2022-05-29 02:00:09,919 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-05-29 02:00:13,817 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-05-29 02:00:16.309  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default May 29, 2022 2:00:23 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] May 29, 2022 2:00:23 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] May 29, 2022 2:00:23 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] May 29, 2022 2:00:24 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-05-29 02:00:26.023 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-05-29 02:00:27.129  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-05-29 02:00:27.809  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-05-29 02:00:30.423 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-05-29 02:00:30.425 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-05-29 02:00:30.505 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-05-29 02:00:30.509 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-05-29 02:00:30.627 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-05-29 02:00:30.705 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-05-29 02:00:31.020 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-05-29 02:00:34.613 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} May 29, 2022 2:00:37 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-05-29 02:00:38.410  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 31.285 seconds (JVM running for 37.571) May 29, 2022 2:00:46 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-05-29 02:01:43.418  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-29 02:01:43.507 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-29 02:01:43.618 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-05-29 02:01:43.621 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-29 02:01:43.716  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-05-29 02:01:43.718  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-29 02:01:43.719  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-29 02:01:43.721 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-29 02:01:43.721 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-29 02:01:43.724 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-29 02:01:43.729 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-29 02:01:43.809 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-29 02:01:43.923 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-29 02:01:44.007 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-29 02:01:44.007 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-29 02:01:44.010 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-29 02:01:45.203  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-29 02:01:45.206  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-29 02:01:45.206 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-29 02:01:45.208 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-29 02:01:45.219  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-29 02:01:45.221  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-29 02:01:45.222 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-29 02:01:45.222 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-29 02:01:45.223 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-29 02:01:45.313 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-29 02:01:45.314 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-29 02:01:45.314 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-29 02:01:45.320 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-29 02:01:45.320 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-29 02:01:45.321 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-29 02:01:45.322 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-29 02:01:45.612 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 691401858031067711392878288988955447576498290090 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun May 29 01:55:53 UTC 2022 Final Date: Fri May 28 01:55:52 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [8c:f0:6a:13:e8:eb:aa:ef:f1:34:1e:fd:9e:da:9e:2f:60:7a:f5:96] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 21702629a568552283e6eaf88fe48813ac83e5ec 4719c072590982aaafd14c2e32a6a3b58ecbb7de e82b869c137b95db990384cf169c27c6639f5e8a 132a314a332c5f8b059c37da7b814242e5ca35f1 70dfc28f3b2c1b3154e5a0889d3b17a0a3439655 5d8f1f80a768c2b3762e6d4aa63cb93c189687af c327f71878c6d4518c019a3609b320b9ebc18f83 76c3f2a2d6fdcd66a45b342c1ab9091e14973e76 3b04aa856b31f6ecf9e46d1af131e041c6112678 506fe48dcab96b2e54ede306f9fc39d8db37707f 5d7aca3be0801b8ec26fd2904c6ee0c5a74c518f 2939b4e0a9bf652f8efafa569a6f8cf43f5868cd 3f830e0b42491c878a2b0bc114997ed6c2015503 ed3318089a6e8024137e0ef560ef1c934b65b33a 554eda3aa4e10cbae00b35fb834e0caba0a6b6f4 c32447a195694563852c0ac85b0ccfdecbfeb73f e3a3d15d6e8e6844c9c719e9f3a52b50f006cfca 8e07ce6818803f34bf23f24d23fc45b0d320587b 6d70421a8ed550025a25c00811732f027b169b10 ada4050f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [31:7b:e2:59:0f:e3:f6:b0:f4:4c:e9:8a:ec:d8:e0:95:b3:47:d1:a7] modulus: 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 public exponent: 10001 ] 2022-05-29 03:45:09.206  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-29 03:45:09.208 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-29 03:45:09.210 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-29 03:45:09.210 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-29 03:45:09.211  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-29 03:45:09.212  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-29 03:45:09.212  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-29 03:45:09.213 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-29 03:45:09.213 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-29 03:45:09.213 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-29 03:45:09.220 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-29 03:45:09.221 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-29 03:45:09.221 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-29 03:45:09.221 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-29 03:45:09.417  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-29 03:45:09.417  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-29 03:45:09.418 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-29 03:45:09.418 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-29 03:45:09.422  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-29 03:45:09.422  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-29 03:45:09.423 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-29 03:45:09.423 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-29 03:45:09.423 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-29 03:45:09.424 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-29 03:45:09.425 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-29 03:45:09.425 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-29 03:45:09.426 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-29 03:45:09.426 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-29 03:45:09.426 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-29 03:45:09.505 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-29 03:45:09.509 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 691401858031067711392878288988955447576498290090 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun May 29 01:55:53 UTC 2022 Final Date: Fri May 28 01:55:52 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [8c:f0:6a:13:e8:eb:aa:ef:f1:34:1e:fd:9e:da:9e:2f:60:7a:f5:96] modulus: d7127395cf2fa322973907a8ce0f142da6a8cf13864b4671b15e8f4d4d0e5fe723b4629866e476d4591d85145d8efe941a433caaaf680fdcbfc2e9721522325cd229e814ede0a8ccf811da064dd292dbf9741abb140667de0114ae68841838e37097049940d475e47a4bfb39e3d5b835cc00f11280109418c065fe17e69d163c11239ffd029b45b54b5e15fa0809de9c15c620e0555e135012b9a461f46e90e9164b3da25ca65175f97f8f2be8d57d15ccd7ae8797f421258b3f74e76495a32aba6657ee8ee45dfce68583f9ec5689b93de3484f932317b95134476dae541355b9c1f5493cb798f1e1adb4335d9ed4858480303dac9424a27e92574eef88ca07fac1fd6244a854ab07c093691b0ebe5985e48482a57bf4c6efb939af477bdb34f616637fe99dfcd4f380709fbf2ded2b4dd3305095ec11e208c82d9e45e6cf917e96c5ae5c52335b3eeded68b9108a702ebfc571761c06b43df415a116fc425104fd8ab370e2b99c6321710fb01b03dbbb08c1b88f86762a04019285786c4f85 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 21702629a568552283e6eaf88fe48813ac83e5ec 4719c072590982aaafd14c2e32a6a3b58ecbb7de e82b869c137b95db990384cf169c27c6639f5e8a 132a314a332c5f8b059c37da7b814242e5ca35f1 70dfc28f3b2c1b3154e5a0889d3b17a0a3439655 5d8f1f80a768c2b3762e6d4aa63cb93c189687af c327f71878c6d4518c019a3609b320b9ebc18f83 76c3f2a2d6fdcd66a45b342c1ab9091e14973e76 3b04aa856b31f6ecf9e46d1af131e041c6112678 506fe48dcab96b2e54ede306f9fc39d8db37707f 5d7aca3be0801b8ec26fd2904c6ee0c5a74c518f 2939b4e0a9bf652f8efafa569a6f8cf43f5868cd 3f830e0b42491c878a2b0bc114997ed6c2015503 ed3318089a6e8024137e0ef560ef1c934b65b33a 554eda3aa4e10cbae00b35fb834e0caba0a6b6f4 c32447a195694563852c0ac85b0ccfdecbfeb73f e3a3d15d6e8e6844c9c719e9f3a52b50f006cfca 8e07ce6818803f34bf23f24d23fc45b0d320587b 6d70421a8ed550025a25c00811732f027b169b10 ada4050f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [48:cc:a7:13:9b:9b:6c:70:6b:b6:a3:f6:b8:3a:37:56:9c:b6:21:6b] modulus: d06b60fcbccd2ddf51ab77350faaee26d737c96db51de9d205f3087e65c1e6d459a5c45c77d674659973184c37f5726128acba2af77240818af466af2913fee42df5b2485c631fcce870a9ff30ce93810854c71f2cda36420021a8c93cf6bf9ae767431d9b0676f0fba360ea62e2598e89da8eeb815aacca43684c2fd597bb8f7ef3f8488b843dd903cae70f7e3aa8fb1875ce6802ae184afcd473d83ded6369c59b8b7cd57f61668574726f8cbdab45d4ef971c23c2ad073d8a97f5fc353995b6dbdfca27ebea5cc9965450cdfe660454ee3530ebbaed023f394bd30a342ef9fbc346e329efe70eef13d0d5b10e3c029bcf742f98181f42da39056c1175c3d7 public exponent: 10001 ] 2022-05-29 03:49:13.114  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-29 03:49:13.115 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-29 03:49:13.116 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-29 03:49:13.117 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-29 03:49:13.117  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-29 03:49:13.119  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-29 03:49:13.119  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-29 03:49:13.119 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-29 03:49:13.120 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-29 03:49:13.120 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-29 03:49:13.129 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-29 03:49:13.129 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-29 03:49:13.129 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-29 03:49:13.130 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-29 03:49:13.212  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-29 03:49:13.213  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-29 03:49:13.213 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-29 03:49:13.213 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-29 03:49:13.215  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-29 03:49:13.215  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-29 03:49:13.215 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-29 03:49:13.216 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-29 03:49:13.216 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-29 03:49:13.216 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-29 03:49:13.217 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-29 03:49:13.217 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-29 03:49:13.218 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-29 03:49:13.218 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-29 03:49:13.218 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-29 03:49:13.219 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-29 03:49:13.222 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 691401858031067711392878288988955447576498290090 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun May 29 01:55:53 UTC 2022 Final Date: Fri May 28 01:55:52 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [8c:f0:6a:13:e8:eb:aa:ef:f1:34:1e:fd:9e:da:9e:2f:60:7a:f5:96] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 21702629a568552283e6eaf88fe48813ac83e5ec 4719c072590982aaafd14c2e32a6a3b58ecbb7de e82b869c137b95db990384cf169c27c6639f5e8a 132a314a332c5f8b059c37da7b814242e5ca35f1 70dfc28f3b2c1b3154e5a0889d3b17a0a3439655 5d8f1f80a768c2b3762e6d4aa63cb93c189687af c327f71878c6d4518c019a3609b320b9ebc18f83 76c3f2a2d6fdcd66a45b342c1ab9091e14973e76 3b04aa856b31f6ecf9e46d1af131e041c6112678 506fe48dcab96b2e54ede306f9fc39d8db37707f 5d7aca3be0801b8ec26fd2904c6ee0c5a74c518f 2939b4e0a9bf652f8efafa569a6f8cf43f5868cd 3f830e0b42491c878a2b0bc114997ed6c2015503 ed3318089a6e8024137e0ef560ef1c934b65b33a 554eda3aa4e10cbae00b35fb834e0caba0a6b6f4 c32447a195694563852c0ac85b0ccfdecbfeb73f e3a3d15d6e8e6844c9c719e9f3a52b50f006cfca 8e07ce6818803f34bf23f24d23fc45b0d320587b 6d70421a8ed550025a25c00811732f027b169b10 ada4050f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4f:43:fb:0f:71:0d:74:cb:4e:87:4c:95:68:a3:8d:33:62:26:2a:d1] modulus: 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 public exponent: 10001 ] 2022-05-29 03:49:14.442  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-29 03:49:14.443 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-29 03:49:14.444 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-29 03:49:14.444 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-29 03:49:14.445  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-29 03:49:14.445  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-29 03:49:14.446  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-29 03:49:14.446 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-29 03:49:14.446 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-29 03:49:14.446 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-29 03:49:14.450 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-29 03:49:14.451 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-29 03:49:14.451 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-29 03:49:14.451 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-29 03:49:14.509  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-29 03:49:14.509  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-29 03:49:14.509 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-29 03:49:14.510 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-29 03:49:14.511  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-29 03:49:14.511  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-29 03:49:14.511 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-29 03:49:14.511 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-29 03:49:14.512 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-29 03:49:14.512 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-29 03:49:14.512 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-29 03:49:14.512 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-29 03:49:14.513 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-29 03:49:14.513 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-29 03:49:14.514 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-29 03:49:14.514 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-29 03:49:14.517 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 691401858031067711392878288988955447576498290090 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun May 29 01:55:53 UTC 2022 Final Date: Fri May 28 01:55:52 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [8c:f0:6a:13:e8:eb:aa:ef:f1:34:1e:fd:9e:da:9e:2f:60:7a:f5:96] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 21702629a568552283e6eaf88fe48813ac83e5ec 4719c072590982aaafd14c2e32a6a3b58ecbb7de e82b869c137b95db990384cf169c27c6639f5e8a 132a314a332c5f8b059c37da7b814242e5ca35f1 70dfc28f3b2c1b3154e5a0889d3b17a0a3439655 5d8f1f80a768c2b3762e6d4aa63cb93c189687af c327f71878c6d4518c019a3609b320b9ebc18f83 76c3f2a2d6fdcd66a45b342c1ab9091e14973e76 3b04aa856b31f6ecf9e46d1af131e041c6112678 506fe48dcab96b2e54ede306f9fc39d8db37707f 5d7aca3be0801b8ec26fd2904c6ee0c5a74c518f 2939b4e0a9bf652f8efafa569a6f8cf43f5868cd 3f830e0b42491c878a2b0bc114997ed6c2015503 ed3318089a6e8024137e0ef560ef1c934b65b33a 554eda3aa4e10cbae00b35fb834e0caba0a6b6f4 c32447a195694563852c0ac85b0ccfdecbfeb73f e3a3d15d6e8e6844c9c719e9f3a52b50f006cfca 8e07ce6818803f34bf23f24d23fc45b0d320587b 6d70421a8ed550025a25c00811732f027b169b10 ada4050f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4f:43:fb:0f:71:0d:74:cb:4e:87:4c:95:68:a3:8d:33:62:26:2a:d1] modulus: bfa6a03011233a2b62180226820320973bf634fda4dd040e93887dcf0dc805c391f4fa7ee6b13e5ca4c4f2c5d0f972e5c7324803c983e86f7e4e73beddbb0f5f71de5bf8b10455f25c590c5ab49720a045191678e9ef565ed2859d5aa0896feb05b5e0790cc7f026ff1eb154caaddb8fafcc509b7705343d15c773dbc3ab7f7cbd2501fe6abdce7912dc57055752193bd28cb55ce021e5c62eb17f7da8623b7ad3d1a81410cfc6fa87def87324d7b1ac401e13f86159a6ae33ae290d3001afbd8f58c581220cd43d24d1ea9c17ab4885f1e6edcae7fe36ee9119115a6747d1998a32d73f69273ad283620111ce14833dd815442105910aaa8f0d259d35d1ae87 public exponent: 10001 ] 2022-05-29 03:50:54.644  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-29 03:50:54.645 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-29 03:50:54.646 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-05-29 03:50:54.647 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-29 03:50:54.647  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-05-29 03:50:54.647  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-29 03:50:54.648  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-29 03:50:54.648 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-29 03:50:54.648 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-29 03:50:54.648 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-29 03:50:54.652 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-29 03:50:54.653 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-29 03:50:54.653 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-29 03:50:54.653 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-29 03:50:54.753  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-29 03:50:54.753  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-29 03:50:54.753 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-29 03:50:54.754 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-29 03:50:54.755  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-29 03:50:54.755  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-29 03:50:54.755 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-29 03:50:54.756 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-29 03:50:54.756 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-29 03:50:54.756 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-29 03:50:54.756 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-29 03:50:54.757 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-29 03:50:54.757 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-29 03:50:54.757 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-29 03:50:54.758 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-29 03:50:54.758 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-29 03:50:54.761 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 691401858031067711392878288988955447576498290090 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun May 29 01:55:53 UTC 2022 Final Date: Fri May 28 01:55:52 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [8c:f0:6a:13:e8:eb:aa:ef:f1:34:1e:fd:9e:da:9e:2f:60:7a:f5:96] modulus: d7127395cf2fa322973907a8ce0f142da6a8cf13864b4671b15e8f4d4d0e5fe723b4629866e476d4591d85145d8efe941a433caaaf680fdcbfc2e9721522325cd229e814ede0a8ccf811da064dd292dbf9741abb140667de0114ae68841838e37097049940d475e47a4bfb39e3d5b835cc00f11280109418c065fe17e69d163c11239ffd029b45b54b5e15fa0809de9c15c620e0555e135012b9a461f46e90e9164b3da25ca65175f97f8f2be8d57d15ccd7ae8797f421258b3f74e76495a32aba6657ee8ee45dfce68583f9ec5689b93de3484f932317b95134476dae541355b9c1f5493cb798f1e1adb4335d9ed4858480303dac9424a27e92574eef88ca07fac1fd6244a854ab07c093691b0ebe5985e48482a57bf4c6efb939af477bdb34f616637fe99dfcd4f380709fbf2ded2b4dd3305095ec11e208c82d9e45e6cf917e96c5ae5c52335b3eeded68b9108a702ebfc571761c06b43df415a116fc425104fd8ab370e2b99c6321710fb01b03dbbb08c1b88f86762a04019285786c4f85 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 21702629a568552283e6eaf88fe48813ac83e5ec 4719c072590982aaafd14c2e32a6a3b58ecbb7de e82b869c137b95db990384cf169c27c6639f5e8a 132a314a332c5f8b059c37da7b814242e5ca35f1 70dfc28f3b2c1b3154e5a0889d3b17a0a3439655 5d8f1f80a768c2b3762e6d4aa63cb93c189687af c327f71878c6d4518c019a3609b320b9ebc18f83 76c3f2a2d6fdcd66a45b342c1ab9091e14973e76 3b04aa856b31f6ecf9e46d1af131e041c6112678 506fe48dcab96b2e54ede306f9fc39d8db37707f 5d7aca3be0801b8ec26fd2904c6ee0c5a74c518f 2939b4e0a9bf652f8efafa569a6f8cf43f5868cd 3f830e0b42491c878a2b0bc114997ed6c2015503 ed3318089a6e8024137e0ef560ef1c934b65b33a 554eda3aa4e10cbae00b35fb834e0caba0a6b6f4 c32447a195694563852c0ac85b0ccfdecbfeb73f e3a3d15d6e8e6844c9c719e9f3a52b50f006cfca 8e07ce6818803f34bf23f24d23fc45b0d320587b 6d70421a8ed550025a25c00811732f027b169b10 ada4050f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c1:c8:dc:25:59:5f:b0:59:8e:98:b9:68:d4:75:9a:6d:be:8a:fd:e7] modulus: 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 public exponent: 10001 ] 2022-05-29 03:53:49.801  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-29 03:53:49.802 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-29 03:53:49.803 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-05-29 03:53:49.803 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-29 03:53:49.803  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-05-29 03:53:49.804  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-29 03:53:49.804  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-29 03:53:49.804 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-29 03:53:49.805 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-29 03:53:49.805 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-29 03:53:49.809 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-29 03:53:49.809 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-29 03:53:49.810 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-29 03:53:49.810 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-29 03:53:49.909  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-29 03:53:49.910  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-29 03:53:49.910 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-29 03:53:49.911 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-29 03:53:49.912  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-29 03:53:49.912  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-29 03:53:49.912 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-29 03:53:49.912 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-29 03:53:49.913 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-29 03:53:49.913 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-29 03:53:49.913 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-29 03:53:49.914 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-29 03:53:49.914 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-29 03:53:49.915 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-29 03:53:49.915 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-29 03:53:49.915 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-29 03:53:49.918 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 691401858031067711392878288988955447576498290090 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun May 29 01:55:53 UTC 2022 Final Date: Fri May 28 01:55:52 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [8c:f0:6a:13:e8:eb:aa:ef:f1:34:1e:fd:9e:da:9e:2f:60:7a:f5:96] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 21702629a568552283e6eaf88fe48813ac83e5ec 4719c072590982aaafd14c2e32a6a3b58ecbb7de e82b869c137b95db990384cf169c27c6639f5e8a 132a314a332c5f8b059c37da7b814242e5ca35f1 70dfc28f3b2c1b3154e5a0889d3b17a0a3439655 5d8f1f80a768c2b3762e6d4aa63cb93c189687af c327f71878c6d4518c019a3609b320b9ebc18f83 76c3f2a2d6fdcd66a45b342c1ab9091e14973e76 3b04aa856b31f6ecf9e46d1af131e041c6112678 506fe48dcab96b2e54ede306f9fc39d8db37707f 5d7aca3be0801b8ec26fd2904c6ee0c5a74c518f 2939b4e0a9bf652f8efafa569a6f8cf43f5868cd 3f830e0b42491c878a2b0bc114997ed6c2015503 ed3318089a6e8024137e0ef560ef1c934b65b33a 554eda3aa4e10cbae00b35fb834e0caba0a6b6f4 c32447a195694563852c0ac85b0ccfdecbfeb73f e3a3d15d6e8e6844c9c719e9f3a52b50f006cfca 8e07ce6818803f34bf23f24d23fc45b0d320587b 6d70421a8ed550025a25c00811732f027b169b10 ada4050f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [19:15:ab:9d:f0:da:0d:a9:4e:7d:a6:5b:84:e5:8c:1a:6b:cb:aa:88] modulus: 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 public exponent: 10001 ] 2022-05-29 03:58:27.584  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-29 03:58:27.585 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-29 03:58:27.586 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-29 03:58:27.587 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-29 03:58:27.587  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-29 03:58:27.587  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-29 03:58:27.588  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-29 03:58:27.588 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-29 03:58:27.588 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-29 03:58:27.589 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-29 03:58:27.592 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-29 03:58:27.593 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-29 03:58:27.593 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-29 03:58:27.593 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-29 03:58:27.680  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-29 03:58:27.680  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-29 03:58:27.681 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-29 03:58:27.681 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-29 03:58:27.682  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-29 03:58:27.683  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-29 03:58:27.683 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-29 03:58:27.683 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-29 03:58:27.684 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-29 03:58:27.684 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-29 03:58:27.684 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-29 03:58:27.685 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-29 03:58:27.685 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-29 03:58:27.686 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-29 03:58:27.686 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-29 03:58:27.686 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-29 03:58:27.689 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 691401858031067711392878288988955447576498290090 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun May 29 01:55:53 UTC 2022 Final Date: Fri May 28 01:55:52 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [8c:f0:6a:13:e8:eb:aa:ef:f1:34:1e:fd:9e:da:9e:2f:60:7a:f5:96] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 21702629a568552283e6eaf88fe48813ac83e5ec 4719c072590982aaafd14c2e32a6a3b58ecbb7de e82b869c137b95db990384cf169c27c6639f5e8a 132a314a332c5f8b059c37da7b814242e5ca35f1 70dfc28f3b2c1b3154e5a0889d3b17a0a3439655 5d8f1f80a768c2b3762e6d4aa63cb93c189687af c327f71878c6d4518c019a3609b320b9ebc18f83 76c3f2a2d6fdcd66a45b342c1ab9091e14973e76 3b04aa856b31f6ecf9e46d1af131e041c6112678 506fe48dcab96b2e54ede306f9fc39d8db37707f 5d7aca3be0801b8ec26fd2904c6ee0c5a74c518f 2939b4e0a9bf652f8efafa569a6f8cf43f5868cd 3f830e0b42491c878a2b0bc114997ed6c2015503 ed3318089a6e8024137e0ef560ef1c934b65b33a 554eda3aa4e10cbae00b35fb834e0caba0a6b6f4 c32447a195694563852c0ac85b0ccfdecbfeb73f e3a3d15d6e8e6844c9c719e9f3a52b50f006cfca 8e07ce6818803f34bf23f24d23fc45b0d320587b 6d70421a8ed550025a25c00811732f027b169b10 ada4050f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5c:df:68:ef:97:4c:c3:98:9a:de:1b:da:92:df:63:e9:a4:7b:c5:cf] modulus: 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 public exponent: 10001 ] 2022-05-29 04:09:56.315  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-29 04:09:56.317 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-29 04:09:56.318 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-29 04:09:56.319 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-29 04:09:56.319  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-29 04:09:56.320  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-29 04:09:56.320  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-29 04:09:56.321 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-29 04:09:56.321 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-29 04:09:56.321 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-29 04:09:56.326 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-29 04:09:56.326 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-29 04:09:56.327 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-29 04:09:56.327 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-29 04:09:56.411  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-29 04:09:56.412  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-29 04:09:56.412 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-29 04:09:56.412 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-29 04:09:56.413  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-29 04:09:56.414  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-29 04:09:56.414 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-29 04:09:56.415 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-29 04:09:56.415 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-29 04:09:56.416 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-29 04:09:56.416 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-29 04:09:56.416 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-29 04:09:56.417 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-29 04:09:56.417 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-29 04:09:56.418 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-29 04:09:56.419 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-29 04:09:56.423 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 691401858031067711392878288988955447576498290090 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun May 29 01:55:53 UTC 2022 Final Date: Fri May 28 01:55:52 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [8c:f0:6a:13:e8:eb:aa:ef:f1:34:1e:fd:9e:da:9e:2f:60:7a:f5:96] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 21702629a568552283e6eaf88fe48813ac83e5ec 4719c072590982aaafd14c2e32a6a3b58ecbb7de e82b869c137b95db990384cf169c27c6639f5e8a 132a314a332c5f8b059c37da7b814242e5ca35f1 70dfc28f3b2c1b3154e5a0889d3b17a0a3439655 5d8f1f80a768c2b3762e6d4aa63cb93c189687af c327f71878c6d4518c019a3609b320b9ebc18f83 76c3f2a2d6fdcd66a45b342c1ab9091e14973e76 3b04aa856b31f6ecf9e46d1af131e041c6112678 506fe48dcab96b2e54ede306f9fc39d8db37707f 5d7aca3be0801b8ec26fd2904c6ee0c5a74c518f 2939b4e0a9bf652f8efafa569a6f8cf43f5868cd 3f830e0b42491c878a2b0bc114997ed6c2015503 ed3318089a6e8024137e0ef560ef1c934b65b33a 554eda3aa4e10cbae00b35fb834e0caba0a6b6f4 c32447a195694563852c0ac85b0ccfdecbfeb73f e3a3d15d6e8e6844c9c719e9f3a52b50f006cfca 8e07ce6818803f34bf23f24d23fc45b0d320587b 6d70421a8ed550025a25c00811732f027b169b10 ada4050f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b4:5d:37:33:37:b7:e2:85:e9:a0:66:26:fb:f7:26:55:f9:93:69:64] modulus: 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 public exponent: 10001 ] 2022-05-29 04:13:17.516  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-29 04:13:17.517 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-29 04:13:17.517 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-05-29 04:13:17.518 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-29 04:13:17.518  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-05-29 04:13:17.518  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-29 04:13:17.519  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-29 04:13:17.519 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-29 04:13:17.519 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-29 04:13:17.519 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-29 04:13:17.523 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-29 04:13:17.523 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-29 04:13:17.524 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-29 04:13:17.524 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-29 04:13:17.616  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-29 04:13:17.617  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-29 04:13:17.617 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-29 04:13:17.617 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-29 04:13:17.618  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-29 04:13:17.618  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-29 04:13:17.619 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-29 04:13:17.619 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-29 04:13:17.619 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-29 04:13:17.620 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-29 04:13:17.620 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-29 04:13:17.620 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-29 04:13:17.620 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-29 04:13:17.621 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-29 04:13:17.621 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-29 04:13:17.621 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-29 04:13:17.624 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 691401858031067711392878288988955447576498290090 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun May 29 01:55:53 UTC 2022 Final Date: Fri May 28 01:55:52 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [8c:f0:6a:13:e8:eb:aa:ef:f1:34:1e:fd:9e:da:9e:2f:60:7a:f5:96] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 21702629a568552283e6eaf88fe48813ac83e5ec 4719c072590982aaafd14c2e32a6a3b58ecbb7de e82b869c137b95db990384cf169c27c6639f5e8a 132a314a332c5f8b059c37da7b814242e5ca35f1 70dfc28f3b2c1b3154e5a0889d3b17a0a3439655 5d8f1f80a768c2b3762e6d4aa63cb93c189687af c327f71878c6d4518c019a3609b320b9ebc18f83 76c3f2a2d6fdcd66a45b342c1ab9091e14973e76 3b04aa856b31f6ecf9e46d1af131e041c6112678 506fe48dcab96b2e54ede306f9fc39d8db37707f 5d7aca3be0801b8ec26fd2904c6ee0c5a74c518f 2939b4e0a9bf652f8efafa569a6f8cf43f5868cd 3f830e0b42491c878a2b0bc114997ed6c2015503 ed3318089a6e8024137e0ef560ef1c934b65b33a 554eda3aa4e10cbae00b35fb834e0caba0a6b6f4 c32447a195694563852c0ac85b0ccfdecbfeb73f e3a3d15d6e8e6844c9c719e9f3a52b50f006cfca 8e07ce6818803f34bf23f24d23fc45b0d320587b 6d70421a8ed550025a25c00811732f027b169b10 ada4050f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8c:54:2b:0a:71:74:ba:df:ec:c0:08:ee:3b:ea:d0:21:a5:9f:80:58] modulus: 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 public exponent: 10001 ] 2022-05-29 04:21:24.891  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-29 04:21:24.892 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-29 04:21:24.894 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-29 04:21:24.894 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-29 04:21:24.894  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-29 04:21:24.895  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-29 04:21:24.895  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-29 04:21:24.895 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-29 04:21:24.895 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-29 04:21:24.896 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-29 04:21:24.900 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-29 04:21:24.900 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-29 04:21:24.900 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-29 04:21:24.900 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-29 04:21:24.980  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-29 04:21:24.981  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-29 04:21:24.981 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-29 04:21:24.981 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-29 04:21:24.982  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-29 04:21:24.982  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-29 04:21:24.982 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-29 04:21:24.983 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-29 04:21:24.983 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-29 04:21:24.983 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-29 04:21:24.983 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-29 04:21:24.983 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-29 04:21:24.984 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-29 04:21:24.984 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-29 04:21:24.984 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-29 04:21:24.985 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-29 04:21:24.987 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 691401858031067711392878288988955447576498290090 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun May 29 01:55:53 UTC 2022 Final Date: Fri May 28 01:55:52 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [8c:f0:6a:13:e8:eb:aa:ef:f1:34:1e:fd:9e:da:9e:2f:60:7a:f5:96] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 21702629a568552283e6eaf88fe48813ac83e5ec 4719c072590982aaafd14c2e32a6a3b58ecbb7de e82b869c137b95db990384cf169c27c6639f5e8a 132a314a332c5f8b059c37da7b814242e5ca35f1 70dfc28f3b2c1b3154e5a0889d3b17a0a3439655 5d8f1f80a768c2b3762e6d4aa63cb93c189687af c327f71878c6d4518c019a3609b320b9ebc18f83 76c3f2a2d6fdcd66a45b342c1ab9091e14973e76 3b04aa856b31f6ecf9e46d1af131e041c6112678 506fe48dcab96b2e54ede306f9fc39d8db37707f 5d7aca3be0801b8ec26fd2904c6ee0c5a74c518f 2939b4e0a9bf652f8efafa569a6f8cf43f5868cd 3f830e0b42491c878a2b0bc114997ed6c2015503 ed3318089a6e8024137e0ef560ef1c934b65b33a 554eda3aa4e10cbae00b35fb834e0caba0a6b6f4 c32447a195694563852c0ac85b0ccfdecbfeb73f e3a3d15d6e8e6844c9c719e9f3a52b50f006cfca 8e07ce6818803f34bf23f24d23fc45b0d320587b 6d70421a8ed550025a25c00811732f027b169b10 ada4050f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c9:b1:1d:92:ba:36:d0:7b:19:b6:5f:99:28:e2:e5:f4:ed:84:fe:33] modulus: b7eecd84e5e1ee97f443d0c237a1e9ed29b1fcecd9347165a4a672ff6790d24250d7aafb15c675cd11df35fa145e017797458f2bdcd1deb95edb3465a78cff6e6ae0b2cbd40a508ddb669e78c783f6a9190e00d545d13989f8766c51ae0f161dfe5914b478fec90d766b377d7253db94c02956a27995e794b8229cda70a1201d72b6d937af3f40fea4c84203a22b9b927461684ad6c4b31ba288dea807dcd8f61303257cbc0fc44c90d19c3d4bb65633d1e16bc006f66e11b6b7168fd9435210164e83ee9394eb7c76dc79b9db3c58aa125940603dc62ca29db86600264dd70b48e238fbd1cbc8a4da2e143148a10a2f5c9a4150428731c5617e732e627dc145 public exponent: 10001 ] 2022-05-29 04:22:51.752  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-29 04:22:51.753 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-29 04:22:51.754 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-05-29 04:22:51.755 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-29 04:22:51.755  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-05-29 04:22:51.755  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-29 04:22:51.755  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-29 04:22:51.755 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-29 04:22:51.756 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-29 04:22:51.756 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-29 04:22:51.759 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-29 04:22:51.760 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-29 04:22:51.760 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-29 04:22:51.760 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-29 04:22:51.856  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-29 04:22:51.857  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-29 04:22:51.857 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-29 04:22:51.857 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-29 04:22:51.858  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-29 04:22:51.858  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-29 04:22:51.858 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-29 04:22:51.859 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-29 04:22:51.859 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-29 04:22:51.859 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-29 04:22:51.859 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-29 04:22:51.859 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-29 04:22:51.860 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-29 04:22:51.860 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-29 04:22:51.860 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-29 04:22:51.861 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-29 04:22:51.863 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 691401858031067711392878288988955447576498290090 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun May 29 01:55:53 UTC 2022 Final Date: Fri May 28 01:55:52 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [8c:f0:6a:13:e8:eb:aa:ef:f1:34:1e:fd:9e:da:9e:2f:60:7a:f5:96] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 21702629a568552283e6eaf88fe48813ac83e5ec 4719c072590982aaafd14c2e32a6a3b58ecbb7de e82b869c137b95db990384cf169c27c6639f5e8a 132a314a332c5f8b059c37da7b814242e5ca35f1 70dfc28f3b2c1b3154e5a0889d3b17a0a3439655 5d8f1f80a768c2b3762e6d4aa63cb93c189687af c327f71878c6d4518c019a3609b320b9ebc18f83 76c3f2a2d6fdcd66a45b342c1ab9091e14973e76 3b04aa856b31f6ecf9e46d1af131e041c6112678 506fe48dcab96b2e54ede306f9fc39d8db37707f 5d7aca3be0801b8ec26fd2904c6ee0c5a74c518f 2939b4e0a9bf652f8efafa569a6f8cf43f5868cd 3f830e0b42491c878a2b0bc114997ed6c2015503 ed3318089a6e8024137e0ef560ef1c934b65b33a 554eda3aa4e10cbae00b35fb834e0caba0a6b6f4 c32447a195694563852c0ac85b0ccfdecbfeb73f e3a3d15d6e8e6844c9c719e9f3a52b50f006cfca 8e07ce6818803f34bf23f24d23fc45b0d320587b 6d70421a8ed550025a25c00811732f027b169b10 ada4050f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7a:90:6e:2c:b8:b9:fd:f2:ca:28:84:d6:c3:5b:7a:46:51:86:1a:66] modulus: 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 public exponent: 10001 ] 2022-05-29 04:24:26.852  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-29 04:24:26.853 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-29 04:24:26.854 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-05-29 04:24:26.854 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-29 04:24:26.854  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-05-29 04:24:26.854  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-29 04:24:26.855  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-29 04:24:26.855 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-29 04:24:26.855 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-29 04:24:26.855 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-29 04:24:26.861 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-29 04:24:26.862 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-29 04:24:26.862 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-29 04:24:26.862 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-29 04:24:26.948  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-29 04:24:26.948  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-29 04:24:26.948 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-29 04:24:26.949 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-29 04:24:26.950  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-29 04:24:26.950  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-29 04:24:26.950 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-29 04:24:26.950 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-29 04:24:26.951 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-29 04:24:26.951 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-29 04:24:26.951 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-29 04:24:26.951 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-29 04:24:26.952 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-29 04:24:26.952 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-29 04:24:26.952 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-29 04:24:26.953 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-29 04:24:26.958 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 691401858031067711392878288988955447576498290090 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun May 29 01:55:53 UTC 2022 Final Date: Fri May 28 01:55:52 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [8c:f0:6a:13:e8:eb:aa:ef:f1:34:1e:fd:9e:da:9e:2f:60:7a:f5:96] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 21702629a568552283e6eaf88fe48813ac83e5ec 4719c072590982aaafd14c2e32a6a3b58ecbb7de e82b869c137b95db990384cf169c27c6639f5e8a 132a314a332c5f8b059c37da7b814242e5ca35f1 70dfc28f3b2c1b3154e5a0889d3b17a0a3439655 5d8f1f80a768c2b3762e6d4aa63cb93c189687af c327f71878c6d4518c019a3609b320b9ebc18f83 76c3f2a2d6fdcd66a45b342c1ab9091e14973e76 3b04aa856b31f6ecf9e46d1af131e041c6112678 506fe48dcab96b2e54ede306f9fc39d8db37707f 5d7aca3be0801b8ec26fd2904c6ee0c5a74c518f 2939b4e0a9bf652f8efafa569a6f8cf43f5868cd 3f830e0b42491c878a2b0bc114997ed6c2015503 ed3318089a6e8024137e0ef560ef1c934b65b33a 554eda3aa4e10cbae00b35fb834e0caba0a6b6f4 c32447a195694563852c0ac85b0ccfdecbfeb73f e3a3d15d6e8e6844c9c719e9f3a52b50f006cfca 8e07ce6818803f34bf23f24d23fc45b0d320587b 6d70421a8ed550025a25c00811732f027b169b10 ada4050f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e9:7c:08:69:c7:64:cb:4c:d5:f4:e6:28:84:de:0f:6d:5a:2d:2c:86] modulus: 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 public exponent: 10001 ] 2022-05-29 04:28:41.162  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-29 04:28:41.163 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-29 04:28:41.163 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-29 04:28:41.164 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-29 04:28:41.164  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-29 04:28:41.164  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-29 04:28:41.165  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-29 04:28:41.165 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-29 04:28:41.165 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-29 04:28:41.165 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-29 04:28:41.169 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-29 04:28:41.169 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-29 04:28:41.169 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-29 04:28:41.169 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-29 04:28:41.251  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-29 04:28:41.252  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-29 04:28:41.252 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-29 04:28:41.252 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-29 04:28:41.253  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-29 04:28:41.253  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-29 04:28:41.254 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-29 04:28:41.254 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-29 04:28:41.254 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-29 04:28:41.254 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-29 04:28:41.255 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-29 04:28:41.255 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-29 04:28:41.255 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-29 04:28:41.255 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-29 04:28:41.255 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-29 04:28:41.256 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-29 04:28:41.258 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 691401858031067711392878288988955447576498290090 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun May 29 01:55:53 UTC 2022 Final Date: Fri May 28 01:55:52 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [8c:f0:6a:13:e8:eb:aa:ef:f1:34:1e:fd:9e:da:9e:2f:60:7a:f5:96] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 21702629a568552283e6eaf88fe48813ac83e5ec 4719c072590982aaafd14c2e32a6a3b58ecbb7de e82b869c137b95db990384cf169c27c6639f5e8a 132a314a332c5f8b059c37da7b814242e5ca35f1 70dfc28f3b2c1b3154e5a0889d3b17a0a3439655 5d8f1f80a768c2b3762e6d4aa63cb93c189687af c327f71878c6d4518c019a3609b320b9ebc18f83 76c3f2a2d6fdcd66a45b342c1ab9091e14973e76 3b04aa856b31f6ecf9e46d1af131e041c6112678 506fe48dcab96b2e54ede306f9fc39d8db37707f 5d7aca3be0801b8ec26fd2904c6ee0c5a74c518f 2939b4e0a9bf652f8efafa569a6f8cf43f5868cd 3f830e0b42491c878a2b0bc114997ed6c2015503 ed3318089a6e8024137e0ef560ef1c934b65b33a 554eda3aa4e10cbae00b35fb834e0caba0a6b6f4 c32447a195694563852c0ac85b0ccfdecbfeb73f e3a3d15d6e8e6844c9c719e9f3a52b50f006cfca 8e07ce6818803f34bf23f24d23fc45b0d320587b 6d70421a8ed550025a25c00811732f027b169b10 ada4050f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e8:da:2f:2e:4a:80:e6:1f:cc:9a:9c:74:da:6e:a3:7c:35:ac:e9:3f] modulus: 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 public exponent: 10001 ] 2022-05-29 04:37:58.334  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-29 04:37:58.335 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-29 04:37:58.337 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-29 04:37:58.337 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-29 04:37:58.338  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-29 04:37:58.338  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-29 04:37:58.338  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-29 04:37:58.339 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-29 04:37:58.339 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-29 04:37:58.339 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-29 04:37:58.343 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-29 04:37:58.343 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-29 04:37:58.344 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-29 04:37:58.344 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-29 04:37:58.421  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-29 04:37:58.421  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-29 04:37:58.422 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-29 04:37:58.422 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-29 04:37:58.423  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-29 04:37:58.423  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-29 04:37:58.423 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-29 04:37:58.423 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-29 04:37:58.423 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-29 04:37:58.424 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-29 04:37:58.424 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-29 04:37:58.424 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-29 04:37:58.425 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-29 04:37:58.425 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-29 04:37:58.425 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-29 04:37:58.425 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-29 04:37:58.428 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 691401858031067711392878288988955447576498290090 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun May 29 01:55:53 UTC 2022 Final Date: Fri May 28 01:55:52 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [8c:f0:6a:13:e8:eb:aa:ef:f1:34:1e:fd:9e:da:9e:2f:60:7a:f5:96] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 21702629a568552283e6eaf88fe48813ac83e5ec 4719c072590982aaafd14c2e32a6a3b58ecbb7de e82b869c137b95db990384cf169c27c6639f5e8a 132a314a332c5f8b059c37da7b814242e5ca35f1 70dfc28f3b2c1b3154e5a0889d3b17a0a3439655 5d8f1f80a768c2b3762e6d4aa63cb93c189687af c327f71878c6d4518c019a3609b320b9ebc18f83 76c3f2a2d6fdcd66a45b342c1ab9091e14973e76 3b04aa856b31f6ecf9e46d1af131e041c6112678 506fe48dcab96b2e54ede306f9fc39d8db37707f 5d7aca3be0801b8ec26fd2904c6ee0c5a74c518f 2939b4e0a9bf652f8efafa569a6f8cf43f5868cd 3f830e0b42491c878a2b0bc114997ed6c2015503 ed3318089a6e8024137e0ef560ef1c934b65b33a 554eda3aa4e10cbae00b35fb834e0caba0a6b6f4 c32447a195694563852c0ac85b0ccfdecbfeb73f e3a3d15d6e8e6844c9c719e9f3a52b50f006cfca 8e07ce6818803f34bf23f24d23fc45b0d320587b 6d70421a8ed550025a25c00811732f027b169b10 ada4050f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [31:36:e3:f9:65:b7:c3:a7:37:08:a4:27:b9:47:6f:30:e5:4e:4a:6a] modulus: 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 public exponent: 10001 ] 2022-05-29 04:44:46.609  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-29 04:44:46.610 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-29 04:44:46.611 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-05-29 04:44:46.611 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-29 04:44:46.611  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-05-29 04:44:46.612  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-29 04:44:46.612  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-29 04:44:46.612 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-29 04:44:46.612 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-29 04:44:46.612 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-29 04:44:46.616 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-29 04:44:46.616 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-29 04:44:46.617 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-29 04:44:46.617 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-29 04:44:46.710  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-29 04:44:46.711  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-29 04:44:46.711 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-29 04:44:46.711 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-29 04:44:46.712  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-29 04:44:46.712  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-29 04:44:46.713 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-29 04:44:46.713 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-29 04:44:46.713 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-29 04:44:46.713 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-29 04:44:46.713 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-29 04:44:46.713 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-29 04:44:46.714 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-29 04:44:46.714 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-29 04:44:46.714 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-29 04:44:46.715 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-29 04:44:46.717 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 691401858031067711392878288988955447576498290090 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun May 29 01:55:53 UTC 2022 Final Date: Fri May 28 01:55:52 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [8c:f0:6a:13:e8:eb:aa:ef:f1:34:1e:fd:9e:da:9e:2f:60:7a:f5:96] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 21702629a568552283e6eaf88fe48813ac83e5ec 4719c072590982aaafd14c2e32a6a3b58ecbb7de e82b869c137b95db990384cf169c27c6639f5e8a 132a314a332c5f8b059c37da7b814242e5ca35f1 70dfc28f3b2c1b3154e5a0889d3b17a0a3439655 5d8f1f80a768c2b3762e6d4aa63cb93c189687af c327f71878c6d4518c019a3609b320b9ebc18f83 76c3f2a2d6fdcd66a45b342c1ab9091e14973e76 3b04aa856b31f6ecf9e46d1af131e041c6112678 506fe48dcab96b2e54ede306f9fc39d8db37707f 5d7aca3be0801b8ec26fd2904c6ee0c5a74c518f 2939b4e0a9bf652f8efafa569a6f8cf43f5868cd 3f830e0b42491c878a2b0bc114997ed6c2015503 ed3318089a6e8024137e0ef560ef1c934b65b33a 554eda3aa4e10cbae00b35fb834e0caba0a6b6f4 c32447a195694563852c0ac85b0ccfdecbfeb73f e3a3d15d6e8e6844c9c719e9f3a52b50f006cfca 8e07ce6818803f34bf23f24d23fc45b0d320587b 6d70421a8ed550025a25c00811732f027b169b10 ada4050f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5e:e7:b5:7d:40:b7:fe:09:41:f7:6c:0b:b1:be:f1:75:c2:6f:b6:89] modulus: 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 public exponent: 10001 ] 2022-05-29 04:45:55.832  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-29 04:45:55.833 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-29 04:45:55.834 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-05-29 04:45:55.834 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-29 04:45:55.834  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-05-29 04:45:55.834  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-29 04:45:55.835  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-29 04:45:55.835 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-29 04:45:55.835 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-29 04:45:55.835 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-29 04:45:55.839 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-29 04:45:55.839 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-29 04:45:55.839 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-29 04:45:55.839 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-29 04:45:55.928  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-29 04:45:55.928  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-29 04:45:55.928 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-29 04:45:55.928 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-29 04:45:55.929  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-29 04:45:55.929  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-29 04:45:55.929 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-29 04:45:55.930 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-29 04:45:55.930 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-29 04:45:55.930 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-29 04:45:55.930 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-29 04:45:55.930 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-29 04:45:55.931 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-29 04:45:55.931 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-29 04:45:55.931 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-29 04:45:55.931 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-29 04:45:55.934 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 691401858031067711392878288988955447576498290090 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun May 29 01:55:53 UTC 2022 Final Date: Fri May 28 01:55:52 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [8c:f0:6a:13:e8:eb:aa:ef:f1:34:1e:fd:9e:da:9e:2f:60:7a:f5:96] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 21702629a568552283e6eaf88fe48813ac83e5ec 4719c072590982aaafd14c2e32a6a3b58ecbb7de e82b869c137b95db990384cf169c27c6639f5e8a 132a314a332c5f8b059c37da7b814242e5ca35f1 70dfc28f3b2c1b3154e5a0889d3b17a0a3439655 5d8f1f80a768c2b3762e6d4aa63cb93c189687af c327f71878c6d4518c019a3609b320b9ebc18f83 76c3f2a2d6fdcd66a45b342c1ab9091e14973e76 3b04aa856b31f6ecf9e46d1af131e041c6112678 506fe48dcab96b2e54ede306f9fc39d8db37707f 5d7aca3be0801b8ec26fd2904c6ee0c5a74c518f 2939b4e0a9bf652f8efafa569a6f8cf43f5868cd 3f830e0b42491c878a2b0bc114997ed6c2015503 ed3318089a6e8024137e0ef560ef1c934b65b33a 554eda3aa4e10cbae00b35fb834e0caba0a6b6f4 c32447a195694563852c0ac85b0ccfdecbfeb73f e3a3d15d6e8e6844c9c719e9f3a52b50f006cfca 8e07ce6818803f34bf23f24d23fc45b0d320587b 6d70421a8ed550025a25c00811732f027b169b10 ada4050f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [42:24:53:19:94:97:e6:42:14:d6:b3:77:a9:ac:e5:0a:41:96:c2:5f] modulus: dd471a188e7bc7be6f9905984b5c5e14004d5e3948fae84a29737375c7eb1d79d7a088c4d7f13752df08ead99f999b8b8cfa2574cd6e99d3e44633b8026604d3b81f49294ef4d357922d07691d0b1a546bf667b148848d8dcb1c4272ff79066b14b200a16f5cde826727dd8ed7ea0e76e4e3b6bf04f8f1089d9950f4766ec993ed3664a7fc05975d22690fa91cf4a8fee29d3ecb0b7a0fee7bdfeab8c22237265421844315c37a27d205f4bd45b735f2dfadc8c8ef6dd4a0b360dd94710b55fac2d5a992d2f48f1f67baf46d5843f20eacbc027b79088d3e89838ba2629f1b8dc186279e4df199beac4ab2673413cb86c8a3824a43098314ec9e927a856fa4eb public exponent: 10001 ] 2022-05-29 04:47:08.108  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-05-29 04:47:08.109 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-05-29 04:47:08.110 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-29 04:47:08.110 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-05-29 04:47:08.110  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-05-29 04:47:08.111  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-05-29 04:47:08.111  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-05-29 04:47:08.111 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-05-29 04:47:08.111 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-05-29 04:47:08.112 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-05-29 04:47:08.115 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-05-29 04:47:08.116 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-29 04:47:08.116 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-05-29 04:47:08.116 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-29 04:47:08.200  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-05-29 04:47:08.200  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-05-29 04:47:08.201 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-05-29 04:47:08.201 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-05-29 04:47:08.202  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-05-29 04:47:08.202  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-05-29 04:47:08.202 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-29 04:47:08.202 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-29 04:47:08.202 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-29 04:47:08.203 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-29 04:47:08.203 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-29 04:47:08.203 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-29 04:47:08.203 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-05-29 04:47:08.203 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-05-29 04:47:08.204 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-05-29 04:47:08.204 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-05-29 04:47:08.206 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 691401858031067711392878288988955447576498290090 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun May 29 01:55:53 UTC 2022 Final Date: Fri May 28 01:55:52 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [8c:f0:6a:13:e8:eb:aa:ef:f1:34:1e:fd:9e:da:9e:2f:60:7a:f5:96] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 21702629a568552283e6eaf88fe48813ac83e5ec 4719c072590982aaafd14c2e32a6a3b58ecbb7de e82b869c137b95db990384cf169c27c6639f5e8a 132a314a332c5f8b059c37da7b814242e5ca35f1 70dfc28f3b2c1b3154e5a0889d3b17a0a3439655 5d8f1f80a768c2b3762e6d4aa63cb93c189687af c327f71878c6d4518c019a3609b320b9ebc18f83 76c3f2a2d6fdcd66a45b342c1ab9091e14973e76 3b04aa856b31f6ecf9e46d1af131e041c6112678 506fe48dcab96b2e54ede306f9fc39d8db37707f 5d7aca3be0801b8ec26fd2904c6ee0c5a74c518f 2939b4e0a9bf652f8efafa569a6f8cf43f5868cd 3f830e0b42491c878a2b0bc114997ed6c2015503 ed3318089a6e8024137e0ef560ef1c934b65b33a 554eda3aa4e10cbae00b35fb834e0caba0a6b6f4 c32447a195694563852c0ac85b0ccfdecbfeb73f e3a3d15d6e8e6844c9c719e9f3a52b50f006cfca 8e07ce6818803f34bf23f24d23fc45b0d320587b 6d70421a8ed550025a25c00811732f027b169b10 ada4050f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c9:3d:52:9f:75:0a:ee:3c:e6:20:63:3b:2d:79:5e:3a:06:83:0b:7a] modulus: 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 public exponent: 10001 ]