2022-04-28 15:43:45,989 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-04-28 15:43:50,190 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-04-28 15:43:52.902  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Apr 28, 2022 3:44:02 PM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Apr 28, 2022 3:44:02 PM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Apr 28, 2022 3:44:02 PM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Apr 28, 2022 3:44:03 PM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-04-28 15:44:05.390 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-04-28 15:44:06.595  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-04-28 15:44:07.387  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-04-28 15:44:10.406 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-04-28 15:44:10.408 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-04-28 15:44:10.488 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-04-28 15:44:10.492 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-04-28 15:44:10.610 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-04-28 15:44:10.685 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-04-28 15:44:11.203 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-04-28 15:44:16.491 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Apr 28, 2022 3:44:19 PM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-04-28 15:44:20.897  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 39.008 seconds (JVM running for 47.15) Apr 28, 2022 3:44:23 PM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-04-28 15:44:50.303  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-28 15:44:50.395 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-28 15:44:50.592 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-04-28 15:44:50.595 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-28 15:44:50.691  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-04-28 15:44:50.694  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-28 15:44:50.696  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-28 15:44:50.698 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-28 15:44:50.698 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 15:44:50.701 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-28 15:44:50.706 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-28 15:44:50.789 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-28 15:44:50.907 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-28 15:44:50.993 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 15:44:50.994 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 15:44:50.999 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-28 15:44:52.687  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-28 15:44:52.691  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-28 15:44:52.692 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-28 15:44:52.694 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-28 15:44:52.794  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-28 15:44:52.795  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-28 15:44:52.885 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 15:44:52.886 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 15:44:52.886 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 15:44:52.994 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 15:44:52.994 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 15:44:52.995 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 15:44:53.089 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 15:44:53.089 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 15:44:53.090 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 15:44:53.092 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-28 15:44:53.292 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 693477145110709241014580003939919164648862450539 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 28 15:38:09 UTC 2022 Final Date: Tue Apr 27 15:38:08 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [38:bd:0b:44:a0:f5:02:7c:1f:6b:d9:97:24:06:61:2e:93:a4:9f:e0] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a5821962affdd37ac4336df361ccb63989f89746 3fc14ea9c55e73878dca426515a413d0658c1833 383f726b5c7bbee0656ee75cc2c1db16ea2d07b2 8836f8f7f40cf254837aa4939cc3ba6eb783146a d6dd21723d481a676ef7aedd0ee23d5ce73308e7 c87aa46606b9c9d9addb43f33add8a9505575a7f 8ea0bcbb067b73f764d8d9cebfa9fd9127bb5c9b 41313e94fe40e2416b563eea0d6d9f665db72885 13ae96602687f14809b4e1c7d09c2ec0b556f6ca 5e15a77769e07f1feda9a612b416f3873db32947 3c9c173976c4fb76e0f452e8159cb76cf3ad1064 9eace1b7e6a57f4f625a6fa11f133ff889933c57 ef5c280dc2249cce2f3da0a5119ca28f1861362a 10a657560882dd1e529fa3f3bf26f59f4b124797 afcf95a7c9cba460f903cc68b337372f4362f27d dd7730251533070c3052a8fcc881c0d879a88e2a c79d37abd2632323b3a03e3f220e11f7d00db7b8 2c3fbf2aba8879005ae5c2f1a5161e33e1401932 5b065b0dffc27ef8d447d9bd1c3b3087bbd0aa17 935977e2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [08:a9:99:2b:3c:05:ba:2f:43:af:43:05:54:63:ad:4c:eb:75:df:4e] modulus: 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 public exponent: 10001 ] 2022-04-28 19:37:50.695  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-28 19:37:50.696 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-28 19:37:50.698 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-28 19:37:50.699 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-28 19:37:50.701  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-28 19:37:50.701  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-28 19:37:50.702  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-28 19:37:50.702 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-28 19:37:50.702 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-28 19:37:50.703 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-28 19:37:50.713 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-28 19:37:50.713 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 19:37:50.713 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 19:37:50.714 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-28 19:37:51.085  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-28 19:37:51.086  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-28 19:37:51.086 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-28 19:37:51.086 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-28 19:37:51.089  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-28 19:37:51.089  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-28 19:37:51.090 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 19:37:51.090 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 19:37:51.090 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 19:37:51.091 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 19:37:51.091 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 19:37:51.091 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 19:37:51.092 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 19:37:51.092 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 19:37:51.092 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 19:37:51.093 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-28 19:37:51.097 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 693477145110709241014580003939919164648862450539 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 28 15:38:09 UTC 2022 Final Date: Tue Apr 27 15:38:08 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [38:bd:0b:44:a0:f5:02:7c:1f:6b:d9:97:24:06:61:2e:93:a4:9f:e0] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a5821962affdd37ac4336df361ccb63989f89746 3fc14ea9c55e73878dca426515a413d0658c1833 383f726b5c7bbee0656ee75cc2c1db16ea2d07b2 8836f8f7f40cf254837aa4939cc3ba6eb783146a d6dd21723d481a676ef7aedd0ee23d5ce73308e7 c87aa46606b9c9d9addb43f33add8a9505575a7f 8ea0bcbb067b73f764d8d9cebfa9fd9127bb5c9b 41313e94fe40e2416b563eea0d6d9f665db72885 13ae96602687f14809b4e1c7d09c2ec0b556f6ca 5e15a77769e07f1feda9a612b416f3873db32947 3c9c173976c4fb76e0f452e8159cb76cf3ad1064 9eace1b7e6a57f4f625a6fa11f133ff889933c57 ef5c280dc2249cce2f3da0a5119ca28f1861362a 10a657560882dd1e529fa3f3bf26f59f4b124797 afcf95a7c9cba460f903cc68b337372f4362f27d dd7730251533070c3052a8fcc881c0d879a88e2a c79d37abd2632323b3a03e3f220e11f7d00db7b8 2c3fbf2aba8879005ae5c2f1a5161e33e1401932 5b065b0dffc27ef8d447d9bd1c3b3087bbd0aa17 935977e2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [db:38:d1:4d:7e:6a:1b:5c:c3:dd:8d:c2:8d:57:92:06:c7:70:b1:19] modulus: e35f51ea677d9d0d3ce92fb697a233b55b1bd03b0dabeb0b704b40a58b3dbfc88c82c2d47a7e4963d52d1d3180296120e750bf7e35e55bb14766d0a5cf5323feb14b59234793411fcf0f16f52154c61d589a13c386ebbed5c031aac61c29c03c27b594ca990b24fcb313b6e74313577bb656e1a6d3c0318895aae543819534eb88889015263ca04b519b742c8b5ea63f6a2a07f69761a34fe61c2cff0d8184599a5439a96f5e5c49dfe2241ffc4ec297576ff64bae8fe7e1d6a733563f2bbbdf234e3c4ba94aee285021e6efe95de789afd994e7564b710d4fbb5cc6b229ed338d9664cb2d62dfe4032d33b3eed5abca1d18a63ba74e87122f92481f130b0e83 public exponent: 10001 ] 2022-04-28 19:41:19.866  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-28 19:41:19.867 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-28 19:41:19.868 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-28 19:41:19.869 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-28 19:41:19.869  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-28 19:41:19.870  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-28 19:41:19.870  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-28 19:41:19.870 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-28 19:41:19.871 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-28 19:41:19.871 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-28 19:41:19.879 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-28 19:41:19.879 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 19:41:19.879 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 19:41:19.880 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-28 19:41:19.971  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-28 19:41:19.972  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-28 19:41:19.985 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-28 19:41:19.986 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-28 19:41:19.990  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-28 19:41:19.990  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-28 19:41:19.991 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 19:41:19.991 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 19:41:19.992 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 19:41:19.994 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 19:41:19.994 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 19:41:19.995 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 19:41:19.996 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 19:41:19.997 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 19:41:19.997 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 19:41:19.998 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-28 19:41:20.001 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 693477145110709241014580003939919164648862450539 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 28 15:38:09 UTC 2022 Final Date: Tue Apr 27 15:38:08 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [38:bd:0b:44:a0:f5:02:7c:1f:6b:d9:97:24:06:61:2e:93:a4:9f:e0] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a5821962affdd37ac4336df361ccb63989f89746 3fc14ea9c55e73878dca426515a413d0658c1833 383f726b5c7bbee0656ee75cc2c1db16ea2d07b2 8836f8f7f40cf254837aa4939cc3ba6eb783146a d6dd21723d481a676ef7aedd0ee23d5ce73308e7 c87aa46606b9c9d9addb43f33add8a9505575a7f 8ea0bcbb067b73f764d8d9cebfa9fd9127bb5c9b 41313e94fe40e2416b563eea0d6d9f665db72885 13ae96602687f14809b4e1c7d09c2ec0b556f6ca 5e15a77769e07f1feda9a612b416f3873db32947 3c9c173976c4fb76e0f452e8159cb76cf3ad1064 9eace1b7e6a57f4f625a6fa11f133ff889933c57 ef5c280dc2249cce2f3da0a5119ca28f1861362a 10a657560882dd1e529fa3f3bf26f59f4b124797 afcf95a7c9cba460f903cc68b337372f4362f27d dd7730251533070c3052a8fcc881c0d879a88e2a c79d37abd2632323b3a03e3f220e11f7d00db7b8 2c3fbf2aba8879005ae5c2f1a5161e33e1401932 5b065b0dffc27ef8d447d9bd1c3b3087bbd0aa17 935977e2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e5:dd:b5:ce:7c:eb:00:15:56:26:13:5c:75:2e:37:de:15:4a:75:6e] modulus: e35c8dc31462a7854997829a651b86223867c7293c4d828e10b848e3cba43a084dbe12e7eea6c544b5e99f7022cb4e7fcdebacb1f8021f0c48e35707495598f14bd04dda2f9ffe6c1c2dd6fb070175361a157f87273574302c161a294d0302e6d686bd8bbc2791d30ca0ab95820c7820d6e7ab55a7f740d8ff32ea0c84b9e81b67f05b968e6db431222a99ff9e8ed2c472b5cc3aba578a53350fba16e746021e78c99cb6e90c7399c61276e6f9aa5ec2c5d2da213f7bc9ff9d1f49af667aac1f964153902ece0dc9d6d7a78a4e4bf239e095c2cecc8a6303bd409fc73bf7f11abd0091bd26352bcd3472261fa6daf7ab4f30efb6e7eb8e9fd6348f9a2f6b822d public exponent: 10001 ] 2022-04-28 19:43:23.318  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-28 19:43:23.319 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-28 19:43:23.321 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-04-28 19:43:23.321 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-28 19:43:23.321  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-04-28 19:43:23.322  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-28 19:43:23.322  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-28 19:43:23.323 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-28 19:43:23.323 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-28 19:43:23.323 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-28 19:43:23.328 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-28 19:43:23.328 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 19:43:23.328 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 19:43:23.329 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-28 19:43:23.467  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-28 19:43:23.468  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-28 19:43:23.468 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-28 19:43:23.469 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-28 19:43:23.470  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-28 19:43:23.470  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-28 19:43:23.471 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 19:43:23.471 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 19:43:23.471 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 19:43:23.472 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 19:43:23.472 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 19:43:23.473 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 19:43:23.473 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 19:43:23.474 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 19:43:23.474 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 19:43:23.475 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-28 19:43:23.488 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 693477145110709241014580003939919164648862450539 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 28 15:38:09 UTC 2022 Final Date: Tue Apr 27 15:38:08 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [38:bd:0b:44:a0:f5:02:7c:1f:6b:d9:97:24:06:61:2e:93:a4:9f:e0] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a5821962affdd37ac4336df361ccb63989f89746 3fc14ea9c55e73878dca426515a413d0658c1833 383f726b5c7bbee0656ee75cc2c1db16ea2d07b2 8836f8f7f40cf254837aa4939cc3ba6eb783146a d6dd21723d481a676ef7aedd0ee23d5ce73308e7 c87aa46606b9c9d9addb43f33add8a9505575a7f 8ea0bcbb067b73f764d8d9cebfa9fd9127bb5c9b 41313e94fe40e2416b563eea0d6d9f665db72885 13ae96602687f14809b4e1c7d09c2ec0b556f6ca 5e15a77769e07f1feda9a612b416f3873db32947 3c9c173976c4fb76e0f452e8159cb76cf3ad1064 9eace1b7e6a57f4f625a6fa11f133ff889933c57 ef5c280dc2249cce2f3da0a5119ca28f1861362a 10a657560882dd1e529fa3f3bf26f59f4b124797 afcf95a7c9cba460f903cc68b337372f4362f27d dd7730251533070c3052a8fcc881c0d879a88e2a c79d37abd2632323b3a03e3f220e11f7d00db7b8 2c3fbf2aba8879005ae5c2f1a5161e33e1401932 5b065b0dffc27ef8d447d9bd1c3b3087bbd0aa17 935977e2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [15:48:03:1d:c8:e6:e6:a7:de:01:b5:77:d7:e4:a5:f6:01:f7:01:3b] modulus: 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 public exponent: 10001 ] 2022-04-28 19:45:35.051  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-28 19:45:35.052 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-28 19:45:35.054 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-28 19:45:35.055 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-28 19:45:35.055  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-28 19:45:35.056  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-28 19:45:35.056  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-28 19:45:35.057 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-28 19:45:35.057 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-28 19:45:35.057 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-28 19:45:35.064 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-28 19:45:35.064 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 19:45:35.065 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 19:45:35.065 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-28 19:45:35.155  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-28 19:45:35.155  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-28 19:45:35.156 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-28 19:45:35.156 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-28 19:45:35.188  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-28 19:45:35.189  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-28 19:45:35.189 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 19:45:35.190 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 19:45:35.190 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 19:45:35.191 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 19:45:35.192 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 19:45:35.192 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 19:45:35.193 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 19:45:35.193 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 19:45:35.193 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 19:45:35.194 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-28 19:45:35.198 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 693477145110709241014580003939919164648862450539 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 28 15:38:09 UTC 2022 Final Date: Tue Apr 27 15:38:08 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [38:bd:0b:44:a0:f5:02:7c:1f:6b:d9:97:24:06:61:2e:93:a4:9f:e0] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a5821962affdd37ac4336df361ccb63989f89746 3fc14ea9c55e73878dca426515a413d0658c1833 383f726b5c7bbee0656ee75cc2c1db16ea2d07b2 8836f8f7f40cf254837aa4939cc3ba6eb783146a d6dd21723d481a676ef7aedd0ee23d5ce73308e7 c87aa46606b9c9d9addb43f33add8a9505575a7f 8ea0bcbb067b73f764d8d9cebfa9fd9127bb5c9b 41313e94fe40e2416b563eea0d6d9f665db72885 13ae96602687f14809b4e1c7d09c2ec0b556f6ca 5e15a77769e07f1feda9a612b416f3873db32947 3c9c173976c4fb76e0f452e8159cb76cf3ad1064 9eace1b7e6a57f4f625a6fa11f133ff889933c57 ef5c280dc2249cce2f3da0a5119ca28f1861362a 10a657560882dd1e529fa3f3bf26f59f4b124797 afcf95a7c9cba460f903cc68b337372f4362f27d dd7730251533070c3052a8fcc881c0d879a88e2a c79d37abd2632323b3a03e3f220e11f7d00db7b8 2c3fbf2aba8879005ae5c2f1a5161e33e1401932 5b065b0dffc27ef8d447d9bd1c3b3087bbd0aa17 935977e2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2a:2d:c5:f8:39:ec:ad:d5:c7:8a:17:6f:74:c4:23:b3:1e:5f:4f:98] modulus: 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 public exponent: 10001 ] 2022-04-28 19:49:22.393  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-28 19:49:22.394 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-28 19:49:22.398 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-04-28 19:49:22.399 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-28 19:49:22.400  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-04-28 19:49:22.401  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-28 19:49:22.401  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-28 19:49:22.402 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-28 19:49:22.402 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-28 19:49:22.403 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-28 19:49:22.484 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-28 19:49:22.486 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 19:49:22.486 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 19:49:22.486 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-28 19:49:22.605  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-28 19:49:22.605  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-28 19:49:22.606 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-28 19:49:22.606 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-28 19:49:22.607  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-28 19:49:22.607  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-28 19:49:22.608 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 19:49:22.608 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 19:49:22.608 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 19:49:22.609 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 19:49:22.609 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 19:49:22.609 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 19:49:22.610 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 19:49:22.610 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 19:49:22.610 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 19:49:22.611 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-28 19:49:22.689 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 693477145110709241014580003939919164648862450539 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 28 15:38:09 UTC 2022 Final Date: Tue Apr 27 15:38:08 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [38:bd:0b:44:a0:f5:02:7c:1f:6b:d9:97:24:06:61:2e:93:a4:9f:e0] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a5821962affdd37ac4336df361ccb63989f89746 3fc14ea9c55e73878dca426515a413d0658c1833 383f726b5c7bbee0656ee75cc2c1db16ea2d07b2 8836f8f7f40cf254837aa4939cc3ba6eb783146a d6dd21723d481a676ef7aedd0ee23d5ce73308e7 c87aa46606b9c9d9addb43f33add8a9505575a7f 8ea0bcbb067b73f764d8d9cebfa9fd9127bb5c9b 41313e94fe40e2416b563eea0d6d9f665db72885 13ae96602687f14809b4e1c7d09c2ec0b556f6ca 5e15a77769e07f1feda9a612b416f3873db32947 3c9c173976c4fb76e0f452e8159cb76cf3ad1064 9eace1b7e6a57f4f625a6fa11f133ff889933c57 ef5c280dc2249cce2f3da0a5119ca28f1861362a 10a657560882dd1e529fa3f3bf26f59f4b124797 afcf95a7c9cba460f903cc68b337372f4362f27d dd7730251533070c3052a8fcc881c0d879a88e2a c79d37abd2632323b3a03e3f220e11f7d00db7b8 2c3fbf2aba8879005ae5c2f1a5161e33e1401932 5b065b0dffc27ef8d447d9bd1c3b3087bbd0aa17 935977e2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [68:9f:6d:bd:9b:82:1e:98:03:d0:c6:35:50:6a:bb:69:e6:bd:90:8e] modulus: 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 public exponent: 10001 ] 2022-04-28 19:52:37.836  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-28 19:52:37.837 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-28 19:52:37.838 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-28 19:52:37.839 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-28 19:52:37.839  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-28 19:52:37.840  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-28 19:52:37.840  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-28 19:52:37.841 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-28 19:52:37.841 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-28 19:52:37.841 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-28 19:52:37.845 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-28 19:52:37.846 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 19:52:37.846 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 19:52:37.846 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-28 19:52:37.985  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-28 19:52:37.985  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-28 19:52:37.986 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-28 19:52:37.986 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-28 19:52:37.988  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-28 19:52:37.989  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-28 19:52:37.989 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 19:52:37.989 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 19:52:37.989 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 19:52:37.990 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 19:52:37.990 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 19:52:37.990 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 19:52:37.990 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 19:52:37.991 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 19:52:37.991 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 19:52:37.991 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-28 19:52:37.994 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 693477145110709241014580003939919164648862450539 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 28 15:38:09 UTC 2022 Final Date: Tue Apr 27 15:38:08 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [38:bd:0b:44:a0:f5:02:7c:1f:6b:d9:97:24:06:61:2e:93:a4:9f:e0] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a5821962affdd37ac4336df361ccb63989f89746 3fc14ea9c55e73878dca426515a413d0658c1833 383f726b5c7bbee0656ee75cc2c1db16ea2d07b2 8836f8f7f40cf254837aa4939cc3ba6eb783146a d6dd21723d481a676ef7aedd0ee23d5ce73308e7 c87aa46606b9c9d9addb43f33add8a9505575a7f 8ea0bcbb067b73f764d8d9cebfa9fd9127bb5c9b 41313e94fe40e2416b563eea0d6d9f665db72885 13ae96602687f14809b4e1c7d09c2ec0b556f6ca 5e15a77769e07f1feda9a612b416f3873db32947 3c9c173976c4fb76e0f452e8159cb76cf3ad1064 9eace1b7e6a57f4f625a6fa11f133ff889933c57 ef5c280dc2249cce2f3da0a5119ca28f1861362a 10a657560882dd1e529fa3f3bf26f59f4b124797 afcf95a7c9cba460f903cc68b337372f4362f27d dd7730251533070c3052a8fcc881c0d879a88e2a c79d37abd2632323b3a03e3f220e11f7d00db7b8 2c3fbf2aba8879005ae5c2f1a5161e33e1401932 5b065b0dffc27ef8d447d9bd1c3b3087bbd0aa17 935977e2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f5:83:3b:26:85:15:e8:c1:f7:ef:af:96:a7:2c:dd:51:e2:43:78:7d] modulus: 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 public exponent: 10001 ] 2022-04-28 19:57:39.637  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-28 19:57:39.638 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-28 19:57:39.640 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-28 19:57:39.641 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-28 19:57:39.641  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-28 19:57:39.642  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-28 19:57:39.642  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-28 19:57:39.643 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-28 19:57:39.643 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-28 19:57:39.643 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-28 19:57:39.651 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-28 19:57:39.652 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 19:57:39.652 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 19:57:39.652 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-28 19:57:39.786  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-28 19:57:39.787  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-28 19:57:39.787 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-28 19:57:39.787 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-28 19:57:39.788  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-28 19:57:39.788  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-28 19:57:39.789 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 19:57:39.789 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 19:57:39.789 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 19:57:39.789 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 19:57:39.789 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 19:57:39.790 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 19:57:39.790 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 19:57:39.790 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 19:57:39.790 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 19:57:39.791 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-28 19:57:39.793 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 693477145110709241014580003939919164648862450539 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 28 15:38:09 UTC 2022 Final Date: Tue Apr 27 15:38:08 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [38:bd:0b:44:a0:f5:02:7c:1f:6b:d9:97:24:06:61:2e:93:a4:9f:e0] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a5821962affdd37ac4336df361ccb63989f89746 3fc14ea9c55e73878dca426515a413d0658c1833 383f726b5c7bbee0656ee75cc2c1db16ea2d07b2 8836f8f7f40cf254837aa4939cc3ba6eb783146a d6dd21723d481a676ef7aedd0ee23d5ce73308e7 c87aa46606b9c9d9addb43f33add8a9505575a7f 8ea0bcbb067b73f764d8d9cebfa9fd9127bb5c9b 41313e94fe40e2416b563eea0d6d9f665db72885 13ae96602687f14809b4e1c7d09c2ec0b556f6ca 5e15a77769e07f1feda9a612b416f3873db32947 3c9c173976c4fb76e0f452e8159cb76cf3ad1064 9eace1b7e6a57f4f625a6fa11f133ff889933c57 ef5c280dc2249cce2f3da0a5119ca28f1861362a 10a657560882dd1e529fa3f3bf26f59f4b124797 afcf95a7c9cba460f903cc68b337372f4362f27d dd7730251533070c3052a8fcc881c0d879a88e2a c79d37abd2632323b3a03e3f220e11f7d00db7b8 2c3fbf2aba8879005ae5c2f1a5161e33e1401932 5b065b0dffc27ef8d447d9bd1c3b3087bbd0aa17 935977e2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [42:8e:cc:ac:63:58:24:a1:f5:ec:db:6e:fd:32:69:42:51:4d:ef:eb] modulus: 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 public exponent: 10001 ] 2022-04-28 20:04:11.068  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-28 20:04:11.070 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-28 20:04:11.072 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-04-28 20:04:11.072 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-28 20:04:11.073  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-04-28 20:04:11.074  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-28 20:04:11.074  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-28 20:04:11.075 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-28 20:04:11.075 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-28 20:04:11.076 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-28 20:04:11.080 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-28 20:04:11.080 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 20:04:11.081 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 20:04:11.082 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-28 20:04:11.171  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-28 20:04:11.172  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-28 20:04:11.173 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-28 20:04:11.173 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-28 20:04:11.175  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-28 20:04:11.175  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-28 20:04:11.176 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 20:04:11.176 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 20:04:11.176 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 20:04:11.177 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 20:04:11.177 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 20:04:11.178 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 20:04:11.178 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 20:04:11.179 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 20:04:11.179 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 20:04:11.180 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-28 20:04:11.184 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 693477145110709241014580003939919164648862450539 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 28 15:38:09 UTC 2022 Final Date: Tue Apr 27 15:38:08 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [38:bd:0b:44:a0:f5:02:7c:1f:6b:d9:97:24:06:61:2e:93:a4:9f:e0] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a5821962affdd37ac4336df361ccb63989f89746 3fc14ea9c55e73878dca426515a413d0658c1833 383f726b5c7bbee0656ee75cc2c1db16ea2d07b2 8836f8f7f40cf254837aa4939cc3ba6eb783146a d6dd21723d481a676ef7aedd0ee23d5ce73308e7 c87aa46606b9c9d9addb43f33add8a9505575a7f 8ea0bcbb067b73f764d8d9cebfa9fd9127bb5c9b 41313e94fe40e2416b563eea0d6d9f665db72885 13ae96602687f14809b4e1c7d09c2ec0b556f6ca 5e15a77769e07f1feda9a612b416f3873db32947 3c9c173976c4fb76e0f452e8159cb76cf3ad1064 9eace1b7e6a57f4f625a6fa11f133ff889933c57 ef5c280dc2249cce2f3da0a5119ca28f1861362a 10a657560882dd1e529fa3f3bf26f59f4b124797 afcf95a7c9cba460f903cc68b337372f4362f27d dd7730251533070c3052a8fcc881c0d879a88e2a c79d37abd2632323b3a03e3f220e11f7d00db7b8 2c3fbf2aba8879005ae5c2f1a5161e33e1401932 5b065b0dffc27ef8d447d9bd1c3b3087bbd0aa17 935977e2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [be:b2:3c:42:21:6c:19:1b:4a:0f:6c:6a:b6:20:8e:12:08:d6:c0:b6] modulus: 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 public exponent: 10001 ] 2022-04-28 20:05:58.096  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-28 20:05:58.097 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-28 20:05:58.099 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-28 20:05:58.099 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-28 20:05:58.099  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-28 20:05:58.100  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-28 20:05:58.100  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-28 20:05:58.100 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-28 20:05:58.101 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-28 20:05:58.101 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-28 20:05:58.106 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-28 20:05:58.107 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 20:05:58.107 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 20:05:58.107 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-28 20:05:58.185  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-28 20:05:58.186  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-28 20:05:58.186 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-28 20:05:58.186 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-28 20:05:58.188  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-28 20:05:58.188  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-28 20:05:58.189 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 20:05:58.189 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 20:05:58.189 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 20:05:58.189 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 20:05:58.190 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 20:05:58.190 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 20:05:58.190 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 20:05:58.190 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 20:05:58.190 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 20:05:58.191 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-28 20:05:58.193 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 693477145110709241014580003939919164648862450539 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 28 15:38:09 UTC 2022 Final Date: Tue Apr 27 15:38:08 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [38:bd:0b:44:a0:f5:02:7c:1f:6b:d9:97:24:06:61:2e:93:a4:9f:e0] modulus: c8cdc4a141734727473ebf71cb5f952c4fe9add53f4182ca8fc6dc65197b1d618f001527c92330211bb55d80539402cb3e022beab4b2ac1717b6fa2de28eaa736540dd15ce51073acd089da1f800b2a3f8c7bff36403773e2ed0900b30fe7b9be857048aa218571c99aa516f16507b70aacfdf20e2714a6885a5e7be4072c44d14c29c1e52079a6e4a25d31f0e38feee11e387bd04efb5a1e01fe3c0619e712751cc148490c66b508e06efc99fa4404cf48655b865f57befa9ba8ee05a9c0f9d48cdf053cb98024990c5d9912df64cfd3cece32066421d7cecd432a8d0a707aff7fc08f13795761a85a3c3cf3f7ff429b452cc363ce3f5902c1cebb43b886c00d9570986f087f396257d8a95620b002a5116bb1aa79c0f24f859d47bebbb4210866234d8dbb0b446c0ae5e96bab6dc8aa43b1c191dc4c6c92ac310ff258d8ed6edd4e0cda39e7980a73021175921a550ddcddbf7540e6fcdd8189995bbbab03f65d7245afd861004e7184c8e1f510b2a3c02a522f6161bfda09c510c711f790b public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a5821962affdd37ac4336df361ccb63989f89746 3fc14ea9c55e73878dca426515a413d0658c1833 383f726b5c7bbee0656ee75cc2c1db16ea2d07b2 8836f8f7f40cf254837aa4939cc3ba6eb783146a d6dd21723d481a676ef7aedd0ee23d5ce73308e7 c87aa46606b9c9d9addb43f33add8a9505575a7f 8ea0bcbb067b73f764d8d9cebfa9fd9127bb5c9b 41313e94fe40e2416b563eea0d6d9f665db72885 13ae96602687f14809b4e1c7d09c2ec0b556f6ca 5e15a77769e07f1feda9a612b416f3873db32947 3c9c173976c4fb76e0f452e8159cb76cf3ad1064 9eace1b7e6a57f4f625a6fa11f133ff889933c57 ef5c280dc2249cce2f3da0a5119ca28f1861362a 10a657560882dd1e529fa3f3bf26f59f4b124797 afcf95a7c9cba460f903cc68b337372f4362f27d dd7730251533070c3052a8fcc881c0d879a88e2a c79d37abd2632323b3a03e3f220e11f7d00db7b8 2c3fbf2aba8879005ae5c2f1a5161e33e1401932 5b065b0dffc27ef8d447d9bd1c3b3087bbd0aa17 935977e2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9f:1d:07:ee:f7:5d:86:7c:c7:4d:5e:82:b2:4c:6e:ad:45:55:2d:e0] modulus: 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 public exponent: 10001 ] 2022-04-28 20:12:00.919  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-28 20:12:00.920 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-28 20:12:00.921 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-28 20:12:00.922 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-28 20:12:00.922  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-28 20:12:00.922  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-28 20:12:00.922  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-28 20:12:00.923 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-28 20:12:00.923 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-28 20:12:00.923 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-28 20:12:00.928 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-28 20:12:00.929 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 20:12:00.929 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 20:12:00.929 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-28 20:12:01.004  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-28 20:12:01.004  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-28 20:12:01.005 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-28 20:12:01.005 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-28 20:12:01.006  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-28 20:12:01.006  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-28 20:12:01.006 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 20:12:01.006 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 20:12:01.007 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 20:12:01.007 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 20:12:01.007 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 20:12:01.007 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 20:12:01.008 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 20:12:01.008 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 20:12:01.008 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 20:12:01.008 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-28 20:12:01.011 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 693477145110709241014580003939919164648862450539 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 28 15:38:09 UTC 2022 Final Date: Tue Apr 27 15:38:08 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [38:bd:0b:44:a0:f5:02:7c:1f:6b:d9:97:24:06:61:2e:93:a4:9f:e0] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a5821962affdd37ac4336df361ccb63989f89746 3fc14ea9c55e73878dca426515a413d0658c1833 383f726b5c7bbee0656ee75cc2c1db16ea2d07b2 8836f8f7f40cf254837aa4939cc3ba6eb783146a d6dd21723d481a676ef7aedd0ee23d5ce73308e7 c87aa46606b9c9d9addb43f33add8a9505575a7f 8ea0bcbb067b73f764d8d9cebfa9fd9127bb5c9b 41313e94fe40e2416b563eea0d6d9f665db72885 13ae96602687f14809b4e1c7d09c2ec0b556f6ca 5e15a77769e07f1feda9a612b416f3873db32947 3c9c173976c4fb76e0f452e8159cb76cf3ad1064 9eace1b7e6a57f4f625a6fa11f133ff889933c57 ef5c280dc2249cce2f3da0a5119ca28f1861362a 10a657560882dd1e529fa3f3bf26f59f4b124797 afcf95a7c9cba460f903cc68b337372f4362f27d dd7730251533070c3052a8fcc881c0d879a88e2a c79d37abd2632323b3a03e3f220e11f7d00db7b8 2c3fbf2aba8879005ae5c2f1a5161e33e1401932 5b065b0dffc27ef8d447d9bd1c3b3087bbd0aa17 935977e2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b4:4c:e1:94:56:95:ad:d8:4a:71:d7:5d:33:fa:7d:3c:53:6f:01:7c] modulus: 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 public exponent: 10001 ] 2022-04-28 20:12:58.394  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-28 20:12:58.395 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-28 20:12:58.396 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-04-28 20:12:58.397 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-28 20:12:58.397  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-04-28 20:12:58.397  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-28 20:12:58.397  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-28 20:12:58.398 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-28 20:12:58.398 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-28 20:12:58.398 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-28 20:12:58.402 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-28 20:12:58.402 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 20:12:58.402 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 20:12:58.403 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-28 20:12:58.480  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-28 20:12:58.480  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-28 20:12:58.481 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-28 20:12:58.481 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-28 20:12:58.483  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-28 20:12:58.484  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-28 20:12:58.485 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 20:12:58.485 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 20:12:58.486 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 20:12:58.486 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 20:12:58.486 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 20:12:58.487 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 20:12:58.490 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 20:12:58.490 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 20:12:58.490 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 20:12:58.491 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-28 20:12:58.494 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 693477145110709241014580003939919164648862450539 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 28 15:38:09 UTC 2022 Final Date: Tue Apr 27 15:38:08 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [38:bd:0b:44:a0:f5:02:7c:1f:6b:d9:97:24:06:61:2e:93:a4:9f:e0] modulus: c8cdc4a141734727473ebf71cb5f952c4fe9add53f4182ca8fc6dc65197b1d618f001527c92330211bb55d80539402cb3e022beab4b2ac1717b6fa2de28eaa736540dd15ce51073acd089da1f800b2a3f8c7bff36403773e2ed0900b30fe7b9be857048aa218571c99aa516f16507b70aacfdf20e2714a6885a5e7be4072c44d14c29c1e52079a6e4a25d31f0e38feee11e387bd04efb5a1e01fe3c0619e712751cc148490c66b508e06efc99fa4404cf48655b865f57befa9ba8ee05a9c0f9d48cdf053cb98024990c5d9912df64cfd3cece32066421d7cecd432a8d0a707aff7fc08f13795761a85a3c3cf3f7ff429b452cc363ce3f5902c1cebb43b886c00d9570986f087f396257d8a95620b002a5116bb1aa79c0f24f859d47bebbb4210866234d8dbb0b446c0ae5e96bab6dc8aa43b1c191dc4c6c92ac310ff258d8ed6edd4e0cda39e7980a73021175921a550ddcddbf7540e6fcdd8189995bbbab03f65d7245afd861004e7184c8e1f510b2a3c02a522f6161bfda09c510c711f790b public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a5821962affdd37ac4336df361ccb63989f89746 3fc14ea9c55e73878dca426515a413d0658c1833 383f726b5c7bbee0656ee75cc2c1db16ea2d07b2 8836f8f7f40cf254837aa4939cc3ba6eb783146a d6dd21723d481a676ef7aedd0ee23d5ce73308e7 c87aa46606b9c9d9addb43f33add8a9505575a7f 8ea0bcbb067b73f764d8d9cebfa9fd9127bb5c9b 41313e94fe40e2416b563eea0d6d9f665db72885 13ae96602687f14809b4e1c7d09c2ec0b556f6ca 5e15a77769e07f1feda9a612b416f3873db32947 3c9c173976c4fb76e0f452e8159cb76cf3ad1064 9eace1b7e6a57f4f625a6fa11f133ff889933c57 ef5c280dc2249cce2f3da0a5119ca28f1861362a 10a657560882dd1e529fa3f3bf26f59f4b124797 afcf95a7c9cba460f903cc68b337372f4362f27d dd7730251533070c3052a8fcc881c0d879a88e2a c79d37abd2632323b3a03e3f220e11f7d00db7b8 2c3fbf2aba8879005ae5c2f1a5161e33e1401932 5b065b0dffc27ef8d447d9bd1c3b3087bbd0aa17 935977e2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [bc:ec:20:0e:47:7f:76:ca:7b:8f:c1:59:c0:62:64:0e:7f:b2:39:74] modulus: c7ac3959f7caf5c59a7c39c20353dc8c38624c36f80d428347563a1250491aa97cdc54c5e6df5da37a34fe3b36ddd10fbf7bd3f79fadc2c2cb6e8cfb1143b3e855507a4b5afd782a40f79c05a0f13806303eb1af7ce3d69ec14ce9c3bb3f508aa9aba1490ae9d746f5c4eebb42b532695ecfe8420923d7cbe5307bbaf784523b37c315ce80c28afdbae10995bef8563dd7ab5ac9ebc3f26fd7c334bec428ec9bae1651c1fd659925d2860eb74079ff03ede97669407527e18cdb67384105821092c29a917ede28e5af8bf74783d40f8a0f61986d2d16765ba62ee850a3ca641ac7d77a3a22c359a26e56e61937fa453cd0e216751126d1eb9f2de98c0ef28d15 public exponent: 10001 ] 2022-04-28 20:14:12.491  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-28 20:14:12.492 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-28 20:14:12.493 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-04-28 20:14:12.493 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-28 20:14:12.494  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-04-28 20:14:12.494  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-28 20:14:12.494  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-28 20:14:12.494 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-28 20:14:12.494 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-28 20:14:12.495 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-28 20:14:12.498 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-28 20:14:12.499 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 20:14:12.499 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 20:14:12.499 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-28 20:14:13.302  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-28 20:14:13.303  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-28 20:14:13.303 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-28 20:14:13.304 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-28 20:14:13.305  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-28 20:14:13.306  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-28 20:14:13.306 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 20:14:13.307 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 20:14:13.307 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 20:14:13.308 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 20:14:13.308 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 20:14:13.308 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 20:14:13.309 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 20:14:13.309 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 20:14:13.310 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 20:14:13.310 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-28 20:14:13.314 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 693477145110709241014580003939919164648862450539 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 28 15:38:09 UTC 2022 Final Date: Tue Apr 27 15:38:08 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [38:bd:0b:44:a0:f5:02:7c:1f:6b:d9:97:24:06:61:2e:93:a4:9f:e0] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a5821962affdd37ac4336df361ccb63989f89746 3fc14ea9c55e73878dca426515a413d0658c1833 383f726b5c7bbee0656ee75cc2c1db16ea2d07b2 8836f8f7f40cf254837aa4939cc3ba6eb783146a d6dd21723d481a676ef7aedd0ee23d5ce73308e7 c87aa46606b9c9d9addb43f33add8a9505575a7f 8ea0bcbb067b73f764d8d9cebfa9fd9127bb5c9b 41313e94fe40e2416b563eea0d6d9f665db72885 13ae96602687f14809b4e1c7d09c2ec0b556f6ca 5e15a77769e07f1feda9a612b416f3873db32947 3c9c173976c4fb76e0f452e8159cb76cf3ad1064 9eace1b7e6a57f4f625a6fa11f133ff889933c57 ef5c280dc2249cce2f3da0a5119ca28f1861362a 10a657560882dd1e529fa3f3bf26f59f4b124797 afcf95a7c9cba460f903cc68b337372f4362f27d dd7730251533070c3052a8fcc881c0d879a88e2a c79d37abd2632323b3a03e3f220e11f7d00db7b8 2c3fbf2aba8879005ae5c2f1a5161e33e1401932 5b065b0dffc27ef8d447d9bd1c3b3087bbd0aa17 935977e2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d4:a6:3a:9d:03:a1:05:90:60:ce:53:e3:c6:57:30:d5:4e:b5:41:d7] modulus: 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 public exponent: 10001 ] 2022-04-28 20:16:37.705  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-28 20:16:37.706 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-28 20:16:37.707 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-28 20:16:37.708 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-28 20:16:37.708  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-28 20:16:37.709  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-28 20:16:37.709  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-28 20:16:37.709 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-28 20:16:37.709 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-28 20:16:37.709 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-28 20:16:37.713 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-28 20:16:37.713 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 20:16:37.713 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 20:16:37.714 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-28 20:16:37.803  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-28 20:16:37.803  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-28 20:16:37.804 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-28 20:16:37.804 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-28 20:16:37.806  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-28 20:16:37.807  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-28 20:16:37.807 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 20:16:37.808 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 20:16:37.808 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 20:16:37.809 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 20:16:37.809 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 20:16:37.810 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 20:16:37.810 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 20:16:37.811 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 20:16:37.811 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 20:16:37.812 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-28 20:16:37.816 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 693477145110709241014580003939919164648862450539 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 28 15:38:09 UTC 2022 Final Date: Tue Apr 27 15:38:08 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [38:bd:0b:44:a0:f5:02:7c:1f:6b:d9:97:24:06:61:2e:93:a4:9f:e0] modulus: c8cdc4a141734727473ebf71cb5f952c4fe9add53f4182ca8fc6dc65197b1d618f001527c92330211bb55d80539402cb3e022beab4b2ac1717b6fa2de28eaa736540dd15ce51073acd089da1f800b2a3f8c7bff36403773e2ed0900b30fe7b9be857048aa218571c99aa516f16507b70aacfdf20e2714a6885a5e7be4072c44d14c29c1e52079a6e4a25d31f0e38feee11e387bd04efb5a1e01fe3c0619e712751cc148490c66b508e06efc99fa4404cf48655b865f57befa9ba8ee05a9c0f9d48cdf053cb98024990c5d9912df64cfd3cece32066421d7cecd432a8d0a707aff7fc08f13795761a85a3c3cf3f7ff429b452cc363ce3f5902c1cebb43b886c00d9570986f087f396257d8a95620b002a5116bb1aa79c0f24f859d47bebbb4210866234d8dbb0b446c0ae5e96bab6dc8aa43b1c191dc4c6c92ac310ff258d8ed6edd4e0cda39e7980a73021175921a550ddcddbf7540e6fcdd8189995bbbab03f65d7245afd861004e7184c8e1f510b2a3c02a522f6161bfda09c510c711f790b public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a5821962affdd37ac4336df361ccb63989f89746 3fc14ea9c55e73878dca426515a413d0658c1833 383f726b5c7bbee0656ee75cc2c1db16ea2d07b2 8836f8f7f40cf254837aa4939cc3ba6eb783146a d6dd21723d481a676ef7aedd0ee23d5ce73308e7 c87aa46606b9c9d9addb43f33add8a9505575a7f 8ea0bcbb067b73f764d8d9cebfa9fd9127bb5c9b 41313e94fe40e2416b563eea0d6d9f665db72885 13ae96602687f14809b4e1c7d09c2ec0b556f6ca 5e15a77769e07f1feda9a612b416f3873db32947 3c9c173976c4fb76e0f452e8159cb76cf3ad1064 9eace1b7e6a57f4f625a6fa11f133ff889933c57 ef5c280dc2249cce2f3da0a5119ca28f1861362a 10a657560882dd1e529fa3f3bf26f59f4b124797 afcf95a7c9cba460f903cc68b337372f4362f27d dd7730251533070c3052a8fcc881c0d879a88e2a c79d37abd2632323b3a03e3f220e11f7d00db7b8 2c3fbf2aba8879005ae5c2f1a5161e33e1401932 5b065b0dffc27ef8d447d9bd1c3b3087bbd0aa17 935977e2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b4:da:32:4d:f3:d1:0c:82:78:b0:32:fe:5a:a2:31:7c:18:b3:40:3f] modulus: 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 public exponent: 10001 ] 2022-04-28 20:22:59.066  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-28 20:22:59.067 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-28 20:22:59.068 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-28 20:22:59.069 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-28 20:22:59.069  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-28 20:22:59.069  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-28 20:22:59.070  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-28 20:22:59.070 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-28 20:22:59.070 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-28 20:22:59.070 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-28 20:22:59.074 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-28 20:22:59.074 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 20:22:59.074 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-28 20:22:59.074 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-28 20:22:59.174  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-28 20:22:59.174  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-28 20:22:59.174 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-28 20:22:59.174 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-28 20:22:59.176  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-28 20:22:59.176  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-28 20:22:59.176 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 20:22:59.177 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 20:22:59.177 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 20:22:59.177 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 20:22:59.178 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 20:22:59.178 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 20:22:59.178 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-28 20:22:59.179 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-28 20:22:59.179 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-28 20:22:59.180 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-28 20:22:59.182 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 693477145110709241014580003939919164648862450539 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Apr 28 15:38:09 UTC 2022 Final Date: Tue Apr 27 15:38:08 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [38:bd:0b:44:a0:f5:02:7c:1f:6b:d9:97:24:06:61:2e:93:a4:9f:e0] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a5821962affdd37ac4336df361ccb63989f89746 3fc14ea9c55e73878dca426515a413d0658c1833 383f726b5c7bbee0656ee75cc2c1db16ea2d07b2 8836f8f7f40cf254837aa4939cc3ba6eb783146a d6dd21723d481a676ef7aedd0ee23d5ce73308e7 c87aa46606b9c9d9addb43f33add8a9505575a7f 8ea0bcbb067b73f764d8d9cebfa9fd9127bb5c9b 41313e94fe40e2416b563eea0d6d9f665db72885 13ae96602687f14809b4e1c7d09c2ec0b556f6ca 5e15a77769e07f1feda9a612b416f3873db32947 3c9c173976c4fb76e0f452e8159cb76cf3ad1064 9eace1b7e6a57f4f625a6fa11f133ff889933c57 ef5c280dc2249cce2f3da0a5119ca28f1861362a 10a657560882dd1e529fa3f3bf26f59f4b124797 afcf95a7c9cba460f903cc68b337372f4362f27d dd7730251533070c3052a8fcc881c0d879a88e2a c79d37abd2632323b3a03e3f220e11f7d00db7b8 2c3fbf2aba8879005ae5c2f1a5161e33e1401932 5b065b0dffc27ef8d447d9bd1c3b3087bbd0aa17 935977e2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [06:44:91:ef:1e:5d:2b:78:81:c8:d7:bf:6f:b2:19:c6:3a:39:8d:88] modulus: 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 public exponent: 10001 ]