2022-03-29 01:17:11,602 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-03-29 01:17:16,095 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-03-29 01:17:18.785  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Mar 29, 2022 1:17:28 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Mar 29, 2022 1:17:28 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Mar 29, 2022 1:17:28 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Mar 29, 2022 1:17:28 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-03-29 01:17:30.304 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-03-29 01:17:31.401  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-03-29 01:17:32.089  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-03-29 01:17:35.004 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-03-29 01:17:35.006 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-03-29 01:17:35.007 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-03-29 01:17:35.009 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-03-29 01:17:35.198 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-03-29 01:17:35.200 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-03-29 01:17:35.700 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-03-29 01:17:40.795 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Mar 29, 2022 1:17:43 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-03-29 01:17:44.789  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 36.499 seconds (JVM running for 44.625) Mar 29, 2022 1:17:46 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-03-29 01:19:21.584  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-29 01:19:21.590 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-29 01:19:21.785 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-03-29 01:19:21.790 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-29 01:19:21.891  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-03-29 01:19:21.894  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-29 01:19:21.894  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-29 01:19:21.895 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-29 01:19:21.895 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-29 01:19:21.898 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-29 01:19:21.902 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-29 01:19:21.905 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-29 01:19:22.089 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-29 01:19:22.093 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-29 01:19:22.094 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-29 01:19:22.096 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-29 01:19:23.191  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-29 01:19:23.193  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-29 01:19:23.193 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-29 01:19:23.194 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-29 01:19:23.200  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-29 01:19:23.201  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-29 01:19:23.202 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-29 01:19:23.202 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-29 01:19:23.202 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-29 01:19:23.301 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-29 01:19:23.302 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-29 01:19:23.303 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-29 01:19:23.390 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-29 01:19:23.391 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-29 01:19:23.391 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-29 01:19:23.393 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-29 01:19:23.497 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 604655613389512115475572224404805445038262252438 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 29 01:12:24 UTC 2022 Final Date: Sun Mar 28 01:12:23 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2d:91:87:7a:48:ee:29:5b:c9:7e:dd:23:32:90:4d:98:df:c5:db:ea] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b8215011ad3d599330851dd161efdf2c1462f040 a5997bc3a91cfb3bc673a809b4804a66c1b76905 44cde225dac8881bacf81f5eaf2739e07b027b15 5ae81910185fe3065f10802c6017795604d364b2 ce4b3b0fc952977b05a848194f71abdec8e1b5d8 d1991fe3c4f4f41d4ad79389590e43a048386993 9702816e6815ce278bdeca4f8a88e50a283f8e77 dd3e4dc63d5ea04bd821e3f7b9b33ec0bb77bb1d 9825c282f8bfd783e41a22bb8b2f103e1906bb71 80d88a6c994f03da171ca8b9380ab7df7fb07df3 b306f6e3b2f79a45d2ebfb29b4170f36c4c91dd4 55196c1ef3fc1141d802734d3a1ad72a8ed1c891 5f1f35f7724fa2e009c87d0584adfaf68afe89a2 f737789ab0b5fc431f18cc314ca371427615e940 4172544e88cc378f06013d46d3d413d29a32c212 45fc801cbef185053c74548ae738d980f8e00640 56a96247bb12cc26e6f06dad6cac4d6d0ee1b1f2 2d058fddea07b729e61441b5f455bf1c017c6096 a7a3c9e2b08b7ee3153668e15fb6d21f5fa3f2e5 593f2b48 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [32:57:a1:ba:dd:6f:53:43:36:7e:f1:84:a3:76:5b:d5:70:af:bb:46] modulus: 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 public exponent: 10001 ] 2022-03-29 03:05:02.606  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-29 03:05:02.608 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-29 03:05:02.610 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-29 03:05:02.610 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-29 03:05:02.612  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-03-29 03:05:02.612  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-29 03:05:02.613  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-29 03:05:02.613 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-29 03:05:02.613 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-29 03:05:02.614 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-29 03:05:02.698 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-29 03:05:02.698 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-29 03:05:02.698 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-29 03:05:02.699 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-29 03:05:03.120  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-29 03:05:03.120  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-29 03:05:03.121 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-29 03:05:03.121 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-29 03:05:03.125  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-29 03:05:03.126  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-29 03:05:03.126 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-29 03:05:03.126 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-29 03:05:03.127 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-29 03:05:03.128 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-29 03:05:03.128 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-29 03:05:03.128 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-29 03:05:03.129 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-29 03:05:03.130 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-29 03:05:03.130 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-29 03:05:03.131 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-29 03:05:03.134 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 604655613389512115475572224404805445038262252438 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 29 01:12:24 UTC 2022 Final Date: Sun Mar 28 01:12:23 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2d:91:87:7a:48:ee:29:5b:c9:7e:dd:23:32:90:4d:98:df:c5:db:ea] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b8215011ad3d599330851dd161efdf2c1462f040 a5997bc3a91cfb3bc673a809b4804a66c1b76905 44cde225dac8881bacf81f5eaf2739e07b027b15 5ae81910185fe3065f10802c6017795604d364b2 ce4b3b0fc952977b05a848194f71abdec8e1b5d8 d1991fe3c4f4f41d4ad79389590e43a048386993 9702816e6815ce278bdeca4f8a88e50a283f8e77 dd3e4dc63d5ea04bd821e3f7b9b33ec0bb77bb1d 9825c282f8bfd783e41a22bb8b2f103e1906bb71 80d88a6c994f03da171ca8b9380ab7df7fb07df3 b306f6e3b2f79a45d2ebfb29b4170f36c4c91dd4 55196c1ef3fc1141d802734d3a1ad72a8ed1c891 5f1f35f7724fa2e009c87d0584adfaf68afe89a2 f737789ab0b5fc431f18cc314ca371427615e940 4172544e88cc378f06013d46d3d413d29a32c212 45fc801cbef185053c74548ae738d980f8e00640 56a96247bb12cc26e6f06dad6cac4d6d0ee1b1f2 2d058fddea07b729e61441b5f455bf1c017c6096 a7a3c9e2b08b7ee3153668e15fb6d21f5fa3f2e5 593f2b48 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5e:1c:d2:5e:bf:d4:3a:f8:b1:a0:d0:b3:7d:f8:9b:b1:29:22:dd:4d] modulus: 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 public exponent: 10001 ] 2022-03-29 03:25:15.801  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-29 03:25:15.803 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-29 03:25:15.805 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-03-29 03:25:15.805 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-29 03:25:15.806  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-03-29 03:25:15.807  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-29 03:25:15.807  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-29 03:25:15.808 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-29 03:25:15.808 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-29 03:25:15.809 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-29 03:25:15.818 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-29 03:25:15.883 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-29 03:25:15.884 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-29 03:25:15.884 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-29 03:25:16.038  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-29 03:25:16.039  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-29 03:25:16.040 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-29 03:25:16.040 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-29 03:25:16.085  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-29 03:25:16.085  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-29 03:25:16.086 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-29 03:25:16.086 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-29 03:25:16.086 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-29 03:25:16.087 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-29 03:25:16.088 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-29 03:25:16.088 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-29 03:25:16.089 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-29 03:25:16.089 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-29 03:25:16.089 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-29 03:25:16.090 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-29 03:25:16.093 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 604655613389512115475572224404805445038262252438 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 29 01:12:24 UTC 2022 Final Date: Sun Mar 28 01:12:23 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2d:91:87:7a:48:ee:29:5b:c9:7e:dd:23:32:90:4d:98:df:c5:db:ea] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b8215011ad3d599330851dd161efdf2c1462f040 a5997bc3a91cfb3bc673a809b4804a66c1b76905 44cde225dac8881bacf81f5eaf2739e07b027b15 5ae81910185fe3065f10802c6017795604d364b2 ce4b3b0fc952977b05a848194f71abdec8e1b5d8 d1991fe3c4f4f41d4ad79389590e43a048386993 9702816e6815ce278bdeca4f8a88e50a283f8e77 dd3e4dc63d5ea04bd821e3f7b9b33ec0bb77bb1d 9825c282f8bfd783e41a22bb8b2f103e1906bb71 80d88a6c994f03da171ca8b9380ab7df7fb07df3 b306f6e3b2f79a45d2ebfb29b4170f36c4c91dd4 55196c1ef3fc1141d802734d3a1ad72a8ed1c891 5f1f35f7724fa2e009c87d0584adfaf68afe89a2 f737789ab0b5fc431f18cc314ca371427615e940 4172544e88cc378f06013d46d3d413d29a32c212 45fc801cbef185053c74548ae738d980f8e00640 56a96247bb12cc26e6f06dad6cac4d6d0ee1b1f2 2d058fddea07b729e61441b5f455bf1c017c6096 a7a3c9e2b08b7ee3153668e15fb6d21f5fa3f2e5 593f2b48 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [26:73:cb:29:cc:de:c9:03:98:c8:5d:35:c0:7c:db:09:e2:89:5b:94] modulus: dbd0f8fa235b74f5ce981ac405818e66e6fabf7955a6e0d19c5a95c3ef1230bcc22fb5456c11e0590abf49175445c98ab04f251b1b0e4e8f2a2bd31bd84efed4af1714186f546902a5d0fba113acda9087b4f6bc5dca0633264e00294f10491bb2c9c5bd0e22dc6f3484fcbabb5112842c9f10f6f66004a50482943cb6ef930b973f39688d64b84045ada365889ef28743ef8e6384383bc7eae84be5007178bd94b3b3b2a0892b073032d228c429a6297f35191944bed1d4ff6c3b7649e480c5b92b9c0e4b0c9edefcac68f68c7d9c0f72fc16ae795ec093d0c28bff0199f0cad4a66102d08a030df7af858d025408a6351f616e8f14f9749a7b4bc666d259a3 public exponent: 10001 ] 2022-03-29 03:28:06.417  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-29 03:28:06.418 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-29 03:28:06.420 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-03-29 03:28:06.421 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-29 03:28:06.421  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-03-29 03:28:06.422  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-29 03:28:06.422  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-29 03:28:06.423 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-29 03:28:06.423 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-29 03:28:06.424 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-29 03:28:06.431 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-29 03:28:06.431 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-29 03:28:06.431 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-29 03:28:06.431 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-29 03:28:06.592  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-29 03:28:06.593  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-29 03:28:06.594 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-29 03:28:06.594 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-29 03:28:06.597  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-29 03:28:06.598  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-29 03:28:06.599 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-29 03:28:06.600 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-29 03:28:06.600 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-29 03:28:06.601 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-29 03:28:06.601 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-29 03:28:06.602 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-29 03:28:06.602 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-29 03:28:06.603 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-29 03:28:06.603 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-29 03:28:06.603 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-29 03:28:06.606 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 604655613389512115475572224404805445038262252438 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 29 01:12:24 UTC 2022 Final Date: Sun Mar 28 01:12:23 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2d:91:87:7a:48:ee:29:5b:c9:7e:dd:23:32:90:4d:98:df:c5:db:ea] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b8215011ad3d599330851dd161efdf2c1462f040 a5997bc3a91cfb3bc673a809b4804a66c1b76905 44cde225dac8881bacf81f5eaf2739e07b027b15 5ae81910185fe3065f10802c6017795604d364b2 ce4b3b0fc952977b05a848194f71abdec8e1b5d8 d1991fe3c4f4f41d4ad79389590e43a048386993 9702816e6815ce278bdeca4f8a88e50a283f8e77 dd3e4dc63d5ea04bd821e3f7b9b33ec0bb77bb1d 9825c282f8bfd783e41a22bb8b2f103e1906bb71 80d88a6c994f03da171ca8b9380ab7df7fb07df3 b306f6e3b2f79a45d2ebfb29b4170f36c4c91dd4 55196c1ef3fc1141d802734d3a1ad72a8ed1c891 5f1f35f7724fa2e009c87d0584adfaf68afe89a2 f737789ab0b5fc431f18cc314ca371427615e940 4172544e88cc378f06013d46d3d413d29a32c212 45fc801cbef185053c74548ae738d980f8e00640 56a96247bb12cc26e6f06dad6cac4d6d0ee1b1f2 2d058fddea07b729e61441b5f455bf1c017c6096 a7a3c9e2b08b7ee3153668e15fb6d21f5fa3f2e5 593f2b48 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [65:3b:e8:92:d5:70:9e:8a:55:55:f3:05:7d:fe:79:32:54:0d:04:1d] modulus: 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 public exponent: 10001 ] 2022-03-29 03:29:40.934  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-29 03:29:40.936 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-29 03:29:40.938 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-29 03:29:40.939 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-29 03:29:40.940  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-03-29 03:29:40.941  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-29 03:29:40.941  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-29 03:29:40.942 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-29 03:29:40.942 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-29 03:29:40.943 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-29 03:29:40.948 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-29 03:29:40.948 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-29 03:29:40.949 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-29 03:29:40.949 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-29 03:29:41.080  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-29 03:29:41.081  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-29 03:29:41.081 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-29 03:29:41.082 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-29 03:29:41.084  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-29 03:29:41.084  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-29 03:29:41.085 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-29 03:29:41.085 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-29 03:29:41.085 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-29 03:29:41.086 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-29 03:29:41.086 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-29 03:29:41.087 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-29 03:29:41.087 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-29 03:29:41.088 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-29 03:29:41.088 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-29 03:29:41.089 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-29 03:29:41.091 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 604655613389512115475572224404805445038262252438 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 29 01:12:24 UTC 2022 Final Date: Sun Mar 28 01:12:23 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2d:91:87:7a:48:ee:29:5b:c9:7e:dd:23:32:90:4d:98:df:c5:db:ea] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b8215011ad3d599330851dd161efdf2c1462f040 a5997bc3a91cfb3bc673a809b4804a66c1b76905 44cde225dac8881bacf81f5eaf2739e07b027b15 5ae81910185fe3065f10802c6017795604d364b2 ce4b3b0fc952977b05a848194f71abdec8e1b5d8 d1991fe3c4f4f41d4ad79389590e43a048386993 9702816e6815ce278bdeca4f8a88e50a283f8e77 dd3e4dc63d5ea04bd821e3f7b9b33ec0bb77bb1d 9825c282f8bfd783e41a22bb8b2f103e1906bb71 80d88a6c994f03da171ca8b9380ab7df7fb07df3 b306f6e3b2f79a45d2ebfb29b4170f36c4c91dd4 55196c1ef3fc1141d802734d3a1ad72a8ed1c891 5f1f35f7724fa2e009c87d0584adfaf68afe89a2 f737789ab0b5fc431f18cc314ca371427615e940 4172544e88cc378f06013d46d3d413d29a32c212 45fc801cbef185053c74548ae738d980f8e00640 56a96247bb12cc26e6f06dad6cac4d6d0ee1b1f2 2d058fddea07b729e61441b5f455bf1c017c6096 a7a3c9e2b08b7ee3153668e15fb6d21f5fa3f2e5 593f2b48 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [24:e7:ec:d3:b0:d1:5b:e6:2b:0e:ef:21:0e:41:29:45:b4:9c:ce:46] modulus: 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 public exponent: 10001 ] 2022-03-29 03:30:56.217  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-29 03:30:56.218 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-29 03:30:56.219 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-03-29 03:30:56.220 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-29 03:30:56.221  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-03-29 03:30:56.221  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-29 03:30:56.222  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-29 03:30:56.223 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-29 03:30:56.223 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-29 03:30:56.224 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-29 03:30:56.228 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-29 03:30:56.229 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-29 03:30:56.229 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-29 03:30:56.229 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-29 03:30:56.337  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-29 03:30:56.338  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-29 03:30:56.338 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-29 03:30:56.339 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-29 03:30:56.340  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-29 03:30:56.341  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-29 03:30:56.341 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-29 03:30:56.342 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-29 03:30:56.342 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-29 03:30:56.343 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-29 03:30:56.343 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-29 03:30:56.343 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-29 03:30:56.344 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-29 03:30:56.344 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-29 03:30:56.345 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-29 03:30:56.346 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-29 03:30:56.387 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 604655613389512115475572224404805445038262252438 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 29 01:12:24 UTC 2022 Final Date: Sun Mar 28 01:12:23 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2d:91:87:7a:48:ee:29:5b:c9:7e:dd:23:32:90:4d:98:df:c5:db:ea] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b8215011ad3d599330851dd161efdf2c1462f040 a5997bc3a91cfb3bc673a809b4804a66c1b76905 44cde225dac8881bacf81f5eaf2739e07b027b15 5ae81910185fe3065f10802c6017795604d364b2 ce4b3b0fc952977b05a848194f71abdec8e1b5d8 d1991fe3c4f4f41d4ad79389590e43a048386993 9702816e6815ce278bdeca4f8a88e50a283f8e77 dd3e4dc63d5ea04bd821e3f7b9b33ec0bb77bb1d 9825c282f8bfd783e41a22bb8b2f103e1906bb71 80d88a6c994f03da171ca8b9380ab7df7fb07df3 b306f6e3b2f79a45d2ebfb29b4170f36c4c91dd4 55196c1ef3fc1141d802734d3a1ad72a8ed1c891 5f1f35f7724fa2e009c87d0584adfaf68afe89a2 f737789ab0b5fc431f18cc314ca371427615e940 4172544e88cc378f06013d46d3d413d29a32c212 45fc801cbef185053c74548ae738d980f8e00640 56a96247bb12cc26e6f06dad6cac4d6d0ee1b1f2 2d058fddea07b729e61441b5f455bf1c017c6096 a7a3c9e2b08b7ee3153668e15fb6d21f5fa3f2e5 593f2b48 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a9:70:1d:52:0b:0f:37:2e:13:f0:2f:d1:4a:ed:67:f3:9e:ed:b3:0d] modulus: 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 public exponent: 10001 ] 2022-03-29 03:33:55.169  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-29 03:33:55.171 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-29 03:33:55.173 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-03-29 03:33:55.174 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-29 03:33:55.175  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-03-29 03:33:55.175  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-29 03:33:55.175  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-29 03:33:55.176 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-29 03:33:55.176 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-29 03:33:55.177 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-29 03:33:55.180 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-29 03:33:55.181 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-29 03:33:55.181 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-29 03:33:55.181 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-29 03:33:55.282  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-29 03:33:55.283  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-29 03:33:55.283 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-29 03:33:55.284 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-29 03:33:55.286  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-29 03:33:55.286  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-29 03:33:55.287 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-29 03:33:55.287 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-29 03:33:55.287 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-29 03:33:55.288 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-29 03:33:55.288 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-29 03:33:55.289 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-29 03:33:55.289 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-29 03:33:55.290 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-29 03:33:55.290 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-29 03:33:55.291 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-29 03:33:55.294 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 604655613389512115475572224404805445038262252438 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 29 01:12:24 UTC 2022 Final Date: Sun Mar 28 01:12:23 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2d:91:87:7a:48:ee:29:5b:c9:7e:dd:23:32:90:4d:98:df:c5:db:ea] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b8215011ad3d599330851dd161efdf2c1462f040 a5997bc3a91cfb3bc673a809b4804a66c1b76905 44cde225dac8881bacf81f5eaf2739e07b027b15 5ae81910185fe3065f10802c6017795604d364b2 ce4b3b0fc952977b05a848194f71abdec8e1b5d8 d1991fe3c4f4f41d4ad79389590e43a048386993 9702816e6815ce278bdeca4f8a88e50a283f8e77 dd3e4dc63d5ea04bd821e3f7b9b33ec0bb77bb1d 9825c282f8bfd783e41a22bb8b2f103e1906bb71 80d88a6c994f03da171ca8b9380ab7df7fb07df3 b306f6e3b2f79a45d2ebfb29b4170f36c4c91dd4 55196c1ef3fc1141d802734d3a1ad72a8ed1c891 5f1f35f7724fa2e009c87d0584adfaf68afe89a2 f737789ab0b5fc431f18cc314ca371427615e940 4172544e88cc378f06013d46d3d413d29a32c212 45fc801cbef185053c74548ae738d980f8e00640 56a96247bb12cc26e6f06dad6cac4d6d0ee1b1f2 2d058fddea07b729e61441b5f455bf1c017c6096 a7a3c9e2b08b7ee3153668e15fb6d21f5fa3f2e5 593f2b48 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0d:12:be:3e:7b:6a:45:97:0a:52:bd:a2:e2:14:15:df:60:a8:ee:a5] modulus: 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 public exponent: 10001 ] 2022-03-29 03:37:55.194  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-29 03:37:55.195 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-29 03:37:55.196 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-03-29 03:37:55.197 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-29 03:37:55.197  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-03-29 03:37:55.198  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-29 03:37:55.198  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-29 03:37:55.198 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-29 03:37:55.198 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-29 03:37:55.199 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-29 03:37:55.203 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-29 03:37:55.203 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-29 03:37:55.203 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-29 03:37:55.203 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-29 03:37:55.300  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-29 03:37:55.300  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-29 03:37:55.301 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-29 03:37:55.301 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-29 03:37:55.307  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-29 03:37:55.308  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-29 03:37:55.308 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-29 03:37:55.308 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-29 03:37:55.309 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-29 03:37:55.309 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-29 03:37:55.310 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-29 03:37:55.310 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-29 03:37:55.311 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-29 03:37:55.311 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-29 03:37:55.311 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-29 03:37:55.312 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-29 03:37:55.315 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 604655613389512115475572224404805445038262252438 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 29 01:12:24 UTC 2022 Final Date: Sun Mar 28 01:12:23 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2d:91:87:7a:48:ee:29:5b:c9:7e:dd:23:32:90:4d:98:df:c5:db:ea] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b8215011ad3d599330851dd161efdf2c1462f040 a5997bc3a91cfb3bc673a809b4804a66c1b76905 44cde225dac8881bacf81f5eaf2739e07b027b15 5ae81910185fe3065f10802c6017795604d364b2 ce4b3b0fc952977b05a848194f71abdec8e1b5d8 d1991fe3c4f4f41d4ad79389590e43a048386993 9702816e6815ce278bdeca4f8a88e50a283f8e77 dd3e4dc63d5ea04bd821e3f7b9b33ec0bb77bb1d 9825c282f8bfd783e41a22bb8b2f103e1906bb71 80d88a6c994f03da171ca8b9380ab7df7fb07df3 b306f6e3b2f79a45d2ebfb29b4170f36c4c91dd4 55196c1ef3fc1141d802734d3a1ad72a8ed1c891 5f1f35f7724fa2e009c87d0584adfaf68afe89a2 f737789ab0b5fc431f18cc314ca371427615e940 4172544e88cc378f06013d46d3d413d29a32c212 45fc801cbef185053c74548ae738d980f8e00640 56a96247bb12cc26e6f06dad6cac4d6d0ee1b1f2 2d058fddea07b729e61441b5f455bf1c017c6096 a7a3c9e2b08b7ee3153668e15fb6d21f5fa3f2e5 593f2b48 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a6:61:c5:32:71:f7:97:d2:48:af:34:6b:2c:35:17:f0:64:5c:8e:04] modulus: ca1d22a0a8659c0bd32f6fe5caa650dc158b135df81d03ad88a6b27fe6f66ab95e3f2e7b9e9e167193ad643e8849baa4727a7ff203cb4315d9b51cf3adc07ed06b83b6ca41f52cfe16773ce1bae4406e55c661e27a7ede123f2c0141d2725df2740a562b8446ad2aaf55cb1a6aed58405eb347d7fbdc29d9f4ad9e75fb9131db702544eb0c4ed3ee4af23fd9e56623e55c8566b1567078dcdac52834f91d7481625bf532a1eb4c72f406d9b6e642cf7f4edf37bf5d9cf034543f3975c74ab685ce03b45e00db42527f34b80222b5274af76be17d4e0982b64a28f554a7e1db286cf2e2f2e106547183d92cc5b7aa20d17d536a0bb1c78feaab3f7748e4130595 public exponent: 10001 ] 2022-03-29 03:40:58.683  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-03-29 03:40:58.684 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-03-29 03:40:58.686 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-03-29 03:40:58.687 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-03-29 03:40:58.687  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-03-29 03:40:58.687  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-03-29 03:40:58.688  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-03-29 03:40:58.688 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-03-29 03:40:58.688 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-03-29 03:40:58.689 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-03-29 03:40:58.694 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-03-29 03:40:58.695 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-29 03:40:58.695 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-03-29 03:40:58.695 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-29 03:40:58.798  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-03-29 03:40:58.799  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-03-29 03:40:58.799 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-03-29 03:40:58.799 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-03-29 03:40:58.801  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-03-29 03:40:58.801  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-03-29 03:40:58.802 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-29 03:40:58.802 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-29 03:40:58.802 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-29 03:40:58.803 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-29 03:40:58.803 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-29 03:40:58.803 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-29 03:40:58.804 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-03-29 03:40:58.804 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-03-29 03:40:58.804 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-03-29 03:40:58.804 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-03-29 03:40:58.807 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 604655613389512115475572224404805445038262252438 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Mar 29 01:12:24 UTC 2022 Final Date: Sun Mar 28 01:12:23 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [2d:91:87:7a:48:ee:29:5b:c9:7e:dd:23:32:90:4d:98:df:c5:db:ea] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: b8215011ad3d599330851dd161efdf2c1462f040 a5997bc3a91cfb3bc673a809b4804a66c1b76905 44cde225dac8881bacf81f5eaf2739e07b027b15 5ae81910185fe3065f10802c6017795604d364b2 ce4b3b0fc952977b05a848194f71abdec8e1b5d8 d1991fe3c4f4f41d4ad79389590e43a048386993 9702816e6815ce278bdeca4f8a88e50a283f8e77 dd3e4dc63d5ea04bd821e3f7b9b33ec0bb77bb1d 9825c282f8bfd783e41a22bb8b2f103e1906bb71 80d88a6c994f03da171ca8b9380ab7df7fb07df3 b306f6e3b2f79a45d2ebfb29b4170f36c4c91dd4 55196c1ef3fc1141d802734d3a1ad72a8ed1c891 5f1f35f7724fa2e009c87d0584adfaf68afe89a2 f737789ab0b5fc431f18cc314ca371427615e940 4172544e88cc378f06013d46d3d413d29a32c212 45fc801cbef185053c74548ae738d980f8e00640 56a96247bb12cc26e6f06dad6cac4d6d0ee1b1f2 2d058fddea07b729e61441b5f455bf1c017c6096 a7a3c9e2b08b7ee3153668e15fb6d21f5fa3f2e5 593f2b48 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f5:65:2e:b6:28:5a:4c:02:51:f3:1a:76:90:d8:7d:74:18:07:6e:94] modulus: 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 public exponent: 10001 ]