2022-06-20 02:32:06,354 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-06-20 02:32:11,144 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-06-20 02:32:14.051  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Jun 20, 2022 2:32:23 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jun 20, 2022 2:32:23 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jun 20, 2022 2:32:23 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jun 20, 2022 2:32:24 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-06-20 02:32:26.349 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-06-20 02:32:27.831  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-06-20 02:32:28.353  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-06-20 02:32:31.837 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-06-20 02:32:31.839 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-06-20 02:32:31.840 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-06-20 02:32:31.932 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-06-20 02:32:32.141 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-06-20 02:32:32.144 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-06-20 02:32:32.738 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-06-20 02:32:38.242 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jun 20, 2022 2:32:42 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-06-20 02:32:43.447  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 40.597 seconds (JVM running for 48.227) Jun 20, 2022 2:32:53 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-06-20 02:33:39.131  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-20 02:33:39.140 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-20 02:33:39.352 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-06-20 02:33:39.355 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-20 02:33:39.440  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-06-20 02:33:39.443  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-20 02:33:39.444  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-20 02:33:39.445 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-20 02:33:39.445 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-20 02:33:39.532 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-20 02:33:39.543 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-20 02:33:39.630 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-20 02:33:39.750 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-20 02:33:39.831 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-20 02:33:39.833 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-20 02:33:39.839 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-20 02:33:41.243  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-20 02:33:41.245  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-20 02:33:41.245 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-20 02:33:41.247 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-20 02:33:41.254  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-20 02:33:41.255  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-20 02:33:41.255 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-20 02:33:41.256 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-20 02:33:41.256 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-20 02:33:41.343 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-20 02:33:41.344 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-20 02:33:41.344 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-20 02:33:41.349 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-20 02:33:41.349 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-20 02:33:41.349 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-20 02:33:41.350 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-20 02:33:41.549 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 641487588505485877865294967011549807342749201683 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jun 20 02:28:24 UTC 2022 Final Date: Sat Jun 19 02:28:23 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [81:6d:99:bf:84:29:86:3f:f8:f2:24:15:a3:38:bf:c0:bb:a6:3c:e1] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 50a3eaf829f3c66260de210dce9ee7b32db3ad34 d52ba657dfda9d8b434f593248dfbdc45563577b a3cff8b32761aea10e4899592126ab11e6359e32 162cf998b25622c339afbd46d54d20011b312b1e ad46d9b00bd7a13649fdb821462c946210c8af88 b97f502b6b01bb0e925b1f079685656b3ae22cd1 f8121bc351fff8c9337b2452f53bd93f05285819 4ec6008ca9eb02648617f7ce30442bd895cb3faa 58b327cd99c070eed6f59d4f03423c2642af7941 87f11232f6015b54f656496d6f7f1a68313d9497 1df68697203069c54f7488818b5e51c0088a1ad5 44d87c3c46f7e9608d19dbdfa403d9a4e4cdb531 4a867f2b07a496e710dfac592af8ebf3276b8365 06cae321638af27c015ba4fe682321b805399991 45a23d805ead965605d78de9572d24f0a0cd688a d389b4cbdf8854b52234ca2e37bf5111af43c6ea 9a08dc5b0f698286f4c957f7a7ebfc88fe3c037e 5f0da9ab47863215aae735bfc2774b13adba900e 99bc94c5b3dd4c1e18e3eefaac57dd30233e6819 845c11b9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c9:80:81:43:41:1d:21:94:05:82:84:5f:f0:7f:ca:6b:f2:e5:5b:e1] modulus: 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 public exponent: 10001 ] 2022-06-20 04:57:49.147  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-20 04:57:49.148 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-20 04:57:49.150 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-20 04:57:49.151 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-20 04:57:49.152  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-20 04:57:49.153  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-20 04:57:49.153  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-20 04:57:49.153 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-20 04:57:49.154 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-20 04:57:49.154 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-20 04:57:49.161 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-20 04:57:49.162 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-20 04:57:49.230 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-20 04:57:49.231 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-20 04:57:49.393  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-20 04:57:49.394  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-20 04:57:49.394 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-20 04:57:49.394 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-20 04:57:49.434  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-20 04:57:49.435  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-20 04:57:49.436 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-20 04:57:49.436 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-20 04:57:49.436 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-20 04:57:49.438 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-20 04:57:49.438 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-20 04:57:49.439 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-20 04:57:49.439 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-20 04:57:49.440 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-20 04:57:49.440 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-20 04:57:49.441 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-20 04:57:49.445 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 641487588505485877865294967011549807342749201683 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jun 20 02:28:24 UTC 2022 Final Date: Sat Jun 19 02:28:23 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [81:6d:99:bf:84:29:86:3f:f8:f2:24:15:a3:38:bf:c0:bb:a6:3c:e1] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 50a3eaf829f3c66260de210dce9ee7b32db3ad34 d52ba657dfda9d8b434f593248dfbdc45563577b a3cff8b32761aea10e4899592126ab11e6359e32 162cf998b25622c339afbd46d54d20011b312b1e ad46d9b00bd7a13649fdb821462c946210c8af88 b97f502b6b01bb0e925b1f079685656b3ae22cd1 f8121bc351fff8c9337b2452f53bd93f05285819 4ec6008ca9eb02648617f7ce30442bd895cb3faa 58b327cd99c070eed6f59d4f03423c2642af7941 87f11232f6015b54f656496d6f7f1a68313d9497 1df68697203069c54f7488818b5e51c0088a1ad5 44d87c3c46f7e9608d19dbdfa403d9a4e4cdb531 4a867f2b07a496e710dfac592af8ebf3276b8365 06cae321638af27c015ba4fe682321b805399991 45a23d805ead965605d78de9572d24f0a0cd688a d389b4cbdf8854b52234ca2e37bf5111af43c6ea 9a08dc5b0f698286f4c957f7a7ebfc88fe3c037e 5f0da9ab47863215aae735bfc2774b13adba900e 99bc94c5b3dd4c1e18e3eefaac57dd30233e6819 845c11b9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [69:1f:0b:a8:a1:d8:e0:a7:59:71:bf:30:e8:54:01:89:82:17:28:7b] modulus: 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 public exponent: 10001 ] 2022-06-20 05:02:07.439  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-20 05:02:07.441 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-20 05:02:07.444 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-20 05:02:07.445 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-20 05:02:07.446  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-20 05:02:07.446  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-20 05:02:07.446  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-20 05:02:07.447 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-20 05:02:07.447 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-20 05:02:07.447 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-20 05:02:07.453 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-20 05:02:07.453 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-20 05:02:07.453 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-20 05:02:07.454 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-20 05:02:07.651  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-20 05:02:07.652  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-20 05:02:07.652 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-20 05:02:07.652 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-20 05:02:07.654  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-20 05:02:07.655  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-20 05:02:07.655 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-20 05:02:07.655 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-20 05:02:07.655 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-20 05:02:07.656 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-20 05:02:07.656 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-20 05:02:07.656 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-20 05:02:07.656 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-20 05:02:07.657 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-20 05:02:07.657 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-20 05:02:07.657 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-20 05:02:07.660 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 641487588505485877865294967011549807342749201683 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jun 20 02:28:24 UTC 2022 Final Date: Sat Jun 19 02:28:23 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [81:6d:99:bf:84:29:86:3f:f8:f2:24:15:a3:38:bf:c0:bb:a6:3c:e1] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 50a3eaf829f3c66260de210dce9ee7b32db3ad34 d52ba657dfda9d8b434f593248dfbdc45563577b a3cff8b32761aea10e4899592126ab11e6359e32 162cf998b25622c339afbd46d54d20011b312b1e ad46d9b00bd7a13649fdb821462c946210c8af88 b97f502b6b01bb0e925b1f079685656b3ae22cd1 f8121bc351fff8c9337b2452f53bd93f05285819 4ec6008ca9eb02648617f7ce30442bd895cb3faa 58b327cd99c070eed6f59d4f03423c2642af7941 87f11232f6015b54f656496d6f7f1a68313d9497 1df68697203069c54f7488818b5e51c0088a1ad5 44d87c3c46f7e9608d19dbdfa403d9a4e4cdb531 4a867f2b07a496e710dfac592af8ebf3276b8365 06cae321638af27c015ba4fe682321b805399991 45a23d805ead965605d78de9572d24f0a0cd688a d389b4cbdf8854b52234ca2e37bf5111af43c6ea 9a08dc5b0f698286f4c957f7a7ebfc88fe3c037e 5f0da9ab47863215aae735bfc2774b13adba900e 99bc94c5b3dd4c1e18e3eefaac57dd30233e6819 845c11b9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e7:8d:9c:5a:b4:2e:c9:9d:36:8a:c6:7c:d8:0b:a2:a9:0d:d9:52:54] modulus: bca0cf3528ba1406a0d7346174ad6280fa747a3762f2f67a5805ac5542b9be9dce8567706ad6dda438525b5b957a13e26aa42395c6a2072cc433775fc428aac3d3f775f180aa9bc40dca07b9378f9796ba1718ef0dabd43fdc42081114c7408925845c140874ba9f39ec57599de679f105b1f510b254dfe081e6845663d1505f60d25a5cc1a2040fbae941e1ee7ad022558b1f42e6988fda9716edb8e04286fd8e60e60ffdea52fced0be0c75c0b651187f87f6e3d7be5b3b6ed5b5acbc1a37735dbe121c31bd6d7232baa3f0c0c5e5dfb27c5dcb46e0c3d0afd6db498da923f3cf94cb5245a2a3501d3959b13d9a63a3f1fbc7d6b3e86d5582a3b2df95e3929 public exponent: 10001 ] 2022-06-20 05:03:47.363  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-20 05:03:47.364 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-20 05:03:47.366 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-20 05:03:47.366 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-20 05:03:47.367  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-06-20 05:03:47.368  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-20 05:03:47.368  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-20 05:03:47.368 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-20 05:03:47.369 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-20 05:03:47.369 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-20 05:03:47.378 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-20 05:03:47.378 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-20 05:03:47.378 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-20 05:03:47.379 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-20 05:03:47.531  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-20 05:03:47.532  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-20 05:03:47.533 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-20 05:03:47.533 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-20 05:03:47.537  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-20 05:03:47.537  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-20 05:03:47.538 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-20 05:03:47.538 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-20 05:03:47.539 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-20 05:03:47.539 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-20 05:03:47.540 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-20 05:03:47.540 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-20 05:03:47.541 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-20 05:03:47.542 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-20 05:03:47.542 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-20 05:03:47.543 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-20 05:03:47.547 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 641487588505485877865294967011549807342749201683 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jun 20 02:28:24 UTC 2022 Final Date: Sat Jun 19 02:28:23 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [81:6d:99:bf:84:29:86:3f:f8:f2:24:15:a3:38:bf:c0:bb:a6:3c:e1] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 50a3eaf829f3c66260de210dce9ee7b32db3ad34 d52ba657dfda9d8b434f593248dfbdc45563577b a3cff8b32761aea10e4899592126ab11e6359e32 162cf998b25622c339afbd46d54d20011b312b1e ad46d9b00bd7a13649fdb821462c946210c8af88 b97f502b6b01bb0e925b1f079685656b3ae22cd1 f8121bc351fff8c9337b2452f53bd93f05285819 4ec6008ca9eb02648617f7ce30442bd895cb3faa 58b327cd99c070eed6f59d4f03423c2642af7941 87f11232f6015b54f656496d6f7f1a68313d9497 1df68697203069c54f7488818b5e51c0088a1ad5 44d87c3c46f7e9608d19dbdfa403d9a4e4cdb531 4a867f2b07a496e710dfac592af8ebf3276b8365 06cae321638af27c015ba4fe682321b805399991 45a23d805ead965605d78de9572d24f0a0cd688a d389b4cbdf8854b52234ca2e37bf5111af43c6ea 9a08dc5b0f698286f4c957f7a7ebfc88fe3c037e 5f0da9ab47863215aae735bfc2774b13adba900e 99bc94c5b3dd4c1e18e3eefaac57dd30233e6819 845c11b9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [fe:85:8e:42:fa:58:68:c2:d2:72:27:8f:3f:0d:fd:de:12:ca:ce:f5] modulus: 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 public exponent: 10001 ] 2022-06-20 05:07:01.336  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-20 05:07:01.338 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-20 05:07:01.340 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-20 05:07:01.341 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-20 05:07:01.341  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-06-20 05:07:01.343  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-20 05:07:01.343  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-20 05:07:01.343 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-20 05:07:01.344 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-20 05:07:01.345 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-20 05:07:01.350 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-20 05:07:01.351 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-20 05:07:01.351 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-20 05:07:01.351 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-20 05:07:01.486  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-20 05:07:01.529  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-20 05:07:01.530 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-20 05:07:01.530 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-20 05:07:01.531  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-20 05:07:01.531  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-20 05:07:01.532 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-20 05:07:01.532 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-20 05:07:01.532 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-20 05:07:01.532 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-20 05:07:01.533 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-20 05:07:01.533 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-20 05:07:01.533 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-20 05:07:01.534 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-20 05:07:01.534 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-20 05:07:01.534 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-20 05:07:01.537 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 641487588505485877865294967011549807342749201683 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jun 20 02:28:24 UTC 2022 Final Date: Sat Jun 19 02:28:23 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [81:6d:99:bf:84:29:86:3f:f8:f2:24:15:a3:38:bf:c0:bb:a6:3c:e1] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 50a3eaf829f3c66260de210dce9ee7b32db3ad34 d52ba657dfda9d8b434f593248dfbdc45563577b a3cff8b32761aea10e4899592126ab11e6359e32 162cf998b25622c339afbd46d54d20011b312b1e ad46d9b00bd7a13649fdb821462c946210c8af88 b97f502b6b01bb0e925b1f079685656b3ae22cd1 f8121bc351fff8c9337b2452f53bd93f05285819 4ec6008ca9eb02648617f7ce30442bd895cb3faa 58b327cd99c070eed6f59d4f03423c2642af7941 87f11232f6015b54f656496d6f7f1a68313d9497 1df68697203069c54f7488818b5e51c0088a1ad5 44d87c3c46f7e9608d19dbdfa403d9a4e4cdb531 4a867f2b07a496e710dfac592af8ebf3276b8365 06cae321638af27c015ba4fe682321b805399991 45a23d805ead965605d78de9572d24f0a0cd688a d389b4cbdf8854b52234ca2e37bf5111af43c6ea 9a08dc5b0f698286f4c957f7a7ebfc88fe3c037e 5f0da9ab47863215aae735bfc2774b13adba900e 99bc94c5b3dd4c1e18e3eefaac57dd30233e6819 845c11b9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d7:20:b7:e4:33:c3:42:88:f3:ec:88:86:c5:c1:c9:37:c2:3b:87:2f] modulus: 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 public exponent: 10001 ] 2022-06-20 05:09:34.789  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-20 05:09:34.790 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-20 05:09:34.792 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-20 05:09:34.793 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-20 05:09:34.793  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-20 05:09:34.794  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-20 05:09:34.794  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-20 05:09:34.794 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-20 05:09:34.795 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-20 05:09:34.795 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-20 05:09:34.801 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-20 05:09:34.802 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-20 05:09:34.802 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-20 05:09:34.802 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-20 05:09:34.931  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-20 05:09:34.934  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-20 05:09:34.934 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-20 05:09:34.935 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-20 05:09:34.942  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-20 05:09:34.944  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-20 05:09:34.945 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-20 05:09:34.946 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-20 05:09:34.948 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-20 05:09:34.951 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-20 05:09:34.952 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-20 05:09:34.952 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-20 05:09:34.953 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-20 05:09:34.954 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-20 05:09:34.954 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-20 05:09:35.030 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-20 05:09:35.033 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 641487588505485877865294967011549807342749201683 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jun 20 02:28:24 UTC 2022 Final Date: Sat Jun 19 02:28:23 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [81:6d:99:bf:84:29:86:3f:f8:f2:24:15:a3:38:bf:c0:bb:a6:3c:e1] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 50a3eaf829f3c66260de210dce9ee7b32db3ad34 d52ba657dfda9d8b434f593248dfbdc45563577b a3cff8b32761aea10e4899592126ab11e6359e32 162cf998b25622c339afbd46d54d20011b312b1e ad46d9b00bd7a13649fdb821462c946210c8af88 b97f502b6b01bb0e925b1f079685656b3ae22cd1 f8121bc351fff8c9337b2452f53bd93f05285819 4ec6008ca9eb02648617f7ce30442bd895cb3faa 58b327cd99c070eed6f59d4f03423c2642af7941 87f11232f6015b54f656496d6f7f1a68313d9497 1df68697203069c54f7488818b5e51c0088a1ad5 44d87c3c46f7e9608d19dbdfa403d9a4e4cdb531 4a867f2b07a496e710dfac592af8ebf3276b8365 06cae321638af27c015ba4fe682321b805399991 45a23d805ead965605d78de9572d24f0a0cd688a d389b4cbdf8854b52234ca2e37bf5111af43c6ea 9a08dc5b0f698286f4c957f7a7ebfc88fe3c037e 5f0da9ab47863215aae735bfc2774b13adba900e 99bc94c5b3dd4c1e18e3eefaac57dd30233e6819 845c11b9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e7:74:9a:a3:b5:c6:2e:d9:b6:7a:aa:e9:27:a0:c1:b0:d5:cd:4d:44] modulus: bd59c3704bb3c9f68412e9e011c0d7ba9d068c14409e28bae7668ef97f09fb690f2cad3bc68810febdc0abc0c761f2282aa680b47daafd14e99859780d83690e81193ccf696a339920e63bd197b0a519bdc82a62e33bd384cac9637601e25e857ce030dea43fa2a0773e17fec31d83587088d8df54b2c99533479c7180bc058ea527c60c839c78ec315adc3e24d0ed60a36aa1227046da94f00bec0bc64d15201377af8e8b07bb59bc3d5de128ef38a156d0d43661e7e0263c693cb22afd79e369dbf5dc6e4472a73e7c65ca9c1851f421af7613545f134f9fdd344b54dd20ba6109a9d89838fa54a37b00bb7138ae0cbebb73f65ec640e6112eff51e2d020cf public exponent: 10001 ] 2022-06-20 05:13:57.176  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-20 05:13:57.179 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-20 05:13:57.180 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-20 05:13:57.181 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-20 05:13:57.181  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-20 05:13:57.182  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-20 05:13:57.182  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-20 05:13:57.182 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-20 05:13:57.183 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-20 05:13:57.183 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-20 05:13:57.189 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-20 05:13:57.189 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-20 05:13:57.190 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-20 05:13:57.190 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-20 05:13:57.330  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-20 05:13:57.330  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-20 05:13:57.331 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-20 05:13:57.331 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-20 05:13:57.334  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-20 05:13:57.335  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-20 05:13:57.336 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-20 05:13:57.336 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-20 05:13:57.336 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-20 05:13:57.337 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-20 05:13:57.338 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-20 05:13:57.338 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-20 05:13:57.340 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-20 05:13:57.340 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-20 05:13:57.340 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-20 05:13:57.341 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-20 05:13:57.343 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 641487588505485877865294967011549807342749201683 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jun 20 02:28:24 UTC 2022 Final Date: Sat Jun 19 02:28:23 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [81:6d:99:bf:84:29:86:3f:f8:f2:24:15:a3:38:bf:c0:bb:a6:3c:e1] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 50a3eaf829f3c66260de210dce9ee7b32db3ad34 d52ba657dfda9d8b434f593248dfbdc45563577b a3cff8b32761aea10e4899592126ab11e6359e32 162cf998b25622c339afbd46d54d20011b312b1e ad46d9b00bd7a13649fdb821462c946210c8af88 b97f502b6b01bb0e925b1f079685656b3ae22cd1 f8121bc351fff8c9337b2452f53bd93f05285819 4ec6008ca9eb02648617f7ce30442bd895cb3faa 58b327cd99c070eed6f59d4f03423c2642af7941 87f11232f6015b54f656496d6f7f1a68313d9497 1df68697203069c54f7488818b5e51c0088a1ad5 44d87c3c46f7e9608d19dbdfa403d9a4e4cdb531 4a867f2b07a496e710dfac592af8ebf3276b8365 06cae321638af27c015ba4fe682321b805399991 45a23d805ead965605d78de9572d24f0a0cd688a d389b4cbdf8854b52234ca2e37bf5111af43c6ea 9a08dc5b0f698286f4c957f7a7ebfc88fe3c037e 5f0da9ab47863215aae735bfc2774b13adba900e 99bc94c5b3dd4c1e18e3eefaac57dd30233e6819 845c11b9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [40:c8:1b:fc:39:5a:79:0c:89:b8:49:eb:fa:da:e7:08:1e:77:8d:c9] modulus: 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 public exponent: 10001 ] 2022-06-20 05:18:00.440  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-20 05:18:00.441 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-20 05:18:00.444 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-20 05:18:00.444 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-20 05:18:00.445  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-06-20 05:18:00.445  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-20 05:18:00.445  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-20 05:18:00.445 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-20 05:18:00.445 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-20 05:18:00.445 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-20 05:18:00.449 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-20 05:18:00.449 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-20 05:18:00.450 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-20 05:18:00.450 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-20 05:18:00.573  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-20 05:18:00.574  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-20 05:18:00.575 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-20 05:18:00.575 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-20 05:18:00.578  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-20 05:18:00.579  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-20 05:18:00.580 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-20 05:18:00.629 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-20 05:18:00.630 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-20 05:18:00.631 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-20 05:18:00.632 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-20 05:18:00.632 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-20 05:18:00.633 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-20 05:18:00.633 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-20 05:18:00.634 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-20 05:18:00.635 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-20 05:18:00.638 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 641487588505485877865294967011549807342749201683 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jun 20 02:28:24 UTC 2022 Final Date: Sat Jun 19 02:28:23 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [81:6d:99:bf:84:29:86:3f:f8:f2:24:15:a3:38:bf:c0:bb:a6:3c:e1] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 50a3eaf829f3c66260de210dce9ee7b32db3ad34 d52ba657dfda9d8b434f593248dfbdc45563577b a3cff8b32761aea10e4899592126ab11e6359e32 162cf998b25622c339afbd46d54d20011b312b1e ad46d9b00bd7a13649fdb821462c946210c8af88 b97f502b6b01bb0e925b1f079685656b3ae22cd1 f8121bc351fff8c9337b2452f53bd93f05285819 4ec6008ca9eb02648617f7ce30442bd895cb3faa 58b327cd99c070eed6f59d4f03423c2642af7941 87f11232f6015b54f656496d6f7f1a68313d9497 1df68697203069c54f7488818b5e51c0088a1ad5 44d87c3c46f7e9608d19dbdfa403d9a4e4cdb531 4a867f2b07a496e710dfac592af8ebf3276b8365 06cae321638af27c015ba4fe682321b805399991 45a23d805ead965605d78de9572d24f0a0cd688a d389b4cbdf8854b52234ca2e37bf5111af43c6ea 9a08dc5b0f698286f4c957f7a7ebfc88fe3c037e 5f0da9ab47863215aae735bfc2774b13adba900e 99bc94c5b3dd4c1e18e3eefaac57dd30233e6819 845c11b9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c9:9e:4d:5b:8a:f9:cc:16:68:0c:46:2d:6c:ba:6b:89:d3:2e:8a:c4] modulus: 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 public exponent: 10001 ] 2022-06-20 05:22:37.695  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-20 05:22:37.696 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-20 05:22:37.698 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-20 05:22:37.698 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-20 05:22:37.698  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-06-20 05:22:37.699  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-20 05:22:37.699  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-20 05:22:37.699 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-20 05:22:37.699 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-20 05:22:37.699 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-20 05:22:37.703 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-20 05:22:37.703 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-20 05:22:37.704 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-20 05:22:37.704 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-20 05:22:37.806  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-20 05:22:37.830  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-20 05:22:37.831 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-20 05:22:37.831 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-20 05:22:37.834  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-20 05:22:37.834  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-20 05:22:37.835 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-20 05:22:37.836 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-20 05:22:37.836 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-20 05:22:37.837 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-20 05:22:37.837 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-20 05:22:37.838 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-20 05:22:37.839 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-20 05:22:37.839 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-20 05:22:37.839 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-20 05:22:37.840 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-20 05:22:37.842 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 641487588505485877865294967011549807342749201683 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jun 20 02:28:24 UTC 2022 Final Date: Sat Jun 19 02:28:23 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [81:6d:99:bf:84:29:86:3f:f8:f2:24:15:a3:38:bf:c0:bb:a6:3c:e1] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 50a3eaf829f3c66260de210dce9ee7b32db3ad34 d52ba657dfda9d8b434f593248dfbdc45563577b a3cff8b32761aea10e4899592126ab11e6359e32 162cf998b25622c339afbd46d54d20011b312b1e ad46d9b00bd7a13649fdb821462c946210c8af88 b97f502b6b01bb0e925b1f079685656b3ae22cd1 f8121bc351fff8c9337b2452f53bd93f05285819 4ec6008ca9eb02648617f7ce30442bd895cb3faa 58b327cd99c070eed6f59d4f03423c2642af7941 87f11232f6015b54f656496d6f7f1a68313d9497 1df68697203069c54f7488818b5e51c0088a1ad5 44d87c3c46f7e9608d19dbdfa403d9a4e4cdb531 4a867f2b07a496e710dfac592af8ebf3276b8365 06cae321638af27c015ba4fe682321b805399991 45a23d805ead965605d78de9572d24f0a0cd688a d389b4cbdf8854b52234ca2e37bf5111af43c6ea 9a08dc5b0f698286f4c957f7a7ebfc88fe3c037e 5f0da9ab47863215aae735bfc2774b13adba900e 99bc94c5b3dd4c1e18e3eefaac57dd30233e6819 845c11b9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3c:86:ff:37:27:b7:26:ba:3e:94:72:fe:eb:47:7d:1b:85:5a:99:32] modulus: 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 public exponent: 10001 ] 2022-06-20 05:28:11.249  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-20 05:28:11.250 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-20 05:28:11.251 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-20 05:28:11.251 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-20 05:28:11.252  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-06-20 05:28:11.252  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-20 05:28:11.252  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-20 05:28:11.252 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-20 05:28:11.252 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-20 05:28:11.253 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-20 05:28:11.256 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-20 05:28:11.256 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-20 05:28:11.257 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-20 05:28:11.257 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-20 05:28:11.349  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-20 05:28:11.349  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-20 05:28:11.349 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-20 05:28:11.349 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-20 05:28:11.350  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-20 05:28:11.351  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-20 05:28:11.351 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-20 05:28:11.351 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-20 05:28:11.351 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-20 05:28:11.351 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-20 05:28:11.351 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-20 05:28:11.351 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-20 05:28:11.352 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-20 05:28:11.352 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-20 05:28:11.352 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-20 05:28:11.352 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-20 05:28:11.354 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 641487588505485877865294967011549807342749201683 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jun 20 02:28:24 UTC 2022 Final Date: Sat Jun 19 02:28:23 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [81:6d:99:bf:84:29:86:3f:f8:f2:24:15:a3:38:bf:c0:bb:a6:3c:e1] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 50a3eaf829f3c66260de210dce9ee7b32db3ad34 d52ba657dfda9d8b434f593248dfbdc45563577b a3cff8b32761aea10e4899592126ab11e6359e32 162cf998b25622c339afbd46d54d20011b312b1e ad46d9b00bd7a13649fdb821462c946210c8af88 b97f502b6b01bb0e925b1f079685656b3ae22cd1 f8121bc351fff8c9337b2452f53bd93f05285819 4ec6008ca9eb02648617f7ce30442bd895cb3faa 58b327cd99c070eed6f59d4f03423c2642af7941 87f11232f6015b54f656496d6f7f1a68313d9497 1df68697203069c54f7488818b5e51c0088a1ad5 44d87c3c46f7e9608d19dbdfa403d9a4e4cdb531 4a867f2b07a496e710dfac592af8ebf3276b8365 06cae321638af27c015ba4fe682321b805399991 45a23d805ead965605d78de9572d24f0a0cd688a d389b4cbdf8854b52234ca2e37bf5111af43c6ea 9a08dc5b0f698286f4c957f7a7ebfc88fe3c037e 5f0da9ab47863215aae735bfc2774b13adba900e 99bc94c5b3dd4c1e18e3eefaac57dd30233e6819 845c11b9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d1:27:e6:00:8d:a1:f9:08:7b:ed:a9:18:d4:64:dc:f1:26:b6:10:3d] modulus: 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 public exponent: 10001 ] 2022-06-20 05:29:32.187  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-06-20 05:29:32.188 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-06-20 05:29:32.189 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-20 05:29:32.189 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-06-20 05:29:32.189  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-06-20 05:29:32.189  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-06-20 05:29:32.190  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-06-20 05:29:32.190 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-06-20 05:29:32.190 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-06-20 05:29:32.190 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-06-20 05:29:32.194 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-06-20 05:29:32.195 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-20 05:29:32.195 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-06-20 05:29:32.195 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-20 05:29:32.291  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-06-20 05:29:32.292  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-06-20 05:29:32.292 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-06-20 05:29:32.292 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-06-20 05:29:32.294  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-06-20 05:29:32.294  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-06-20 05:29:32.295 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-20 05:29:32.295 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-20 05:29:32.295 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-20 05:29:32.296 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-20 05:29:32.296 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-20 05:29:32.296 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-20 05:29:32.297 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-06-20 05:29:32.297 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-06-20 05:29:32.297 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-06-20 05:29:32.298 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-06-20 05:29:32.300 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 641487588505485877865294967011549807342749201683 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jun 20 02:28:24 UTC 2022 Final Date: Sat Jun 19 02:28:23 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [81:6d:99:bf:84:29:86:3f:f8:f2:24:15:a3:38:bf:c0:bb:a6:3c:e1] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 50a3eaf829f3c66260de210dce9ee7b32db3ad34 d52ba657dfda9d8b434f593248dfbdc45563577b a3cff8b32761aea10e4899592126ab11e6359e32 162cf998b25622c339afbd46d54d20011b312b1e ad46d9b00bd7a13649fdb821462c946210c8af88 b97f502b6b01bb0e925b1f079685656b3ae22cd1 f8121bc351fff8c9337b2452f53bd93f05285819 4ec6008ca9eb02648617f7ce30442bd895cb3faa 58b327cd99c070eed6f59d4f03423c2642af7941 87f11232f6015b54f656496d6f7f1a68313d9497 1df68697203069c54f7488818b5e51c0088a1ad5 44d87c3c46f7e9608d19dbdfa403d9a4e4cdb531 4a867f2b07a496e710dfac592af8ebf3276b8365 06cae321638af27c015ba4fe682321b805399991 45a23d805ead965605d78de9572d24f0a0cd688a d389b4cbdf8854b52234ca2e37bf5111af43c6ea 9a08dc5b0f698286f4c957f7a7ebfc88fe3c037e 5f0da9ab47863215aae735bfc2774b13adba900e 99bc94c5b3dd4c1e18e3eefaac57dd30233e6819 845c11b9 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [10:50:c0:5b:52:d9:66:b9:b9:d7:c7:55:24:aa:6d:4a:4b:d7:b0:b1] modulus: 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 public exponent: 10001 ]