2023-02-22 09:55:43,943 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2023-02-22 09:55:45,639 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2023-02-22 09:55:46.446  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Feb 22, 2023 9:55:48 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Feb 22, 2023 9:55:48 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Feb 22, 2023 9:55:48 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Feb 22, 2023 9:55:48 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2023-02-22 09:55:49.219 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2023-02-22 09:55:49.549  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2023-02-22 09:55:49.735  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2023-02-22 09:55:50.530 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2023-02-22 09:55:50.533 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2023-02-22 09:55:50.534 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2023-02-22 09:55:50.538 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2023-02-22 09:55:50.579 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2023-02-22 09:55:50.582 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2023-02-22 09:55:50.745 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2023-02-22 09:55:51.387 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Feb 22, 2023 9:55:52 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2023-02-22 09:55:52.369  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 9.487 seconds (JVM running for 17.947) Feb 22, 2023 9:56:10 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2023-02-22 12:00:27.747  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-02-22 12:00:27.763 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-02-22 12:00:27.823 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-02-22 12:00:27.828 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-02-22 12:00:27.851  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-02-22 12:00:27.854  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-02-22 12:00:27.855  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-02-22 12:00:27.856 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-02-22 12:00:27.856 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-02-22 12:00:27.861 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-02-22 12:00:27.871 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-02-22 12:00:27.875 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-02-22 12:00:28.160 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-02-22 12:00:28.167 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-02-22 12:00:28.167 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-02-22 12:00:28.170 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-02-22 12:00:28.676  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-02-22 12:00:28.678  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-02-22 12:00:28.679 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-02-22 12:00:28.680 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-02-22 12:00:28.689  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-02-22 12:00:28.690  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-02-22 12:00:28.690 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-22 12:00:28.691 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-02-22 12:00:28.691 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-02-22 12:00:28.712 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-22 12:00:28.713 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-02-22 12:00:28.714 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-02-22 12:00:28.722 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-22 12:00:28.723 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-02-22 12:00:28.723 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-02-22 12:00:28.725 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-02-22 12:00:28.762 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 332385523009171395260755279184636601653608304216 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Feb 22 09:37:10 UTC 2023 Final Date: Mon Feb 21 09:37:09 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c4:07:d8:ca:20:b2:1f:ef:e0:7e:45:84:b6:8d:10:2f:d0:c0:66:36],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 19e46bf3dcab096ac3d5e0bfdaefe6a867a5d88d cfb3a58bffe4fdb9b4fc4cdaad1f804206194ff0 80107a20d9eda1be8f509840602cccb906a50c60 d968492414fdbc82c80a94e224799483e47423ee c76cea7455c33880b78b6205bf448da584c6e0f9 067592455b8fc405649b85d491e8dbb53aa41cb8 d01b357ad4dccd367f5396af5febc474355e5ac3 e639d957f7cf4d0d357e6d9ad4af1570a2efde6a 5b195281fa6294e066c4ba09cb8fa57d45ed9ade c4e7489d18e0fa8a60e2d04328bc35c41a38e0cf 97fd53e8fcbb2dd9b43a325fccd03c6896b1d0d4 04182b230c3676969366a48d01776efcb269667e 85b6edb19a8db30186277b15e646991896561139 873db7ab3bf6cca51dc6874e06ffcc4144034cb0 3b50ff6b4c68e11b75fd75cec7b2308974bfcb13 1aec2862af53ce213391b3d77fbd96fea3fe6815 dfcda2c2025156a317a27e03ff8bd9c79443c371 9148b64baba08dfccd5b50d0b056e22886fbf569 39cf31ac88bd5bda370052e467eda95d5a882ff4 4aab36ff Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5c:cd:5a:ca:c6:9d:96:76:d3:e1:16:c3:0c:a6:9b:e6:99:04:a0:96],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-02-22 12:02:14.390  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-02-22 12:02:14.391 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-02-22 12:02:14.393 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2023-02-22 12:02:14.394 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-02-22 12:02:14.395  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2023-02-22 12:02:14.395  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-02-22 12:02:14.396  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-02-22 12:02:14.396 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-02-22 12:02:14.397 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-02-22 12:02:14.398 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-02-22 12:02:14.403 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-02-22 12:02:14.404 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-02-22 12:02:14.404 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-02-22 12:02:14.404 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-02-22 12:02:14.676  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-02-22 12:02:14.677  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-02-22 12:02:14.677 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-02-22 12:02:14.678 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-02-22 12:02:14.681  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-02-22 12:02:14.681  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-02-22 12:02:14.682 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-22 12:02:14.682 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-02-22 12:02:14.683 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-02-22 12:02:14.684 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-22 12:02:14.684 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-02-22 12:02:14.685 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-02-22 12:02:14.685 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-22 12:02:14.686 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-02-22 12:02:14.686 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-02-22 12:02:14.687 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-02-22 12:02:14.691 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 332385523009171395260755279184636601653608304216 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Feb 22 09:37:10 UTC 2023 Final Date: Mon Feb 21 09:37:09 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c4:07:d8:ca:20:b2:1f:ef:e0:7e:45:84:b6:8d:10:2f:d0:c0:66:36],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 19e46bf3dcab096ac3d5e0bfdaefe6a867a5d88d cfb3a58bffe4fdb9b4fc4cdaad1f804206194ff0 80107a20d9eda1be8f509840602cccb906a50c60 d968492414fdbc82c80a94e224799483e47423ee c76cea7455c33880b78b6205bf448da584c6e0f9 067592455b8fc405649b85d491e8dbb53aa41cb8 d01b357ad4dccd367f5396af5febc474355e5ac3 e639d957f7cf4d0d357e6d9ad4af1570a2efde6a 5b195281fa6294e066c4ba09cb8fa57d45ed9ade c4e7489d18e0fa8a60e2d04328bc35c41a38e0cf 97fd53e8fcbb2dd9b43a325fccd03c6896b1d0d4 04182b230c3676969366a48d01776efcb269667e 85b6edb19a8db30186277b15e646991896561139 873db7ab3bf6cca51dc6874e06ffcc4144034cb0 3b50ff6b4c68e11b75fd75cec7b2308974bfcb13 1aec2862af53ce213391b3d77fbd96fea3fe6815 dfcda2c2025156a317a27e03ff8bd9c79443c371 9148b64baba08dfccd5b50d0b056e22886fbf569 39cf31ac88bd5bda370052e467eda95d5a882ff4 4aab36ff Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0b:f7:fc:05:9e:ad:9d:47:df:e2:86:2e:8a:19:ac:52:5a:40:ec:e5],[56:66:d1:a4] modulus: de12023bf0db465079228c5e60f895139cee1262d3f608cfe88fc50834d0aee778f78fda12ee4871f8e09f4a9f941376fe82a758d04dff93d5444dc310c446da880abbe4e79776e084452a8a4f3ee605bff7883938f6b5432b42b212aeac0af97ec1a53c47eec6062f99307ea5b2a24d3946b7c1d12983d7599bca66628151a2c2e93a8e6e5da14bf758658f228c32910869ba7e50d1a8a9a53b97e1f195fdfaf16dd51ecbfc7d060e6b96e6b55e83a13028846e25905edea91dd81a56dc1f2749838db894b80e99cc5188e45706782995cc9758f6751081880ba65b4be75c87c0211363993a63cd659f0fbcd70852bf577c95f3929e97b7c404109d21bd9061 public exponent: 10001 ] 2023-02-22 12:04:02.278  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-02-22 12:04:02.281 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-02-22 12:04:02.282 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2023-02-22 12:04:02.283 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-02-22 12:04:02.284  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2023-02-22 12:04:02.285  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-02-22 12:04:02.285  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-02-22 12:04:02.286 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-02-22 12:04:02.286 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-02-22 12:04:02.287 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-02-22 12:04:02.292 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-02-22 12:04:02.293 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-02-22 12:04:02.293 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-02-22 12:04:02.294 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-02-22 12:04:02.516  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-02-22 12:04:02.517  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-02-22 12:04:02.518 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-02-22 12:04:02.518 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-02-22 12:04:02.522  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-02-22 12:04:02.522  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-02-22 12:04:02.523 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-22 12:04:02.523 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-02-22 12:04:02.523 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-02-22 12:04:02.524 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-22 12:04:02.524 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-02-22 12:04:02.525 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-02-22 12:04:02.525 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-22 12:04:02.526 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-02-22 12:04:02.526 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-02-22 12:04:02.527 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-02-22 12:04:02.531 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 332385523009171395260755279184636601653608304216 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Feb 22 09:37:10 UTC 2023 Final Date: Mon Feb 21 09:37:09 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c4:07:d8:ca:20:b2:1f:ef:e0:7e:45:84:b6:8d:10:2f:d0:c0:66:36],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 19e46bf3dcab096ac3d5e0bfdaefe6a867a5d88d cfb3a58bffe4fdb9b4fc4cdaad1f804206194ff0 80107a20d9eda1be8f509840602cccb906a50c60 d968492414fdbc82c80a94e224799483e47423ee c76cea7455c33880b78b6205bf448da584c6e0f9 067592455b8fc405649b85d491e8dbb53aa41cb8 d01b357ad4dccd367f5396af5febc474355e5ac3 e639d957f7cf4d0d357e6d9ad4af1570a2efde6a 5b195281fa6294e066c4ba09cb8fa57d45ed9ade c4e7489d18e0fa8a60e2d04328bc35c41a38e0cf 97fd53e8fcbb2dd9b43a325fccd03c6896b1d0d4 04182b230c3676969366a48d01776efcb269667e 85b6edb19a8db30186277b15e646991896561139 873db7ab3bf6cca51dc6874e06ffcc4144034cb0 3b50ff6b4c68e11b75fd75cec7b2308974bfcb13 1aec2862af53ce213391b3d77fbd96fea3fe6815 dfcda2c2025156a317a27e03ff8bd9c79443c371 9148b64baba08dfccd5b50d0b056e22886fbf569 39cf31ac88bd5bda370052e467eda95d5a882ff4 4aab36ff Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [42:bd:f8:9a:36:41:aa:4a:94:b2:14:de:c4:e6:1c:c1:fa:d9:5d:49],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-02-22 12:06:35.742  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-02-22 12:06:35.746 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-02-22 12:06:35.750 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-02-22 12:06:35.751 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-02-22 12:06:35.752  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-02-22 12:06:35.754  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-02-22 12:06:35.755  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-02-22 12:06:35.756 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-02-22 12:06:35.756 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-02-22 12:06:35.758 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-02-22 12:06:35.762 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-02-22 12:06:35.763 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-02-22 12:06:35.763 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-02-22 12:06:35.764 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-02-22 12:06:35.909  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-02-22 12:06:35.910  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-02-22 12:06:35.911 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-02-22 12:06:35.911 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-02-22 12:06:35.913  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-02-22 12:06:35.913  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-02-22 12:06:35.914 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-22 12:06:35.914 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-02-22 12:06:35.915 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-02-22 12:06:35.916 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-22 12:06:35.916 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-02-22 12:06:35.917 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-02-22 12:06:35.918 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-02-22 12:06:35.918 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-02-22 12:06:35.918 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-02-22 12:06:35.919 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-02-22 12:06:35.924 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 332385523009171395260755279184636601653608304216 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Feb 22 09:37:10 UTC 2023 Final Date: Mon Feb 21 09:37:09 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [c4:07:d8:ca:20:b2:1f:ef:e0:7e:45:84:b6:8d:10:2f:d0:c0:66:36],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 19e46bf3dcab096ac3d5e0bfdaefe6a867a5d88d cfb3a58bffe4fdb9b4fc4cdaad1f804206194ff0 80107a20d9eda1be8f509840602cccb906a50c60 d968492414fdbc82c80a94e224799483e47423ee c76cea7455c33880b78b6205bf448da584c6e0f9 067592455b8fc405649b85d491e8dbb53aa41cb8 d01b357ad4dccd367f5396af5febc474355e5ac3 e639d957f7cf4d0d357e6d9ad4af1570a2efde6a 5b195281fa6294e066c4ba09cb8fa57d45ed9ade c4e7489d18e0fa8a60e2d04328bc35c41a38e0cf 97fd53e8fcbb2dd9b43a325fccd03c6896b1d0d4 04182b230c3676969366a48d01776efcb269667e 85b6edb19a8db30186277b15e646991896561139 873db7ab3bf6cca51dc6874e06ffcc4144034cb0 3b50ff6b4c68e11b75fd75cec7b2308974bfcb13 1aec2862af53ce213391b3d77fbd96fea3fe6815 dfcda2c2025156a317a27e03ff8bd9c79443c371 9148b64baba08dfccd5b50d0b056e22886fbf569 39cf31ac88bd5bda370052e467eda95d5a882ff4 4aab36ff Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [81:d2:63:6b:0d:d6:d0:b2:3a:38:1e:24:bb:96:cd:94:c3:05:17:99],[56:66:d1:a4] modulus: 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 public exponent: 10001 ]