] modulus: 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 public exponent: 10001 ] 2022-01-11 07:11:03.863  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-01-11 07:11:03.869 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-01-11 07:11:03.870 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-01-11 07:11:03.871 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-01-11 07:11:03.871  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=ves-client }, SANs: [ves-client] } 2022-01-11 07:11:03.872  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-01-11 07:11:03.872  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-01-11 07:11:03.872 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-01-11 07:11:03.873 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-01-11 07:11:03.873 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-01-11 07:11:03.878 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-01-11 07:11:03.879 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-01-11 07:11:03.879 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-01-11 07:11:03.880 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-01-11 07:11:03.962  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-01-11 07:11:03.963  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-01-11 07:11:03.963 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-01-11 07:11:03.964 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-01-11 07:11:03.966  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-01-11 07:11:03.966  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-01-11 07:11:03.966 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-01-11 07:11:03.967 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-01-11 07:11:03.967 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-01-11 07:11:03.968 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-01-11 07:11:03.968 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-01-11 07:11:03.968 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-01-11 07:11:03.969 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-01-11 07:11:03.969 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-01-11 07:11:03.969 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-01-11 07:11:03.970 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=ves-client,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-01-11 07:11:03.973 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 708974965820370539508482873264016120984971073030 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Jan 11 02:53:22 UTC 2022 Final Date: Sun Jan 11 02:53:21 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9e:79:ff:e4:98:e5:ad:cc:9b:c0:3c:03:3f:80:9e:3e:2c:7b:f8:c8] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8a0d7f0ff5b3317152fb49a481bfa7ed09d77e01 08362b7f1953e1c737bcf50d7e8fe229db0753cc c7d02c3b61fc66c9d7848572aaf32d5eda2b0491 00e98aeb3660ef164143f60c89ae01d23d5347fd 63267000e63846b03c9eebdf5c9cf4fddef6fefa 55380d7efbc041b70f31de1619eef85a9b1eb354 39d769c94b9eb47475d1e455b79047dcaad027bc 4bab04c453850432b5362400a9191786e9252ea5 325ce2c9cbe205f3a4a3e805f49fd2eeed462049 518cdb157471dbdefebaf0c7c9ed53f0a957359e 55bfdda069197a8a201f8a48625282c5ea9725b6 031c2b09d7ea1e591f5ad1eb6056ef84af0e5d47 c0b06f25e37b4193aee98216cb51262975d1bd82 0a34d4a3dcac3e869fd50145971f395027c1a4df 87fae66bf8ab2f546fe265be75727f78320b7380 324f4f48928911dfb12d8e9545d2e25e342b3e31 7ce6915fdf3346db3fa9c901bc730809b8104e4e 9f092d097a16b0ab98116ee28f9bf4889bfcd2e4 214086009dc4c2b3248ba00d679ed712612acef6 a9fc7102 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [70:ff:ba:dc:0c:f4:80:e6:61:d1:a7:a5:c8:6d:a0:62:ed:c5:8f:44] modulus: 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 public exponent: 10001 ]