2022-04-04 01:02:48,672 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-04-04 01:02:52,769 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-04-04 01:02:55.572  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Apr 04, 2022 1:03:05 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Apr 04, 2022 1:03:05 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Apr 04, 2022 1:03:05 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Apr 04, 2022 1:03:05 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-04-04 01:03:07.482 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-04-04 01:03:08.686  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-04-04 01:03:09.371  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-04-04 01:03:12.166 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-04-04 01:03:12.169 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-04-04 01:03:12.170 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-04-04 01:03:12.172 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-04-04 01:03:12.362 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-04-04 01:03:12.367 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-04-04 01:03:12.865 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-04-04 01:03:18.267 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Apr 04, 2022 1:03:21 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-04-04 01:03:22.661  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 37.615 seconds (JVM running for 45.267) Apr 04, 2022 1:03:25 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-04-04 01:04:04.568  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-04 01:04:04.574 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-04 01:04:05.175 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-04-04 01:04:05.178 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-04 01:04:05.270  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-04-04 01:04:05.273  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-04 01:04:05.273  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-04 01:04:05.275 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-04 01:04:05.275 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-04 01:04:05.366 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-04 01:04:05.374 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-04 01:04:05.378 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-04 01:04:05.571 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-04 01:04:05.575 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-04 01:04:05.576 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-04 01:04:05.578 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-04 01:04:06.815  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-04 01:04:06.817  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-04 01:04:06.817 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-04 01:04:06.818 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-04 01:04:06.863  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-04 01:04:06.865  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-04 01:04:06.866 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-04 01:04:06.866 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-04 01:04:06.867 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-04 01:04:06.969 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-04 01:04:06.970 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-04 01:04:06.971 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-04 01:04:06.979 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-04 01:04:06.979 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-04 01:04:06.979 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-04 01:04:06.981 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-04 01:04:07.083 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 461088822557063581368180181096244130117031333399 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Apr 04 00:59:00 UTC 2022 Final Date: Sat Apr 03 00:58:59 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9a:df:68:98:85:c0:b1:37:4c:95:52:11:6d:2a:3e:34:95:78:98:20] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 10d26549027e617e8b4405d881fc4379dcf6d156 d0ac87f61d75e5da63cfb2e82cf4e28a974b88a6 f0e40f1684cf5e97d228f4e4e0a684f02dc50984 87cd96c6dd9cbc2510b55790bbfc07fa1b5224cb e6ff301d105b694689452d66dbf3d2741ef8da49 cfac3c73e1eea1bae5b733c9c55f7361538d97a2 935d4e424fa0c7fc855342f8c085c53c9701e7df def9134d9dc4998b88414c4a788fca48ac90674a 19f77aba5fadf7d22212af71f2c9070af07eaa62 bca308aac223ea83ea4b1e90b9714b848254bacb f729b782b3c738050f1de37271936ab05d36696e f905b2d24cfe68f34626c70f002f02c5458f1227 a3369a78977d2638f209ce4243bbef7d3510a70f 85df8460c7b2c75dfd50530d7fee0193cbc3d253 75ff642b36c882ee065ccac63c00161acb2e99f5 e5fce3e544f92c8b66c1c455f8d7c2e1767ac180 7f6ad1cd2e6a0ec8969201aad6efecbac742bd7f 3e4a961ec2eb3fefcca43dce037f9e6d112cac54 7f2512e361a07889604c18fcd2acd6886a820bdc 46b3ea94 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f5:55:19:c8:fb:60:7b:f0:a1:c0:aa:04:21:09:c1:a7:0e:e2:ea:c4] modulus: 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 public exponent: 10001 ] 2022-04-04 03:38:00.124  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-04 03:38:00.126 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-04 03:38:00.129 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-04-04 03:38:00.130 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-04 03:38:00.132  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-04-04 03:38:00.132  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-04 03:38:00.133  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-04 03:38:00.133 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-04 03:38:00.133 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-04 03:38:00.134 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-04 03:38:00.162 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-04 03:38:00.163 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-04 03:38:00.163 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-04 03:38:00.163 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-04 03:38:00.296  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-04 03:38:00.297  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-04 03:38:00.298 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-04 03:38:00.298 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-04 03:38:00.364  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-04 03:38:00.365  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-04 03:38:00.365 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-04 03:38:00.366 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-04 03:38:00.366 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-04 03:38:00.368 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-04 03:38:00.368 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-04 03:38:00.368 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-04 03:38:00.369 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-04 03:38:00.370 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-04 03:38:00.370 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-04 03:38:00.372 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-04 03:38:00.375 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 461088822557063581368180181096244130117031333399 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Apr 04 00:59:00 UTC 2022 Final Date: Sat Apr 03 00:58:59 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9a:df:68:98:85:c0:b1:37:4c:95:52:11:6d:2a:3e:34:95:78:98:20] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 10d26549027e617e8b4405d881fc4379dcf6d156 d0ac87f61d75e5da63cfb2e82cf4e28a974b88a6 f0e40f1684cf5e97d228f4e4e0a684f02dc50984 87cd96c6dd9cbc2510b55790bbfc07fa1b5224cb e6ff301d105b694689452d66dbf3d2741ef8da49 cfac3c73e1eea1bae5b733c9c55f7361538d97a2 935d4e424fa0c7fc855342f8c085c53c9701e7df def9134d9dc4998b88414c4a788fca48ac90674a 19f77aba5fadf7d22212af71f2c9070af07eaa62 bca308aac223ea83ea4b1e90b9714b848254bacb f729b782b3c738050f1de37271936ab05d36696e f905b2d24cfe68f34626c70f002f02c5458f1227 a3369a78977d2638f209ce4243bbef7d3510a70f 85df8460c7b2c75dfd50530d7fee0193cbc3d253 75ff642b36c882ee065ccac63c00161acb2e99f5 e5fce3e544f92c8b66c1c455f8d7c2e1767ac180 7f6ad1cd2e6a0ec8969201aad6efecbac742bd7f 3e4a961ec2eb3fefcca43dce037f9e6d112cac54 7f2512e361a07889604c18fcd2acd6886a820bdc 46b3ea94 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f1:7e:3a:00:86:50:1d:49:79:8c:37:d9:68:1e:e9:03:ec:55:d3:88] modulus: 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 public exponent: 10001 ] 2022-04-04 03:45:04.693  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-04 03:45:04.694 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-04 03:45:04.696 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-04-04 03:45:04.697 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-04 03:45:04.697  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-04-04 03:45:04.698  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-04 03:45:04.698  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-04 03:45:04.699 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-04 03:45:04.699 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-04 03:45:04.699 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-04 03:45:04.704 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-04 03:45:04.705 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-04 03:45:04.705 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-04 03:45:04.705 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-04 03:45:04.833 ERROR 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Error encountered while processing response from CA server java.lang.IllegalArgumentException: failed to construct sequence from byte[]: unknown tag 28 encountered at org.bouncycastle.asn1.ASN1Sequence.getInstance(Unknown Source) at org.bouncycastle.asn1.cmp.PKIMessage.getInstance(Unknown Source) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.retrieveCertificates(CmpClientImpl.java:171) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeCmpRequest(CmpClientImpl.java:144) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeInitializationRequest(CmpClientImpl.java:89) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeInitializationRequest(CmpClientImpl.java:95) at org.onap.oom.certservice.certification.CertificationProvider.executeInitializationRequest(CertificationProvider.java:58) at org.onap.oom.certservice.certification.CertificationResponseModelFactory.provideCertificationModelFromInitialRequest(CertificationResponseModelFactory.java:77) at org.onap.oom.certservice.api.CertificationController.signCertificate(CertificationController.java:94) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(Unknown Source) at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(Unknown Source) at java.base/java.lang.reflect.Method.invoke(Unknown Source) at org.springframework.web.method.support.InvocableHandlerMethod.doInvoke(InvocableHandlerMethod.java:205) at org.springframework.web.method.support.InvocableHandlerMethod.invokeForRequest(InvocableHandlerMethod.java:150) at org.springframework.web.servlet.mvc.method.annotation.ServletInvocableHandlerMethod.invokeAndHandle(ServletInvocableHandlerMethod.java:117) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.invokeHandlerMethod(RequestMappingHandlerAdapter.java:895) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.handleInternal(RequestMappingHandlerAdapter.java:808) at org.springframework.web.servlet.mvc.method.AbstractHandlerMethodAdapter.handle(AbstractHandlerMethodAdapter.java:87) at org.springframework.web.servlet.DispatcherServlet.doDispatch(DispatcherServlet.java:1067) at org.springframework.web.servlet.DispatcherServlet.doService(DispatcherServlet.java:963) at org.springframework.web.servlet.FrameworkServlet.processRequest(FrameworkServlet.java:1006) at org.springframework.web.servlet.FrameworkServlet.doGet(FrameworkServlet.java:898) at javax.servlet.http.HttpServlet.service(HttpServlet.java:655) at org.springframework.web.servlet.FrameworkServlet.service(FrameworkServlet.java:883) at javax.servlet.http.HttpServlet.service(HttpServlet.java:764) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:227) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:53) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:100) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.FormContentFilter.doFilterInternal(FormContentFilter.java:93) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.boot.actuate.metrics.web.servlet.WebMvcMetricsFilter.doFilterInternal(WebMvcMetricsFilter.java:96) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:201) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:197) at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:97) at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:540) at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:135) at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:92) at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:78) at org.apache.catalina.valves.RemoteIpValve.invoke(RemoteIpValve.java:769) at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:357) at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:382) at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:65) at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:895) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1732) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at org.apache.tomcat.util.threads.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1191) at org.apache.tomcat.util.threads.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:659) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Unknown Source) 2022-04-04 03:45:04.874 ERROR 1 [nio-8443-exec-7] o.o.o.c.a.a.CertificationExceptionAdvice : Exception occurred calling cmp client: org.onap.oom.certservice.cmpv2client.exceptions.CmpClientException: Error encountered while processing response from CA server at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.retrieveCertificates(CmpClientImpl.java:177) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeCmpRequest(CmpClientImpl.java:144) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeInitializationRequest(CmpClientImpl.java:89) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeInitializationRequest(CmpClientImpl.java:95) at org.onap.oom.certservice.certification.CertificationProvider.executeInitializationRequest(CertificationProvider.java:58) at org.onap.oom.certservice.certification.CertificationResponseModelFactory.provideCertificationModelFromInitialRequest(CertificationResponseModelFactory.java:77) at org.onap.oom.certservice.api.CertificationController.signCertificate(CertificationController.java:94) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(Unknown Source) at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(Unknown Source) at java.base/java.lang.reflect.Method.invoke(Unknown Source) at org.springframework.web.method.support.InvocableHandlerMethod.doInvoke(InvocableHandlerMethod.java:205) at org.springframework.web.method.support.InvocableHandlerMethod.invokeForRequest(InvocableHandlerMethod.java:150) at org.springframework.web.servlet.mvc.method.annotation.ServletInvocableHandlerMethod.invokeAndHandle(ServletInvocableHandlerMethod.java:117) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.invokeHandlerMethod(RequestMappingHandlerAdapter.java:895) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.handleInternal(RequestMappingHandlerAdapter.java:808) at org.springframework.web.servlet.mvc.method.AbstractHandlerMethodAdapter.handle(AbstractHandlerMethodAdapter.java:87) at org.springframework.web.servlet.DispatcherServlet.doDispatch(DispatcherServlet.java:1067) at org.springframework.web.servlet.DispatcherServlet.doService(DispatcherServlet.java:963) at org.springframework.web.servlet.FrameworkServlet.processRequest(FrameworkServlet.java:1006) at org.springframework.web.servlet.FrameworkServlet.doGet(FrameworkServlet.java:898) at javax.servlet.http.HttpServlet.service(HttpServlet.java:655) at org.springframework.web.servlet.FrameworkServlet.service(FrameworkServlet.java:883) at javax.servlet.http.HttpServlet.service(HttpServlet.java:764) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:227) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:53) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:100) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.FormContentFilter.doFilterInternal(FormContentFilter.java:93) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.boot.actuate.metrics.web.servlet.WebMvcMetricsFilter.doFilterInternal(WebMvcMetricsFilter.java:96) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:201) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:197) at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:97) at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:540) at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:135) at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:92) at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:78) at org.apache.catalina.valves.RemoteIpValve.invoke(RemoteIpValve.java:769) at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:357) at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:382) at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:65) at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:895) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1732) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at org.apache.tomcat.util.threads.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1191) at org.apache.tomcat.util.threads.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:659) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Unknown Source) Caused by: java.lang.IllegalArgumentException: failed to construct sequence from byte[]: unknown tag 28 encountered at org.bouncycastle.asn1.ASN1Sequence.getInstance(Unknown Source) at org.bouncycastle.asn1.cmp.PKIMessage.getInstance(Unknown Source) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.retrieveCertificates(CmpClientImpl.java:171) ... 61 more 2022-04-04 03:53:39.550  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-04 03:53:39.551 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-04 03:53:39.553 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-04 03:53:39.554 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-04 03:53:39.554  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-04 03:53:39.555  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-04 03:53:39.555  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-04 03:53:39.555 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-04 03:53:39.556 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-04 03:53:39.556 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-04 03:53:39.569 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-04 03:53:39.569 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-04 03:53:39.569 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-04 03:53:39.570 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-04 03:53:40.694 ERROR 1 [io-8443-exec-10] o.o.o.c.c.i.Cmpv2HttpClient  : IOException error Connect to ejbca:8080 [ejbca/10.233.15.145] failed: Connection refused (Connection refused), while trying to connect CA RA 2022-04-04 03:53:40.696 ERROR 1 [io-8443-exec-10] o.o.o.c.a.a.CertificationExceptionAdvice : Exception occurred calling cmp client: org.onap.oom.certservice.cmpv2client.exceptions.CmpClientException: IOException error while trying to connect CA RA at org.onap.oom.certservice.cmpv2client.impl.Cmpv2HttpClient.postRequest(Cmpv2HttpClient.java:78) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.retrieveCertificates(CmpClientImpl.java:169) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeCmpRequest(CmpClientImpl.java:144) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeInitializationRequest(CmpClientImpl.java:89) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeInitializationRequest(CmpClientImpl.java:95) at org.onap.oom.certservice.certification.CertificationProvider.executeInitializationRequest(CertificationProvider.java:58) at org.onap.oom.certservice.certification.CertificationResponseModelFactory.provideCertificationModelFromInitialRequest(CertificationResponseModelFactory.java:77) at org.onap.oom.certservice.api.CertificationController.signCertificate(CertificationController.java:94) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(Unknown Source) at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(Unknown Source) at java.base/java.lang.reflect.Method.invoke(Unknown Source) at org.springframework.web.method.support.InvocableHandlerMethod.doInvoke(InvocableHandlerMethod.java:205) at org.springframework.web.method.support.InvocableHandlerMethod.invokeForRequest(InvocableHandlerMethod.java:150) at org.springframework.web.servlet.mvc.method.annotation.ServletInvocableHandlerMethod.invokeAndHandle(ServletInvocableHandlerMethod.java:117) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.invokeHandlerMethod(RequestMappingHandlerAdapter.java:895) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.handleInternal(RequestMappingHandlerAdapter.java:808) at org.springframework.web.servlet.mvc.method.AbstractHandlerMethodAdapter.handle(AbstractHandlerMethodAdapter.java:87) at org.springframework.web.servlet.DispatcherServlet.doDispatch(DispatcherServlet.java:1067) at org.springframework.web.servlet.DispatcherServlet.doService(DispatcherServlet.java:963) at org.springframework.web.servlet.FrameworkServlet.processRequest(FrameworkServlet.java:1006) at org.springframework.web.servlet.FrameworkServlet.doGet(FrameworkServlet.java:898) at javax.servlet.http.HttpServlet.service(HttpServlet.java:655) at org.springframework.web.servlet.FrameworkServlet.service(FrameworkServlet.java:883) at javax.servlet.http.HttpServlet.service(HttpServlet.java:764) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:227) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:53) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:100) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.FormContentFilter.doFilterInternal(FormContentFilter.java:93) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.boot.actuate.metrics.web.servlet.WebMvcMetricsFilter.doFilterInternal(WebMvcMetricsFilter.java:96) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:201) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:197) at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:97) at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:540) at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:135) at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:92) at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:78) at org.apache.catalina.valves.RemoteIpValve.invoke(RemoteIpValve.java:769) at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:357) at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:382) at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:65) at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:895) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1732) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at org.apache.tomcat.util.threads.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1191) at org.apache.tomcat.util.threads.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:659) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Unknown Source) Caused by: org.apache.http.conn.HttpHostConnectException: Connect to ejbca:8080 [ejbca/10.233.15.145] failed: Connection refused (Connection refused) at org.apache.http.impl.conn.DefaultHttpClientConnectionOperator.connect(DefaultHttpClientConnectionOperator.java:159) at org.apache.http.impl.conn.PoolingHttpClientConnectionManager.connect(PoolingHttpClientConnectionManager.java:373) at org.apache.http.impl.execchain.MainClientExec.establishRoute(MainClientExec.java:394) at org.apache.http.impl.execchain.MainClientExec.execute(MainClientExec.java:237) at org.apache.http.impl.execchain.ProtocolExec.execute(ProtocolExec.java:185) at org.apache.http.impl.execchain.RetryExec.execute(RetryExec.java:89) at org.apache.http.impl.execchain.RedirectExec.execute(RedirectExec.java:110) at org.apache.http.impl.client.InternalHttpClient.doExecute(InternalHttpClient.java:185) at org.apache.http.impl.client.CloseableHttpClient.execute(CloseableHttpClient.java:83) at org.apache.http.impl.client.CloseableHttpClient.execute(CloseableHttpClient.java:108) at org.apache.http.impl.client.CloseableHttpClient$$FastClassBySpringCGLIB$$85825060.invoke() at org.springframework.cglib.proxy.MethodProxy.invoke(MethodProxy.java:218) at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.invokeJoinpoint(CglibAopProxy.java:783) at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:163) at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.proceed(CglibAopProxy.java:753) at org.springframework.aop.support.DelegatingIntroductionInterceptor.doProceed(DelegatingIntroductionInterceptor.java:137) at org.springframework.aop.support.DelegatingIntroductionInterceptor.invoke(DelegatingIntroductionInterceptor.java:124) at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:186) at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.proceed(CglibAopProxy.java:753) at org.springframework.aop.framework.CglibAopProxy$DynamicAdvisedInterceptor.intercept(CglibAopProxy.java:698) at org.apache.http.impl.client.CloseableHttpClient$$EnhancerBySpringCGLIB$$c63af2b8.execute() at org.onap.oom.certservice.cmpv2client.impl.Cmpv2HttpClient.postRequest(Cmpv2HttpClient.java:71) ... 62 more Caused by: java.net.ConnectException: Connection refused (Connection refused) at java.base/java.net.PlainSocketImpl.socketConnect(Native Method) at java.base/java.net.AbstractPlainSocketImpl.doConnect(Unknown Source) at java.base/java.net.AbstractPlainSocketImpl.connectToAddress(Unknown Source) at java.base/java.net.AbstractPlainSocketImpl.connect(Unknown Source) at java.base/java.net.SocksSocketImpl.connect(Unknown Source) at java.base/java.net.Socket.connect(Unknown Source) at org.apache.http.conn.socket.PlainConnectionSocketFactory.connectSocket(PlainConnectionSocketFactory.java:75) at org.apache.http.impl.conn.DefaultHttpClientConnectionOperator.connect(DefaultHttpClientConnectionOperator.java:142) ... 83 more 2022-04-04 03:55:59.603  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-04 03:55:59.604 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-04 03:55:59.606 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-04-04 03:55:59.606 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-04 03:55:59.607  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-04-04 03:55:59.607  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-04 03:55:59.608  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-04 03:55:59.608 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-04 03:55:59.609 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-04 03:55:59.609 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-04 03:55:59.619 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-04 03:55:59.619 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-04 03:55:59.661 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-04 03:55:59.662 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-04 03:56:00.690 ERROR 1 [nio-8443-exec-7] o.o.o.c.c.i.Cmpv2HttpClient  : IOException error Connect to ejbca:8080 [ejbca/10.233.15.145] failed: Connection refused (Connection refused), while trying to connect CA RA 2022-04-04 03:56:00.691 ERROR 1 [nio-8443-exec-7] o.o.o.c.a.a.CertificationExceptionAdvice : Exception occurred calling cmp client: org.onap.oom.certservice.cmpv2client.exceptions.CmpClientException: IOException error while trying to connect CA RA at org.onap.oom.certservice.cmpv2client.impl.Cmpv2HttpClient.postRequest(Cmpv2HttpClient.java:78) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.retrieveCertificates(CmpClientImpl.java:169) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeCmpRequest(CmpClientImpl.java:144) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeInitializationRequest(CmpClientImpl.java:89) at org.onap.oom.certservice.cmpv2client.impl.CmpClientImpl.executeInitializationRequest(CmpClientImpl.java:95) at org.onap.oom.certservice.certification.CertificationProvider.executeInitializationRequest(CertificationProvider.java:58) at org.onap.oom.certservice.certification.CertificationResponseModelFactory.provideCertificationModelFromInitialRequest(CertificationResponseModelFactory.java:77) at org.onap.oom.certservice.api.CertificationController.signCertificate(CertificationController.java:94) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at java.base/jdk.internal.reflect.NativeMethodAccessorImpl.invoke(Unknown Source) at java.base/jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(Unknown Source) at java.base/java.lang.reflect.Method.invoke(Unknown Source) at org.springframework.web.method.support.InvocableHandlerMethod.doInvoke(InvocableHandlerMethod.java:205) at org.springframework.web.method.support.InvocableHandlerMethod.invokeForRequest(InvocableHandlerMethod.java:150) at org.springframework.web.servlet.mvc.method.annotation.ServletInvocableHandlerMethod.invokeAndHandle(ServletInvocableHandlerMethod.java:117) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.invokeHandlerMethod(RequestMappingHandlerAdapter.java:895) at org.springframework.web.servlet.mvc.method.annotation.RequestMappingHandlerAdapter.handleInternal(RequestMappingHandlerAdapter.java:808) at org.springframework.web.servlet.mvc.method.AbstractHandlerMethodAdapter.handle(AbstractHandlerMethodAdapter.java:87) at org.springframework.web.servlet.DispatcherServlet.doDispatch(DispatcherServlet.java:1067) at org.springframework.web.servlet.DispatcherServlet.doService(DispatcherServlet.java:963) at org.springframework.web.servlet.FrameworkServlet.processRequest(FrameworkServlet.java:1006) at org.springframework.web.servlet.FrameworkServlet.doGet(FrameworkServlet.java:898) at javax.servlet.http.HttpServlet.service(HttpServlet.java:655) at org.springframework.web.servlet.FrameworkServlet.service(FrameworkServlet.java:883) at javax.servlet.http.HttpServlet.service(HttpServlet.java:764) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:227) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:53) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.RequestContextFilter.doFilterInternal(RequestContextFilter.java:100) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.FormContentFilter.doFilterInternal(FormContentFilter.java:93) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.boot.actuate.metrics.web.servlet.WebMvcMetricsFilter.doFilterInternal(WebMvcMetricsFilter.java:96) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.springframework.web.filter.CharacterEncodingFilter.doFilterInternal(CharacterEncodingFilter.java:201) at org.springframework.web.filter.OncePerRequestFilter.doFilter(OncePerRequestFilter.java:117) at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189) at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162) at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:197) at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:97) at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:540) at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:135) at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:92) at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:78) at org.apache.catalina.valves.RemoteIpValve.invoke(RemoteIpValve.java:769) at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:357) at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:382) at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:65) at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:895) at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1732) at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49) at org.apache.tomcat.util.threads.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1191) at org.apache.tomcat.util.threads.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:659) at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61) at java.base/java.lang.Thread.run(Unknown Source) Caused by: org.apache.http.conn.HttpHostConnectException: Connect to ejbca:8080 [ejbca/10.233.15.145] failed: Connection refused (Connection refused) at org.apache.http.impl.conn.DefaultHttpClientConnectionOperator.connect(DefaultHttpClientConnectionOperator.java:159) at org.apache.http.impl.conn.PoolingHttpClientConnectionManager.connect(PoolingHttpClientConnectionManager.java:373) at org.apache.http.impl.execchain.MainClientExec.establishRoute(MainClientExec.java:394) at org.apache.http.impl.execchain.MainClientExec.execute(MainClientExec.java:237) at org.apache.http.impl.execchain.ProtocolExec.execute(ProtocolExec.java:185) at org.apache.http.impl.execchain.RetryExec.execute(RetryExec.java:89) at org.apache.http.impl.execchain.RedirectExec.execute(RedirectExec.java:110) at org.apache.http.impl.client.InternalHttpClient.doExecute(InternalHttpClient.java:185) at org.apache.http.impl.client.CloseableHttpClient.execute(CloseableHttpClient.java:83) at org.apache.http.impl.client.CloseableHttpClient.execute(CloseableHttpClient.java:108) at org.apache.http.impl.client.CloseableHttpClient$$FastClassBySpringCGLIB$$85825060.invoke() at org.springframework.cglib.proxy.MethodProxy.invoke(MethodProxy.java:218) at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.invokeJoinpoint(CglibAopProxy.java:783) at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:163) at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.proceed(CglibAopProxy.java:753) at org.springframework.aop.support.DelegatingIntroductionInterceptor.doProceed(DelegatingIntroductionInterceptor.java:137) at org.springframework.aop.support.DelegatingIntroductionInterceptor.invoke(DelegatingIntroductionInterceptor.java:124) at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:186) at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.proceed(CglibAopProxy.java:753) at org.springframework.aop.framework.CglibAopProxy$DynamicAdvisedInterceptor.intercept(CglibAopProxy.java:698) at org.apache.http.impl.client.CloseableHttpClient$$EnhancerBySpringCGLIB$$c63af2b8.execute() at org.onap.oom.certservice.cmpv2client.impl.Cmpv2HttpClient.postRequest(Cmpv2HttpClient.java:71) ... 62 more Caused by: java.net.ConnectException: Connection refused (Connection refused) at java.base/java.net.PlainSocketImpl.socketConnect(Native Method) at java.base/java.net.AbstractPlainSocketImpl.doConnect(Unknown Source) at java.base/java.net.AbstractPlainSocketImpl.connectToAddress(Unknown Source) at java.base/java.net.AbstractPlainSocketImpl.connect(Unknown Source) at java.base/java.net.SocksSocketImpl.connect(Unknown Source) at java.base/java.net.Socket.connect(Unknown Source) at org.apache.http.conn.socket.PlainConnectionSocketFactory.connectSocket(PlainConnectionSocketFactory.java:75) at org.apache.http.impl.conn.DefaultHttpClientConnectionOperator.connect(DefaultHttpClientConnectionOperator.java:142) ... 83 more 2022-04-04 03:56:22.880  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-04 03:56:22.882 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-04 03:56:22.883 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-04 03:56:22.884 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-04 03:56:22.885  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-04 03:56:22.886  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-04 03:56:22.887  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-04 03:56:22.887 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-04 03:56:22.887 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-04 03:56:22.888 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-04 03:56:22.892 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-04 03:56:22.893 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-04 03:56:22.893 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-04 03:56:22.893 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-04 03:56:23.194  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-04 03:56:23.195  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-04 03:56:23.196 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-04 03:56:23.196 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-04 03:56:23.198  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-04 03:56:23.199  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-04 03:56:23.200 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-04 03:56:23.201 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-04 03:56:23.201 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-04 03:56:23.202 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-04 03:56:23.203 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-04 03:56:23.203 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-04 03:56:23.205 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-04 03:56:23.205 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-04 03:56:23.206 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-04 03:56:23.206 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-04 03:56:23.208 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 461088822557063581368180181096244130117031333399 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Apr 04 00:59:00 UTC 2022 Final Date: Sat Apr 03 00:58:59 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9a:df:68:98:85:c0:b1:37:4c:95:52:11:6d:2a:3e:34:95:78:98:20] modulus: 80f96804a1903556e1b3ef0493bd6cd64b872b23c4f096743dfb8091fb4b8443e9b06c44169a1b06cbb08e445fd2162af72547fcc4d5c8a616e63c2758f3a76f492a30c4a34edf4a4c740049890c63f703e6c98d5b8472f8f5ae0bc4ffc0734929730c3509aa9680c4d754850af062cc59c7ece8e50faf62e4d8ddf9d4616b47df4e25441c2681abcc14046cdb4152e1dcdd34a2646127c9e5ee7a257e48d5ae239596db2aa316b41e6086d53f20ff3f0a984d43b9855c4756b43dd6c124f442d00b55cdd092a18c74d135176e039257783dc7d6085402cc3ae1c493f67d595e9e7f97a072dc6bc9144585edec2a5a4e3960a8bb98bf715d868ac0b883c5bb2f641d2769532fa841e2753b849f386341534253d3964e01c5b15efd2f8b4a05fdcf3e5e30daf92d6688388d13cb918106bb45c85e0674fa84e3771c3c70f7ec488669bfad5894903aefdae8ff7d1cd0d44629484f2cc1ca637d9853c3196dd26c1e8d30eba20a354e4f0261c56341849e3d2f967ecc793717fcd1c91c08af27df public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 10d26549027e617e8b4405d881fc4379dcf6d156 d0ac87f61d75e5da63cfb2e82cf4e28a974b88a6 f0e40f1684cf5e97d228f4e4e0a684f02dc50984 87cd96c6dd9cbc2510b55790bbfc07fa1b5224cb e6ff301d105b694689452d66dbf3d2741ef8da49 cfac3c73e1eea1bae5b733c9c55f7361538d97a2 935d4e424fa0c7fc855342f8c085c53c9701e7df def9134d9dc4998b88414c4a788fca48ac90674a 19f77aba5fadf7d22212af71f2c9070af07eaa62 bca308aac223ea83ea4b1e90b9714b848254bacb f729b782b3c738050f1de37271936ab05d36696e f905b2d24cfe68f34626c70f002f02c5458f1227 a3369a78977d2638f209ce4243bbef7d3510a70f 85df8460c7b2c75dfd50530d7fee0193cbc3d253 75ff642b36c882ee065ccac63c00161acb2e99f5 e5fce3e544f92c8b66c1c455f8d7c2e1767ac180 7f6ad1cd2e6a0ec8969201aad6efecbac742bd7f 3e4a961ec2eb3fefcca43dce037f9e6d112cac54 7f2512e361a07889604c18fcd2acd6886a820bdc 46b3ea94 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [55:5c:17:b6:84:99:2e:0f:b5:46:6b:10:49:7c:74:61:60:94:39:1b] modulus: f65d77ad2c8b15e83b2cb98db01132064690974419315ac083c6e45df996644b21471abfe4d840e56e8b97c7ca414cd12acec3bafabf3c352ab255c93e302e2ee5f98362ab78f50135052aeccd80d2961853a4587eea3a04b19ee10b7648de700d220efcb27f86adff672996a704e4500db85b427f16e7ef59656f8cf0effa75908c1cc44423d92554ec5a1433eaa59509d8b1b53f6744b29e9d4914aaef45db99cdd53e81614e9483a96d4bc41cd6e6a40b93063135b7eacecb5ba6c56b864647f0cc7ce74c5c14c54017514ee8fd07fc84973ef395c03c1e29254f7abdfddca8f8adc21afc7ca317f0a4a6149555a679798dae4f8038c5272643549136ae61 public exponent: 10001 ] 2022-04-04 03:59:48.089  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-04 03:59:48.090 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-04 03:59:48.091 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-04 03:59:48.092 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-04 03:59:48.093  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-04 03:59:48.094  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-04 03:59:48.094  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-04 03:59:48.095 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-04 03:59:48.095 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-04 03:59:48.095 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-04 03:59:48.100 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-04 03:59:48.101 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-04 03:59:48.101 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-04 03:59:48.101 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-04 03:59:48.264  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-04 03:59:48.265  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-04 03:59:48.265 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-04 03:59:48.265 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-04 03:59:48.267  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-04 03:59:48.268  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-04 03:59:48.268 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-04 03:59:48.268 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-04 03:59:48.269 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-04 03:59:48.269 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-04 03:59:48.270 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-04 03:59:48.270 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-04 03:59:48.270 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-04 03:59:48.271 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-04 03:59:48.271 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-04 03:59:48.272 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-04 03:59:48.274 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 461088822557063581368180181096244130117031333399 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Apr 04 00:59:00 UTC 2022 Final Date: Sat Apr 03 00:58:59 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9a:df:68:98:85:c0:b1:37:4c:95:52:11:6d:2a:3e:34:95:78:98:20] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 10d26549027e617e8b4405d881fc4379dcf6d156 d0ac87f61d75e5da63cfb2e82cf4e28a974b88a6 f0e40f1684cf5e97d228f4e4e0a684f02dc50984 87cd96c6dd9cbc2510b55790bbfc07fa1b5224cb e6ff301d105b694689452d66dbf3d2741ef8da49 cfac3c73e1eea1bae5b733c9c55f7361538d97a2 935d4e424fa0c7fc855342f8c085c53c9701e7df def9134d9dc4998b88414c4a788fca48ac90674a 19f77aba5fadf7d22212af71f2c9070af07eaa62 bca308aac223ea83ea4b1e90b9714b848254bacb f729b782b3c738050f1de37271936ab05d36696e f905b2d24cfe68f34626c70f002f02c5458f1227 a3369a78977d2638f209ce4243bbef7d3510a70f 85df8460c7b2c75dfd50530d7fee0193cbc3d253 75ff642b36c882ee065ccac63c00161acb2e99f5 e5fce3e544f92c8b66c1c455f8d7c2e1767ac180 7f6ad1cd2e6a0ec8969201aad6efecbac742bd7f 3e4a961ec2eb3fefcca43dce037f9e6d112cac54 7f2512e361a07889604c18fcd2acd6886a820bdc 46b3ea94 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [96:f2:8a:d6:dc:56:90:c5:5a:98:81:8a:d9:f0:1a:6a:0d:0c:c2:e3] modulus: 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 public exponent: 10001 ] 2022-04-04 04:01:48.314  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-04 04:01:48.316 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-04 04:01:48.318 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-04-04 04:01:48.318 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-04 04:01:48.319  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-04-04 04:01:48.319  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-04 04:01:48.320  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-04 04:01:48.320 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-04 04:01:48.320 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-04 04:01:48.321 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-04 04:01:48.325 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-04 04:01:48.326 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-04 04:01:48.326 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-04 04:01:48.326 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-04 04:01:48.444  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-04 04:01:48.445  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-04 04:01:48.445 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-04 04:01:48.445 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-04 04:01:48.447  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-04 04:01:48.448  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-04 04:01:48.448 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-04 04:01:48.449 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-04 04:01:48.449 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-04 04:01:48.450 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-04 04:01:48.450 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-04 04:01:48.450 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-04 04:01:48.451 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-04 04:01:48.451 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-04 04:01:48.452 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-04 04:01:48.453 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-04 04:01:48.455 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 461088822557063581368180181096244130117031333399 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Apr 04 00:59:00 UTC 2022 Final Date: Sat Apr 03 00:58:59 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9a:df:68:98:85:c0:b1:37:4c:95:52:11:6d:2a:3e:34:95:78:98:20] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 10d26549027e617e8b4405d881fc4379dcf6d156 d0ac87f61d75e5da63cfb2e82cf4e28a974b88a6 f0e40f1684cf5e97d228f4e4e0a684f02dc50984 87cd96c6dd9cbc2510b55790bbfc07fa1b5224cb e6ff301d105b694689452d66dbf3d2741ef8da49 cfac3c73e1eea1bae5b733c9c55f7361538d97a2 935d4e424fa0c7fc855342f8c085c53c9701e7df def9134d9dc4998b88414c4a788fca48ac90674a 19f77aba5fadf7d22212af71f2c9070af07eaa62 bca308aac223ea83ea4b1e90b9714b848254bacb f729b782b3c738050f1de37271936ab05d36696e f905b2d24cfe68f34626c70f002f02c5458f1227 a3369a78977d2638f209ce4243bbef7d3510a70f 85df8460c7b2c75dfd50530d7fee0193cbc3d253 75ff642b36c882ee065ccac63c00161acb2e99f5 e5fce3e544f92c8b66c1c455f8d7c2e1767ac180 7f6ad1cd2e6a0ec8969201aad6efecbac742bd7f 3e4a961ec2eb3fefcca43dce037f9e6d112cac54 7f2512e361a07889604c18fcd2acd6886a820bdc 46b3ea94 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [69:6d:7e:1e:21:c0:58:5c:15:3c:60:b6:93:3b:e3:cd:fb:7e:f2:77] modulus: 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 public exponent: 10001 ] 2022-04-04 04:04:14.891  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-04 04:04:14.892 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-04 04:04:14.893 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-04-04 04:04:14.894 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-04 04:04:14.894  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-04-04 04:04:14.895  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-04 04:04:14.895  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-04 04:04:14.895 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-04 04:04:14.896 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-04 04:04:14.896 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-04 04:04:14.902 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-04 04:04:14.902 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-04 04:04:14.902 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-04 04:04:14.902 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-04 04:04:15.043  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-04 04:04:15.044  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-04 04:04:15.045 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-04 04:04:15.045 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-04 04:04:15.046  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-04 04:04:15.047  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-04 04:04:15.047 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-04 04:04:15.048 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-04 04:04:15.061 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-04 04:04:15.062 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-04 04:04:15.062 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-04 04:04:15.062 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-04 04:04:15.063 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-04 04:04:15.063 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-04 04:04:15.063 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-04 04:04:15.064 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-04 04:04:15.069 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 461088822557063581368180181096244130117031333399 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Apr 04 00:59:00 UTC 2022 Final Date: Sat Apr 03 00:58:59 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9a:df:68:98:85:c0:b1:37:4c:95:52:11:6d:2a:3e:34:95:78:98:20] modulus: 80f96804a1903556e1b3ef0493bd6cd64b872b23c4f096743dfb8091fb4b8443e9b06c44169a1b06cbb08e445fd2162af72547fcc4d5c8a616e63c2758f3a76f492a30c4a34edf4a4c740049890c63f703e6c98d5b8472f8f5ae0bc4ffc0734929730c3509aa9680c4d754850af062cc59c7ece8e50faf62e4d8ddf9d4616b47df4e25441c2681abcc14046cdb4152e1dcdd34a2646127c9e5ee7a257e48d5ae239596db2aa316b41e6086d53f20ff3f0a984d43b9855c4756b43dd6c124f442d00b55cdd092a18c74d135176e039257783dc7d6085402cc3ae1c493f67d595e9e7f97a072dc6bc9144585edec2a5a4e3960a8bb98bf715d868ac0b883c5bb2f641d2769532fa841e2753b849f386341534253d3964e01c5b15efd2f8b4a05fdcf3e5e30daf92d6688388d13cb918106bb45c85e0674fa84e3771c3c70f7ec488669bfad5894903aefdae8ff7d1cd0d44629484f2cc1ca637d9853c3196dd26c1e8d30eba20a354e4f0261c56341849e3d2f967ecc793717fcd1c91c08af27df public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 10d26549027e617e8b4405d881fc4379dcf6d156 d0ac87f61d75e5da63cfb2e82cf4e28a974b88a6 f0e40f1684cf5e97d228f4e4e0a684f02dc50984 87cd96c6dd9cbc2510b55790bbfc07fa1b5224cb e6ff301d105b694689452d66dbf3d2741ef8da49 cfac3c73e1eea1bae5b733c9c55f7361538d97a2 935d4e424fa0c7fc855342f8c085c53c9701e7df def9134d9dc4998b88414c4a788fca48ac90674a 19f77aba5fadf7d22212af71f2c9070af07eaa62 bca308aac223ea83ea4b1e90b9714b848254bacb f729b782b3c738050f1de37271936ab05d36696e f905b2d24cfe68f34626c70f002f02c5458f1227 a3369a78977d2638f209ce4243bbef7d3510a70f 85df8460c7b2c75dfd50530d7fee0193cbc3d253 75ff642b36c882ee065ccac63c00161acb2e99f5 e5fce3e544f92c8b66c1c455f8d7c2e1767ac180 7f6ad1cd2e6a0ec8969201aad6efecbac742bd7f 3e4a961ec2eb3fefcca43dce037f9e6d112cac54 7f2512e361a07889604c18fcd2acd6886a820bdc 46b3ea94 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2c:45:00:37:02:97:c7:5f:d9:d1:ab:ba:81:74:68:73:97:a1:61:1d] modulus: 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 public exponent: 10001 ] 2022-04-04 04:06:44.610  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-04 04:06:44.611 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-04 04:06:44.612 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-04-04 04:06:44.612 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-04 04:06:44.612  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-04-04 04:06:44.613  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-04 04:06:44.613  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-04 04:06:44.613 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-04 04:06:44.614 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-04 04:06:44.614 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-04 04:06:44.622 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-04 04:06:44.623 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-04 04:06:44.623 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-04 04:06:44.623 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-04 04:06:44.709  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-04 04:06:44.710  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-04 04:06:44.710 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-04 04:06:44.710 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-04 04:06:44.712  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-04 04:06:44.762  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-04 04:06:44.762 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-04 04:06:44.762 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-04 04:06:44.763 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-04 04:06:44.765 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-04 04:06:44.765 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-04 04:06:44.766 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-04 04:06:44.768 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-04 04:06:44.769 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-04 04:06:44.769 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-04 04:06:44.771 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-04 04:06:44.870 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 461088822557063581368180181096244130117031333399 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Apr 04 00:59:00 UTC 2022 Final Date: Sat Apr 03 00:58:59 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9a:df:68:98:85:c0:b1:37:4c:95:52:11:6d:2a:3e:34:95:78:98:20] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 10d26549027e617e8b4405d881fc4379dcf6d156 d0ac87f61d75e5da63cfb2e82cf4e28a974b88a6 f0e40f1684cf5e97d228f4e4e0a684f02dc50984 87cd96c6dd9cbc2510b55790bbfc07fa1b5224cb e6ff301d105b694689452d66dbf3d2741ef8da49 cfac3c73e1eea1bae5b733c9c55f7361538d97a2 935d4e424fa0c7fc855342f8c085c53c9701e7df def9134d9dc4998b88414c4a788fca48ac90674a 19f77aba5fadf7d22212af71f2c9070af07eaa62 bca308aac223ea83ea4b1e90b9714b848254bacb f729b782b3c738050f1de37271936ab05d36696e f905b2d24cfe68f34626c70f002f02c5458f1227 a3369a78977d2638f209ce4243bbef7d3510a70f 85df8460c7b2c75dfd50530d7fee0193cbc3d253 75ff642b36c882ee065ccac63c00161acb2e99f5 e5fce3e544f92c8b66c1c455f8d7c2e1767ac180 7f6ad1cd2e6a0ec8969201aad6efecbac742bd7f 3e4a961ec2eb3fefcca43dce037f9e6d112cac54 7f2512e361a07889604c18fcd2acd6886a820bdc 46b3ea94 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [de:96:0a:77:fd:94:48:65:fc:ea:89:d6:ac:df:f9:60:86:8b:df:d6] modulus: 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 public exponent: 10001 ] 2022-04-04 04:07:48.972  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-04 04:07:48.974 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-04 04:07:48.976 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-04 04:07:48.977 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-04 04:07:48.978  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-04 04:07:48.979  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-04 04:07:48.979  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-04 04:07:48.980 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-04 04:07:48.980 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-04 04:07:48.981 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-04 04:07:48.985 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-04 04:07:48.985 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-04 04:07:48.985 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-04 04:07:48.986 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-04 04:07:49.072  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-04 04:07:49.073  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-04 04:07:49.073 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-04 04:07:49.074 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-04 04:07:49.076  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-04 04:07:49.076  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-04 04:07:49.077 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-04 04:07:49.077 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-04 04:07:49.078 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-04 04:07:49.078 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-04 04:07:49.078 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-04 04:07:49.079 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-04 04:07:49.079 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-04 04:07:49.079 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-04 04:07:49.080 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-04 04:07:49.080 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-04 04:07:49.083 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 461088822557063581368180181096244130117031333399 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Apr 04 00:59:00 UTC 2022 Final Date: Sat Apr 03 00:58:59 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9a:df:68:98:85:c0:b1:37:4c:95:52:11:6d:2a:3e:34:95:78:98:20] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 10d26549027e617e8b4405d881fc4379dcf6d156 d0ac87f61d75e5da63cfb2e82cf4e28a974b88a6 f0e40f1684cf5e97d228f4e4e0a684f02dc50984 87cd96c6dd9cbc2510b55790bbfc07fa1b5224cb e6ff301d105b694689452d66dbf3d2741ef8da49 cfac3c73e1eea1bae5b733c9c55f7361538d97a2 935d4e424fa0c7fc855342f8c085c53c9701e7df def9134d9dc4998b88414c4a788fca48ac90674a 19f77aba5fadf7d22212af71f2c9070af07eaa62 bca308aac223ea83ea4b1e90b9714b848254bacb f729b782b3c738050f1de37271936ab05d36696e f905b2d24cfe68f34626c70f002f02c5458f1227 a3369a78977d2638f209ce4243bbef7d3510a70f 85df8460c7b2c75dfd50530d7fee0193cbc3d253 75ff642b36c882ee065ccac63c00161acb2e99f5 e5fce3e544f92c8b66c1c455f8d7c2e1767ac180 7f6ad1cd2e6a0ec8969201aad6efecbac742bd7f 3e4a961ec2eb3fefcca43dce037f9e6d112cac54 7f2512e361a07889604c18fcd2acd6886a820bdc 46b3ea94 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [38:77:c2:4b:f4:c1:3c:80:04:40:24:93:3e:00:ee:3b:89:17:ab:56] modulus: e5bacfcb834976fcad9915d32133a5af6f16fc64821fb7175ba9833c14b4e60f02eed1f7e9509dc633298d319dedd72fc94a6018c611f60e0df5a65addb79ca9cadaec8be34fb41f1ff5edc96b5fd74fb7eb4b7a3924b917517339ba29289e87903a2132079da002c74ebf46748d766a3c9cf6c6b9cc066072219af32f960da581ac670ae065bfe73a14da57f8b60ae75537c10c2749c3b8e552ee4713eefa9d01b468e1e84d0f6c224c4528293331307d0d9e1149d2f2931f4fb0daae9596b122b9f21d0c1996c7196e39b6a1e159c68cad7fed51ae3bdc0dbf518a08b60c9c23cdb3e9fd06af85f892cdde695161535d74270240f29f0cd8afdd160ae2e2a3 public exponent: 10001 ] 2022-04-04 04:07:52.337  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-04 04:07:52.338 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-04 04:07:52.339 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-04-04 04:07:52.339 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-04 04:07:52.339  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-04-04 04:07:52.340  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-04 04:07:52.340  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-04 04:07:52.340 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-04 04:07:52.340 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-04 04:07:52.341 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-04 04:07:52.346 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-04 04:07:52.346 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-04 04:07:52.346 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-04 04:07:52.347 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-04 04:07:52.418  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-04 04:07:52.419  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-04 04:07:52.419 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-04 04:07:52.419 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-04 04:07:52.421  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-04 04:07:52.421  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-04 04:07:52.421 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-04 04:07:52.422 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-04 04:07:52.422 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-04 04:07:52.422 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-04 04:07:52.423 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-04 04:07:52.423 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-04 04:07:52.424 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-04 04:07:52.424 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-04 04:07:52.424 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-04 04:07:52.425 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-04 04:07:52.428 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 461088822557063581368180181096244130117031333399 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Apr 04 00:59:00 UTC 2022 Final Date: Sat Apr 03 00:58:59 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9a:df:68:98:85:c0:b1:37:4c:95:52:11:6d:2a:3e:34:95:78:98:20] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 10d26549027e617e8b4405d881fc4379dcf6d156 d0ac87f61d75e5da63cfb2e82cf4e28a974b88a6 f0e40f1684cf5e97d228f4e4e0a684f02dc50984 87cd96c6dd9cbc2510b55790bbfc07fa1b5224cb e6ff301d105b694689452d66dbf3d2741ef8da49 cfac3c73e1eea1bae5b733c9c55f7361538d97a2 935d4e424fa0c7fc855342f8c085c53c9701e7df def9134d9dc4998b88414c4a788fca48ac90674a 19f77aba5fadf7d22212af71f2c9070af07eaa62 bca308aac223ea83ea4b1e90b9714b848254bacb f729b782b3c738050f1de37271936ab05d36696e f905b2d24cfe68f34626c70f002f02c5458f1227 a3369a78977d2638f209ce4243bbef7d3510a70f 85df8460c7b2c75dfd50530d7fee0193cbc3d253 75ff642b36c882ee065ccac63c00161acb2e99f5 e5fce3e544f92c8b66c1c455f8d7c2e1767ac180 7f6ad1cd2e6a0ec8969201aad6efecbac742bd7f 3e4a961ec2eb3fefcca43dce037f9e6d112cac54 7f2512e361a07889604c18fcd2acd6886a820bdc 46b3ea94 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1f:81:c8:00:2f:b1:63:b8:e1:86:cc:7e:87:30:a0:cf:b7:27:54:4f] modulus: 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 public exponent: 10001 ] 2022-04-04 04:11:20.775  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-04 04:11:20.776 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-04 04:11:20.778 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-04 04:11:20.779 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-04 04:11:20.779  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-04 04:11:20.780  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-04 04:11:20.780  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-04 04:11:20.780 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-04 04:11:20.781 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-04 04:11:20.781 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-04 04:11:20.785 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-04 04:11:20.785 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-04 04:11:20.785 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-04 04:11:20.785 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-04 04:11:20.867  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-04 04:11:20.868  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-04 04:11:20.868 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-04 04:11:20.868 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-04 04:11:20.870  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-04 04:11:20.871  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-04 04:11:20.871 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-04 04:11:20.871 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-04 04:11:20.872 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-04 04:11:20.877 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-04 04:11:20.878 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-04 04:11:20.878 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-04 04:11:20.880 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-04 04:11:20.881 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-04 04:11:20.881 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-04 04:11:20.883 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-04 04:11:20.886 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 461088822557063581368180181096244130117031333399 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Apr 04 00:59:00 UTC 2022 Final Date: Sat Apr 03 00:58:59 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9a:df:68:98:85:c0:b1:37:4c:95:52:11:6d:2a:3e:34:95:78:98:20] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 10d26549027e617e8b4405d881fc4379dcf6d156 d0ac87f61d75e5da63cfb2e82cf4e28a974b88a6 f0e40f1684cf5e97d228f4e4e0a684f02dc50984 87cd96c6dd9cbc2510b55790bbfc07fa1b5224cb e6ff301d105b694689452d66dbf3d2741ef8da49 cfac3c73e1eea1bae5b733c9c55f7361538d97a2 935d4e424fa0c7fc855342f8c085c53c9701e7df def9134d9dc4998b88414c4a788fca48ac90674a 19f77aba5fadf7d22212af71f2c9070af07eaa62 bca308aac223ea83ea4b1e90b9714b848254bacb f729b782b3c738050f1de37271936ab05d36696e f905b2d24cfe68f34626c70f002f02c5458f1227 a3369a78977d2638f209ce4243bbef7d3510a70f 85df8460c7b2c75dfd50530d7fee0193cbc3d253 75ff642b36c882ee065ccac63c00161acb2e99f5 e5fce3e544f92c8b66c1c455f8d7c2e1767ac180 7f6ad1cd2e6a0ec8969201aad6efecbac742bd7f 3e4a961ec2eb3fefcca43dce037f9e6d112cac54 7f2512e361a07889604c18fcd2acd6886a820bdc 46b3ea94 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4b:b7:89:40:10:ff:50:9c:d2:89:3a:f1:0b:a3:c2:8b:06:cb:e4:c9] modulus: c4da236e5915f73a0fcdeb4bf1910d8cb68d98e7a089d57bcd5fd1f1b9106e49aa32083f7ab77abd99bbd6bd9a509baacbbf5c88ceb09436a2ce9954b288bd48aaea64a7136405f012b7c521518b34afcd9965db19d1bfe6819f66c343808422d164f4edc98b6edac6f7ca6f9b671486a2c525f607ff3d5683f2e9cb8e4b2481814674ce7453074b31428bcf736ba91bcab8bc1f34c458aab1f1a1ff6f99ba94c4e5e0276ca150b493015f8cac9cfa3039daff1dc3137b3950277ef6bf09f73b606288c8ff245cac41afd56ed3679bb9cf59653da54edbee2f3a8000179232bc75676b13770192ec2a9d1890d8b7dfafdabe26b4386d370b92531f7e75eb4503 public exponent: 10001 ] 2022-04-04 04:16:46.240  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-04 04:16:46.242 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-04 04:16:46.243 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-04 04:16:46.243 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-04 04:16:46.243  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-04 04:16:46.244  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-04 04:16:46.244  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-04 04:16:46.244 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-04 04:16:46.244 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-04 04:16:46.244 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-04 04:16:46.249 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-04 04:16:46.250 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-04 04:16:46.250 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-04 04:16:46.250 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-04 04:16:46.329  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-04 04:16:46.330  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-04 04:16:46.330 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-04 04:16:46.331 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-04 04:16:46.332  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-04 04:16:46.333  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-04 04:16:46.333 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-04 04:16:46.333 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-04 04:16:46.334 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-04 04:16:46.334 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-04 04:16:46.335 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-04 04:16:46.335 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-04 04:16:46.336 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-04 04:16:46.336 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-04 04:16:46.336 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-04 04:16:46.337 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-04 04:16:46.339 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 461088822557063581368180181096244130117031333399 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Apr 04 00:59:00 UTC 2022 Final Date: Sat Apr 03 00:58:59 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9a:df:68:98:85:c0:b1:37:4c:95:52:11:6d:2a:3e:34:95:78:98:20] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 10d26549027e617e8b4405d881fc4379dcf6d156 d0ac87f61d75e5da63cfb2e82cf4e28a974b88a6 f0e40f1684cf5e97d228f4e4e0a684f02dc50984 87cd96c6dd9cbc2510b55790bbfc07fa1b5224cb e6ff301d105b694689452d66dbf3d2741ef8da49 cfac3c73e1eea1bae5b733c9c55f7361538d97a2 935d4e424fa0c7fc855342f8c085c53c9701e7df def9134d9dc4998b88414c4a788fca48ac90674a 19f77aba5fadf7d22212af71f2c9070af07eaa62 bca308aac223ea83ea4b1e90b9714b848254bacb f729b782b3c738050f1de37271936ab05d36696e f905b2d24cfe68f34626c70f002f02c5458f1227 a3369a78977d2638f209ce4243bbef7d3510a70f 85df8460c7b2c75dfd50530d7fee0193cbc3d253 75ff642b36c882ee065ccac63c00161acb2e99f5 e5fce3e544f92c8b66c1c455f8d7c2e1767ac180 7f6ad1cd2e6a0ec8969201aad6efecbac742bd7f 3e4a961ec2eb3fefcca43dce037f9e6d112cac54 7f2512e361a07889604c18fcd2acd6886a820bdc 46b3ea94 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a1:b8:d5:a2:32:c4:20:3d:f5:c5:06:46:60:9d:01:bf:1f:69:47:b0] modulus: b004613cb9c1ebba8cdba1ccd88e52c0323019efaf84a02c183c2cd429687e10de09828ab3b9eaede7dd4286d5cd8f3e8181ae9ddc143864e20edb730ed9ddb3261e6ea67e1d2ecab5194a84b3ecb910b4ed5bc0e1bfdf37b39f13a4095ed7068d80c6873b1ff43c118f5cbdcf772166a7b327c779da6e457535e59a0e4d858fe748cb94d81c60c0eb6d7715ab99f44191fc320d8c5917f346035d8d828a1c3876e15e276c9d1adf8e5dffc834ee4f44ad46b6b3032d0c69d3f055336de18c4a2c4d543c31cee01669490cc28e20f9fdde5c8b7e93d80000d981b5b86c99990413f4f921948067f109b597caf17fc3ef668f3612040711db13d3ad80de8ba177 public exponent: 10001 ] 2022-04-04 04:21:28.805  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-04 04:21:28.806 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-04 04:21:28.808 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-04 04:21:28.809 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-04 04:21:28.809  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-04 04:21:28.810  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-04 04:21:28.810  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-04 04:21:28.810 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-04 04:21:28.810 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-04 04:21:28.811 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-04 04:21:28.815 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-04 04:21:28.815 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-04 04:21:28.815 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-04 04:21:28.815 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-04 04:21:28.899  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-04 04:21:28.900  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-04 04:21:28.900 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-04 04:21:28.900 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-04 04:21:28.902  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-04 04:21:28.902  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-04 04:21:28.902 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-04 04:21:28.902 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-04 04:21:28.902 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-04 04:21:28.903 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-04 04:21:28.903 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-04 04:21:28.903 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-04 04:21:28.904 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-04 04:21:28.904 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-04 04:21:28.904 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-04 04:21:28.905 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-04 04:21:28.908 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 461088822557063581368180181096244130117031333399 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Apr 04 00:59:00 UTC 2022 Final Date: Sat Apr 03 00:58:59 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [9a:df:68:98:85:c0:b1:37:4c:95:52:11:6d:2a:3e:34:95:78:98:20] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 10d26549027e617e8b4405d881fc4379dcf6d156 d0ac87f61d75e5da63cfb2e82cf4e28a974b88a6 f0e40f1684cf5e97d228f4e4e0a684f02dc50984 87cd96c6dd9cbc2510b55790bbfc07fa1b5224cb e6ff301d105b694689452d66dbf3d2741ef8da49 cfac3c73e1eea1bae5b733c9c55f7361538d97a2 935d4e424fa0c7fc855342f8c085c53c9701e7df def9134d9dc4998b88414c4a788fca48ac90674a 19f77aba5fadf7d22212af71f2c9070af07eaa62 bca308aac223ea83ea4b1e90b9714b848254bacb f729b782b3c738050f1de37271936ab05d36696e f905b2d24cfe68f34626c70f002f02c5458f1227 a3369a78977d2638f209ce4243bbef7d3510a70f 85df8460c7b2c75dfd50530d7fee0193cbc3d253 75ff642b36c882ee065ccac63c00161acb2e99f5 e5fce3e544f92c8b66c1c455f8d7c2e1767ac180 7f6ad1cd2e6a0ec8969201aad6efecbac742bd7f 3e4a961ec2eb3fefcca43dce037f9e6d112cac54 7f2512e361a07889604c18fcd2acd6886a820bdc 46b3ea94 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b6:22:d4:b7:a3:f9:96:09:21:1d:7f:a0:73:4d:ab:9e:97:a7:9d:b8] modulus: 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 public exponent: 10001 ]