2022-07-07 03:33:22,665 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-07-07 03:33:24,183 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-07-07 03:33:25.167  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Jul 07, 2022 3:33:28 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jul 07, 2022 3:33:28 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jul 07, 2022 3:33:28 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jul 07, 2022 3:33:28 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-07-07 03:33:29.450 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-07-07 03:33:29.897  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-07-07 03:33:30.171  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-07-07 03:33:31.372 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-07-07 03:33:31.378 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-07-07 03:33:31.380 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-07-07 03:33:31.387 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-07-07 03:33:31.440 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) 2022-07-07 03:33:31.447 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-07-07 03:33:31.635 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-07-07 03:33:32.465 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jul 07, 2022 3:33:33 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-07-07 03:33:33.545  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 12.001 seconds (JVM running for 14.514) Jul 07, 2022 3:33:54 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-07-07 03:34:29.042  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-07 03:34:29.055 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-07 03:34:29.110 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-07-07 03:34:29.117 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-07 03:34:29.142  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-07-07 03:34:29.146  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-07 03:34:29.148  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-07 03:34:29.150 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-07 03:34:29.150 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-07 03:34:29.155 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-07 03:34:29.164 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-07 03:34:29.170 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-07 03:34:29.219 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-07 03:34:29.226 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-07 03:34:29.228 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-07 03:34:29.233 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-07 03:34:30.123  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-07 03:34:30.127  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-07 03:34:30.128 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-07 03:34:30.130 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-07 03:34:30.145  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-07 03:34:30.147  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-07 03:34:30.149 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-07 03:34:30.149 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-07 03:34:30.150 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-07 03:34:30.167 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-07 03:34:30.168 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-07 03:34:30.169 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-07 03:34:30.179 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-07 03:34:30.180 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-07 03:34:30.180 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-07 03:34:30.183 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-07 03:34:30.228 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 261318776211531600269814961323108254942233957019 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jul 07 03:27:26 UTC 2022 Final Date: Tue Jul 06 03:27:25 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b4:d9:68:6e:28:30:4b:01:b2:f4:00:75:bc:d7:50:f9:2c:b7:42:4d] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 342a7431812229144b778db7bfd7b87dfd29ce02 358595d44a1a845a876e509782148b1758a0e31b f1582644464b5c781751243786e5d19464d1e264 aa90d5eac4016ab6b684879afe54aa6a083ad6fc 411928b4bcad74a6ad9bada22286134067e68a78 b0e59b79366ddda29633bfa7a3d04e16253036bc 981aaaf2bc4e63bf9b96ff0f8b75cff6bd1175ba 699b6761cd13ba0edc090ed4cb65ec929887bc66 4970d4d566d6b523a184b06425db5d90ebc551e9 ca1f0b9f01aa34077de44d2c0675a8368bd30e61 1ce2ec5f7b7ff9bc8f78f44f129251ad7291ed56 dd306c8901eb00af37724f33b8ea60e391bbe534 9a427bb820391afc04516345f3c6875222424800 b43deb58d5f2fb51fd8fe06eea157a6460764e2b 6ef3196c0bb78d67d598ce7c7f7ac7ef7b53f9b4 514f39ff4bb94e162e1e3882fca80c271f533b48 c7d0a4f7d534e987b0a48138fd4141bfe85c84c8 2c1a918be1bcd4ee12869c1fcf6bdb77778957d4 d99b9a71da1e39ff8b29bf116f6f8ef03d66eb4f f7f2edd2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ce:03:13:f7:dc:77:41:d5:bf:a3:33:30:1c:9a:b5:ba:c4:29:5d:37] modulus: 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 public exponent: 10001 ] 2022-07-07 04:48:17.608  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-07 04:48:17.613 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-07 04:48:17.618 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-07 04:48:17.620 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-07 04:48:17.622  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-07 04:48:17.623  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-07 04:48:17.624  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-07 04:48:17.625 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-07 04:48:17.627 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-07 04:48:17.629 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-07 04:48:17.642 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-07 04:48:17.644 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-07 04:48:17.645 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-07 04:48:17.646 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-07 04:48:18.044  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-07 04:48:18.045  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-07 04:48:18.045 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-07 04:48:18.046 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-07 04:48:18.050  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-07 04:48:18.051  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-07 04:48:18.052 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-07 04:48:18.052 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-07 04:48:18.053 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-07 04:48:18.054 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-07 04:48:18.054 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-07 04:48:18.055 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-07 04:48:18.056 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-07 04:48:18.056 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-07 04:48:18.057 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-07 04:48:18.058 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-07 04:48:18.064 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 261318776211531600269814961323108254942233957019 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jul 07 03:27:26 UTC 2022 Final Date: Tue Jul 06 03:27:25 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b4:d9:68:6e:28:30:4b:01:b2:f4:00:75:bc:d7:50:f9:2c:b7:42:4d] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 342a7431812229144b778db7bfd7b87dfd29ce02 358595d44a1a845a876e509782148b1758a0e31b f1582644464b5c781751243786e5d19464d1e264 aa90d5eac4016ab6b684879afe54aa6a083ad6fc 411928b4bcad74a6ad9bada22286134067e68a78 b0e59b79366ddda29633bfa7a3d04e16253036bc 981aaaf2bc4e63bf9b96ff0f8b75cff6bd1175ba 699b6761cd13ba0edc090ed4cb65ec929887bc66 4970d4d566d6b523a184b06425db5d90ebc551e9 ca1f0b9f01aa34077de44d2c0675a8368bd30e61 1ce2ec5f7b7ff9bc8f78f44f129251ad7291ed56 dd306c8901eb00af37724f33b8ea60e391bbe534 9a427bb820391afc04516345f3c6875222424800 b43deb58d5f2fb51fd8fe06eea157a6460764e2b 6ef3196c0bb78d67d598ce7c7f7ac7ef7b53f9b4 514f39ff4bb94e162e1e3882fca80c271f533b48 c7d0a4f7d534e987b0a48138fd4141bfe85c84c8 2c1a918be1bcd4ee12869c1fcf6bdb77778957d4 d99b9a71da1e39ff8b29bf116f6f8ef03d66eb4f f7f2edd2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a0:ca:39:01:8b:c5:f8:62:f4:65:0f:ae:71:20:49:70:c1:73:d5:26] modulus: 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 public exponent: 10001 ] 2022-07-07 04:50:05.729  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-07 04:50:05.731 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-07 04:50:05.733 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-07-07 04:50:05.734 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-07 04:50:05.734  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-07-07 04:50:05.735  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-07 04:50:05.736  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-07 04:50:05.737 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-07 04:50:05.737 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-07 04:50:05.738 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-07 04:50:05.752 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-07 04:50:05.755 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-07 04:50:05.756 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-07 04:50:05.757 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-07 04:50:06.404  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-07 04:50:06.405  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-07 04:50:06.406 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-07 04:50:06.406 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-07 04:50:06.411  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-07 04:50:06.412  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-07 04:50:06.413 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-07 04:50:06.414 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-07 04:50:06.414 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-07 04:50:06.419 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-07 04:50:06.420 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-07 04:50:06.421 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-07 04:50:06.423 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-07 04:50:06.423 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-07 04:50:06.423 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-07 04:50:06.425 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-07 04:50:06.431 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 261318776211531600269814961323108254942233957019 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jul 07 03:27:26 UTC 2022 Final Date: Tue Jul 06 03:27:25 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b4:d9:68:6e:28:30:4b:01:b2:f4:00:75:bc:d7:50:f9:2c:b7:42:4d] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 342a7431812229144b778db7bfd7b87dfd29ce02 358595d44a1a845a876e509782148b1758a0e31b f1582644464b5c781751243786e5d19464d1e264 aa90d5eac4016ab6b684879afe54aa6a083ad6fc 411928b4bcad74a6ad9bada22286134067e68a78 b0e59b79366ddda29633bfa7a3d04e16253036bc 981aaaf2bc4e63bf9b96ff0f8b75cff6bd1175ba 699b6761cd13ba0edc090ed4cb65ec929887bc66 4970d4d566d6b523a184b06425db5d90ebc551e9 ca1f0b9f01aa34077de44d2c0675a8368bd30e61 1ce2ec5f7b7ff9bc8f78f44f129251ad7291ed56 dd306c8901eb00af37724f33b8ea60e391bbe534 9a427bb820391afc04516345f3c6875222424800 b43deb58d5f2fb51fd8fe06eea157a6460764e2b 6ef3196c0bb78d67d598ce7c7f7ac7ef7b53f9b4 514f39ff4bb94e162e1e3882fca80c271f533b48 c7d0a4f7d534e987b0a48138fd4141bfe85c84c8 2c1a918be1bcd4ee12869c1fcf6bdb77778957d4 d99b9a71da1e39ff8b29bf116f6f8ef03d66eb4f f7f2edd2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [af:75:9d:47:08:c8:ac:f0:86:f0:b2:08:8f:3d:b4:09:f8:60:d8:d5] modulus: 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 public exponent: 10001 ] 2022-07-07 04:51:07.370  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-07 04:51:07.373 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-07 04:51:07.376 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-07-07 04:51:07.377 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-07 04:51:07.378  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-07-07 04:51:07.380  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-07 04:51:07.384  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-07 04:51:07.385 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-07 04:51:07.386 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-07 04:51:07.386 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-07 04:51:07.394 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-07 04:51:07.395 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-07 04:51:07.396 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-07 04:51:07.396 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-07 04:51:07.729  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-07 04:51:07.730  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-07 04:51:07.730 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-07 04:51:07.730 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-07 04:51:07.733  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-07 04:51:07.733  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-07 04:51:07.734 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-07 04:51:07.734 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-07 04:51:07.735 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-07 04:51:07.736 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-07 04:51:07.736 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-07 04:51:07.736 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-07 04:51:07.737 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-07 04:51:07.737 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-07 04:51:07.738 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-07 04:51:07.739 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-07 04:51:07.742 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 261318776211531600269814961323108254942233957019 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jul 07 03:27:26 UTC 2022 Final Date: Tue Jul 06 03:27:25 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b4:d9:68:6e:28:30:4b:01:b2:f4:00:75:bc:d7:50:f9:2c:b7:42:4d] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 342a7431812229144b778db7bfd7b87dfd29ce02 358595d44a1a845a876e509782148b1758a0e31b f1582644464b5c781751243786e5d19464d1e264 aa90d5eac4016ab6b684879afe54aa6a083ad6fc 411928b4bcad74a6ad9bada22286134067e68a78 b0e59b79366ddda29633bfa7a3d04e16253036bc 981aaaf2bc4e63bf9b96ff0f8b75cff6bd1175ba 699b6761cd13ba0edc090ed4cb65ec929887bc66 4970d4d566d6b523a184b06425db5d90ebc551e9 ca1f0b9f01aa34077de44d2c0675a8368bd30e61 1ce2ec5f7b7ff9bc8f78f44f129251ad7291ed56 dd306c8901eb00af37724f33b8ea60e391bbe534 9a427bb820391afc04516345f3c6875222424800 b43deb58d5f2fb51fd8fe06eea157a6460764e2b 6ef3196c0bb78d67d598ce7c7f7ac7ef7b53f9b4 514f39ff4bb94e162e1e3882fca80c271f533b48 c7d0a4f7d534e987b0a48138fd4141bfe85c84c8 2c1a918be1bcd4ee12869c1fcf6bdb77778957d4 d99b9a71da1e39ff8b29bf116f6f8ef03d66eb4f f7f2edd2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b4:02:a9:8d:de:c1:0f:48:59:74:ce:7b:95:b4:02:c4:7a:07:7f:49] modulus: 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 public exponent: 10001 ] 2022-07-07 04:53:03.536  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-07 04:53:03.539 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-07 04:53:03.541 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-07 04:53:03.543 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-07 04:53:03.543  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-07 04:53:03.544  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-07 04:53:03.545  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-07 04:53:03.545 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-07 04:53:03.546 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-07 04:53:03.546 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-07 04:53:03.552 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-07 04:53:03.554 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-07 04:53:03.554 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-07 04:53:03.555 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-07 04:53:04.078  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-07 04:53:04.078  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-07 04:53:04.079 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-07 04:53:04.079 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-07 04:53:04.082  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-07 04:53:04.082  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-07 04:53:04.083 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-07 04:53:04.084 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-07 04:53:04.084 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-07 04:53:04.086 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-07 04:53:04.086 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-07 04:53:04.087 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-07 04:53:04.087 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-07 04:53:04.088 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-07 04:53:04.088 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-07 04:53:04.089 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-07 04:53:04.099 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 261318776211531600269814961323108254942233957019 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jul 07 03:27:26 UTC 2022 Final Date: Tue Jul 06 03:27:25 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b4:d9:68:6e:28:30:4b:01:b2:f4:00:75:bc:d7:50:f9:2c:b7:42:4d] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 342a7431812229144b778db7bfd7b87dfd29ce02 358595d44a1a845a876e509782148b1758a0e31b f1582644464b5c781751243786e5d19464d1e264 aa90d5eac4016ab6b684879afe54aa6a083ad6fc 411928b4bcad74a6ad9bada22286134067e68a78 b0e59b79366ddda29633bfa7a3d04e16253036bc 981aaaf2bc4e63bf9b96ff0f8b75cff6bd1175ba 699b6761cd13ba0edc090ed4cb65ec929887bc66 4970d4d566d6b523a184b06425db5d90ebc551e9 ca1f0b9f01aa34077de44d2c0675a8368bd30e61 1ce2ec5f7b7ff9bc8f78f44f129251ad7291ed56 dd306c8901eb00af37724f33b8ea60e391bbe534 9a427bb820391afc04516345f3c6875222424800 b43deb58d5f2fb51fd8fe06eea157a6460764e2b 6ef3196c0bb78d67d598ce7c7f7ac7ef7b53f9b4 514f39ff4bb94e162e1e3882fca80c271f533b48 c7d0a4f7d534e987b0a48138fd4141bfe85c84c8 2c1a918be1bcd4ee12869c1fcf6bdb77778957d4 d99b9a71da1e39ff8b29bf116f6f8ef03d66eb4f f7f2edd2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [dc:e5:07:7e:e0:23:4a:6f:82:05:22:56:a7:de:7f:df:28:a4:e8:9c] modulus: a8bbad61aaec1d094cb07e022fdf63ae2648d44c1e3c68c31ae113d66b89f0964ca954b99f1532c3f41d1aacc06be6379600337450eb13f0554441717ace1c19664c000b8d8fda8e8d87942efe25086f1bac26fcee33fb1d86623aa44e761e5fb093e7e75586e27d2491bdb7ef0c4e38e36c4bfc32ab014ab3e6536ba64bb5c8429a68767d52c4e6c24242d2e440e24e7fef3cdb49b4026779b7e02db92890f90eebbde458f1f2f3fab4f84f1ea47c78ed65c3eaa22490f98c58237b05825b615292bc330a9a5b189730587feede9cef29bc8097697831d1dc5e5e759ca8d0d0ff01343e69147dce541381b70d1539e4a4869625956a2feb9d26f8ba4236d5f3 public exponent: 10001 ] 2022-07-07 04:56:33.879  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-07 04:56:33.885 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-07 04:56:33.887 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-07 04:56:33.888 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-07 04:56:33.889  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-07 04:56:33.889  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-07 04:56:33.890  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-07 04:56:33.890 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-07 04:56:33.891 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-07 04:56:33.892 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-07 04:56:33.899 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-07 04:56:33.899 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-07 04:56:33.900 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-07 04:56:33.900 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-07 04:56:34.604  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-07 04:56:34.606  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-07 04:56:34.606 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-07 04:56:34.607 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-07 04:56:34.609  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-07 04:56:34.610  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-07 04:56:34.610 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-07 04:56:34.611 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-07 04:56:34.611 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-07 04:56:34.613 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-07 04:56:34.613 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-07 04:56:34.614 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-07 04:56:34.615 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-07 04:56:34.616 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-07 04:56:34.616 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-07 04:56:34.617 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-07 04:56:34.644 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 261318776211531600269814961323108254942233957019 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jul 07 03:27:26 UTC 2022 Final Date: Tue Jul 06 03:27:25 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b4:d9:68:6e:28:30:4b:01:b2:f4:00:75:bc:d7:50:f9:2c:b7:42:4d] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 342a7431812229144b778db7bfd7b87dfd29ce02 358595d44a1a845a876e509782148b1758a0e31b f1582644464b5c781751243786e5d19464d1e264 aa90d5eac4016ab6b684879afe54aa6a083ad6fc 411928b4bcad74a6ad9bada22286134067e68a78 b0e59b79366ddda29633bfa7a3d04e16253036bc 981aaaf2bc4e63bf9b96ff0f8b75cff6bd1175ba 699b6761cd13ba0edc090ed4cb65ec929887bc66 4970d4d566d6b523a184b06425db5d90ebc551e9 ca1f0b9f01aa34077de44d2c0675a8368bd30e61 1ce2ec5f7b7ff9bc8f78f44f129251ad7291ed56 dd306c8901eb00af37724f33b8ea60e391bbe534 9a427bb820391afc04516345f3c6875222424800 b43deb58d5f2fb51fd8fe06eea157a6460764e2b 6ef3196c0bb78d67d598ce7c7f7ac7ef7b53f9b4 514f39ff4bb94e162e1e3882fca80c271f533b48 c7d0a4f7d534e987b0a48138fd4141bfe85c84c8 2c1a918be1bcd4ee12869c1fcf6bdb77778957d4 d99b9a71da1e39ff8b29bf116f6f8ef03d66eb4f f7f2edd2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7b:6e:22:01:f3:3b:42:7b:52:8b:c3:8b:a2:e0:da:4b:b2:4b:e9:f0] modulus: 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 public exponent: 10001 ] 2022-07-07 04:59:36.369  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-07 04:59:36.372 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-07 04:59:36.387 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-07 04:59:36.396 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-07 04:59:36.397  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-07 04:59:36.399  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-07 04:59:36.400  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-07 04:59:36.400 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-07 04:59:36.401 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-07 04:59:36.403 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-07 04:59:36.413 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-07 04:59:36.415 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-07 04:59:36.416 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-07 04:59:36.416 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-07 04:59:36.728  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-07 04:59:36.729  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-07 04:59:36.730 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-07 04:59:36.730 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-07 04:59:36.732  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-07 04:59:36.733  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-07 04:59:36.734 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-07 04:59:36.735 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-07 04:59:36.736 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-07 04:59:36.737 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-07 04:59:36.738 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-07 04:59:36.738 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-07 04:59:36.740 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-07 04:59:36.741 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-07 04:59:36.741 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-07 04:59:36.744 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-07 04:59:36.750 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 261318776211531600269814961323108254942233957019 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jul 07 03:27:26 UTC 2022 Final Date: Tue Jul 06 03:27:25 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b4:d9:68:6e:28:30:4b:01:b2:f4:00:75:bc:d7:50:f9:2c:b7:42:4d] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 342a7431812229144b778db7bfd7b87dfd29ce02 358595d44a1a845a876e509782148b1758a0e31b f1582644464b5c781751243786e5d19464d1e264 aa90d5eac4016ab6b684879afe54aa6a083ad6fc 411928b4bcad74a6ad9bada22286134067e68a78 b0e59b79366ddda29633bfa7a3d04e16253036bc 981aaaf2bc4e63bf9b96ff0f8b75cff6bd1175ba 699b6761cd13ba0edc090ed4cb65ec929887bc66 4970d4d566d6b523a184b06425db5d90ebc551e9 ca1f0b9f01aa34077de44d2c0675a8368bd30e61 1ce2ec5f7b7ff9bc8f78f44f129251ad7291ed56 dd306c8901eb00af37724f33b8ea60e391bbe534 9a427bb820391afc04516345f3c6875222424800 b43deb58d5f2fb51fd8fe06eea157a6460764e2b 6ef3196c0bb78d67d598ce7c7f7ac7ef7b53f9b4 514f39ff4bb94e162e1e3882fca80c271f533b48 c7d0a4f7d534e987b0a48138fd4141bfe85c84c8 2c1a918be1bcd4ee12869c1fcf6bdb77778957d4 d99b9a71da1e39ff8b29bf116f6f8ef03d66eb4f f7f2edd2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9b:7f:df:f7:d9:c3:cc:ea:e7:82:cc:92:79:51:68:e3:f5:dd:da:0c] modulus: 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 public exponent: 10001 ] 2022-07-07 05:00:32.982  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-07 05:00:32.984 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-07 05:00:32.985 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-07 05:00:32.986 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-07 05:00:32.986  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-07 05:00:32.987  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-07 05:00:32.987  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-07 05:00:32.988 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-07 05:00:32.988 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-07 05:00:32.989 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-07 05:00:32.995 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-07 05:00:33.001 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-07 05:00:33.002 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-07 05:00:33.002 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-07 05:00:33.317  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-07 05:00:33.319  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-07 05:00:33.320 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-07 05:00:33.320 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-07 05:00:33.322  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-07 05:00:33.323  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-07 05:00:33.324 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-07 05:00:33.324 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-07 05:00:33.324 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-07 05:00:33.326 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-07 05:00:33.326 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-07 05:00:33.327 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-07 05:00:33.328 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-07 05:00:33.328 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-07 05:00:33.329 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-07 05:00:33.330 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-07 05:00:33.335 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 261318776211531600269814961323108254942233957019 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jul 07 03:27:26 UTC 2022 Final Date: Tue Jul 06 03:27:25 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b4:d9:68:6e:28:30:4b:01:b2:f4:00:75:bc:d7:50:f9:2c:b7:42:4d] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 342a7431812229144b778db7bfd7b87dfd29ce02 358595d44a1a845a876e509782148b1758a0e31b f1582644464b5c781751243786e5d19464d1e264 aa90d5eac4016ab6b684879afe54aa6a083ad6fc 411928b4bcad74a6ad9bada22286134067e68a78 b0e59b79366ddda29633bfa7a3d04e16253036bc 981aaaf2bc4e63bf9b96ff0f8b75cff6bd1175ba 699b6761cd13ba0edc090ed4cb65ec929887bc66 4970d4d566d6b523a184b06425db5d90ebc551e9 ca1f0b9f01aa34077de44d2c0675a8368bd30e61 1ce2ec5f7b7ff9bc8f78f44f129251ad7291ed56 dd306c8901eb00af37724f33b8ea60e391bbe534 9a427bb820391afc04516345f3c6875222424800 b43deb58d5f2fb51fd8fe06eea157a6460764e2b 6ef3196c0bb78d67d598ce7c7f7ac7ef7b53f9b4 514f39ff4bb94e162e1e3882fca80c271f533b48 c7d0a4f7d534e987b0a48138fd4141bfe85c84c8 2c1a918be1bcd4ee12869c1fcf6bdb77778957d4 d99b9a71da1e39ff8b29bf116f6f8ef03d66eb4f f7f2edd2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [03:89:99:a0:8b:5a:d3:74:d7:7d:2d:61:ca:57:71:ca:dc:78:7a:e3] modulus: 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 public exponent: 10001 ] 2022-07-07 05:04:32.949  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-07 05:04:32.954 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-07 05:04:32.959 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-07 05:04:32.961 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-07 05:04:32.962  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-07-07 05:04:32.963  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-07 05:04:32.964  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-07 05:04:32.965 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-07 05:04:32.966 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-07 05:04:32.967 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-07 05:04:32.977 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-07 05:04:32.979 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-07 05:04:32.979 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-07 05:04:32.980 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-07 05:04:33.594  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-07 05:04:33.599  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-07 05:04:33.601 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-07 05:04:33.605 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-07 05:04:33.618  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-07 05:04:33.620  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-07 05:04:33.621 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-07 05:04:33.621 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-07 05:04:33.622 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-07 05:04:33.624 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-07 05:04:33.624 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-07 05:04:33.625 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-07 05:04:33.626 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-07 05:04:33.627 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-07 05:04:33.627 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-07 05:04:33.628 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-07 05:04:33.636 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 261318776211531600269814961323108254942233957019 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jul 07 03:27:26 UTC 2022 Final Date: Tue Jul 06 03:27:25 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b4:d9:68:6e:28:30:4b:01:b2:f4:00:75:bc:d7:50:f9:2c:b7:42:4d] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 342a7431812229144b778db7bfd7b87dfd29ce02 358595d44a1a845a876e509782148b1758a0e31b f1582644464b5c781751243786e5d19464d1e264 aa90d5eac4016ab6b684879afe54aa6a083ad6fc 411928b4bcad74a6ad9bada22286134067e68a78 b0e59b79366ddda29633bfa7a3d04e16253036bc 981aaaf2bc4e63bf9b96ff0f8b75cff6bd1175ba 699b6761cd13ba0edc090ed4cb65ec929887bc66 4970d4d566d6b523a184b06425db5d90ebc551e9 ca1f0b9f01aa34077de44d2c0675a8368bd30e61 1ce2ec5f7b7ff9bc8f78f44f129251ad7291ed56 dd306c8901eb00af37724f33b8ea60e391bbe534 9a427bb820391afc04516345f3c6875222424800 b43deb58d5f2fb51fd8fe06eea157a6460764e2b 6ef3196c0bb78d67d598ce7c7f7ac7ef7b53f9b4 514f39ff4bb94e162e1e3882fca80c271f533b48 c7d0a4f7d534e987b0a48138fd4141bfe85c84c8 2c1a918be1bcd4ee12869c1fcf6bdb77778957d4 d99b9a71da1e39ff8b29bf116f6f8ef03d66eb4f f7f2edd2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [00:77:ba:b3:c1:38:34:c0:9d:df:bb:71:5e:b6:66:62:42:d3:ae:41] modulus: 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 public exponent: 10001 ] 2022-07-07 05:04:41.875  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-07 05:04:41.876 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-07 05:04:41.878 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-07-07 05:04:41.879 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-07 05:04:41.880  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-07-07 05:04:41.880  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-07 05:04:41.881  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-07 05:04:41.881 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-07 05:04:41.882 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-07 05:04:41.882 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-07 05:04:41.889 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-07 05:04:41.890 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-07 05:04:41.891 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-07 05:04:41.891 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-07 05:04:42.430  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-07 05:04:42.431  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-07 05:04:42.432 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-07 05:04:42.432 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-07 05:04:42.434  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-07 05:04:42.434  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-07 05:04:42.435 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-07 05:04:42.435 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-07 05:04:42.436 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-07 05:04:42.436 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-07 05:04:42.437 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-07 05:04:42.437 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-07 05:04:42.438 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-07 05:04:42.438 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-07 05:04:42.439 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-07 05:04:42.440 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-07 05:04:42.443 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 261318776211531600269814961323108254942233957019 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jul 07 03:27:26 UTC 2022 Final Date: Tue Jul 06 03:27:25 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b4:d9:68:6e:28:30:4b:01:b2:f4:00:75:bc:d7:50:f9:2c:b7:42:4d] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 342a7431812229144b778db7bfd7b87dfd29ce02 358595d44a1a845a876e509782148b1758a0e31b f1582644464b5c781751243786e5d19464d1e264 aa90d5eac4016ab6b684879afe54aa6a083ad6fc 411928b4bcad74a6ad9bada22286134067e68a78 b0e59b79366ddda29633bfa7a3d04e16253036bc 981aaaf2bc4e63bf9b96ff0f8b75cff6bd1175ba 699b6761cd13ba0edc090ed4cb65ec929887bc66 4970d4d566d6b523a184b06425db5d90ebc551e9 ca1f0b9f01aa34077de44d2c0675a8368bd30e61 1ce2ec5f7b7ff9bc8f78f44f129251ad7291ed56 dd306c8901eb00af37724f33b8ea60e391bbe534 9a427bb820391afc04516345f3c6875222424800 b43deb58d5f2fb51fd8fe06eea157a6460764e2b 6ef3196c0bb78d67d598ce7c7f7ac7ef7b53f9b4 514f39ff4bb94e162e1e3882fca80c271f533b48 c7d0a4f7d534e987b0a48138fd4141bfe85c84c8 2c1a918be1bcd4ee12869c1fcf6bdb77778957d4 d99b9a71da1e39ff8b29bf116f6f8ef03d66eb4f f7f2edd2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d2:9a:bd:1a:ae:fd:05:72:74:7e:86:0d:88:6a:99:16:5f:8b:18:6d] modulus: 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 public exponent: 10001 ] 2022-07-07 05:10:47.282  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-07 05:10:47.285 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-07 05:10:47.288 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-07-07 05:10:47.297 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-07 05:10:47.298  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-07-07 05:10:47.304  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-07 05:10:47.305  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-07 05:10:47.305 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-07 05:10:47.306 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-07 05:10:47.306 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-07 05:10:47.316 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-07 05:10:47.317 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-07 05:10:47.317 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-07 05:10:47.318 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-07 05:10:47.778  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-07 05:10:47.779  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-07 05:10:47.779 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-07 05:10:47.779 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-07 05:10:47.781  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-07 05:10:47.782  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-07 05:10:47.782 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-07 05:10:47.783 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-07 05:10:47.783 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-07 05:10:47.790 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-07 05:10:47.790 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-07 05:10:47.791 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-07 05:10:47.791 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-07 05:10:47.792 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-07 05:10:47.792 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-07 05:10:47.793 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-07 05:10:47.799 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 261318776211531600269814961323108254942233957019 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jul 07 03:27:26 UTC 2022 Final Date: Tue Jul 06 03:27:25 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b4:d9:68:6e:28:30:4b:01:b2:f4:00:75:bc:d7:50:f9:2c:b7:42:4d] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 342a7431812229144b778db7bfd7b87dfd29ce02 358595d44a1a845a876e509782148b1758a0e31b f1582644464b5c781751243786e5d19464d1e264 aa90d5eac4016ab6b684879afe54aa6a083ad6fc 411928b4bcad74a6ad9bada22286134067e68a78 b0e59b79366ddda29633bfa7a3d04e16253036bc 981aaaf2bc4e63bf9b96ff0f8b75cff6bd1175ba 699b6761cd13ba0edc090ed4cb65ec929887bc66 4970d4d566d6b523a184b06425db5d90ebc551e9 ca1f0b9f01aa34077de44d2c0675a8368bd30e61 1ce2ec5f7b7ff9bc8f78f44f129251ad7291ed56 dd306c8901eb00af37724f33b8ea60e391bbe534 9a427bb820391afc04516345f3c6875222424800 b43deb58d5f2fb51fd8fe06eea157a6460764e2b 6ef3196c0bb78d67d598ce7c7f7ac7ef7b53f9b4 514f39ff4bb94e162e1e3882fca80c271f533b48 c7d0a4f7d534e987b0a48138fd4141bfe85c84c8 2c1a918be1bcd4ee12869c1fcf6bdb77778957d4 d99b9a71da1e39ff8b29bf116f6f8ef03d66eb4f f7f2edd2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [38:39:4b:35:fd:75:94:44:4b:19:62:dc:06:c0:6e:f0:70:57:a9:50] modulus: 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 public exponent: 10001 ] 2022-07-07 05:11:04.577  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-07-07 05:11:04.579 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-07-07 05:11:04.583 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-07-07 05:11:04.584 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-07-07 05:11:04.584  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-07-07 05:11:04.585  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-07-07 05:11:04.585  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-07-07 05:11:04.586 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-07-07 05:11:04.586 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-07-07 05:11:04.590 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-07-07 05:11:04.610 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-07-07 05:11:04.612 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-07 05:11:04.614 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-07-07 05:11:04.615 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-07 05:11:04.844  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-07-07 05:11:04.844  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-07-07 05:11:04.845 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-07-07 05:11:04.845 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-07-07 05:11:04.846  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-07-07 05:11:04.846  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-07-07 05:11:04.847 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-07 05:11:04.847 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-07 05:11:04.847 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-07 05:11:04.848 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-07 05:11:04.848 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-07 05:11:04.848 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-07 05:11:04.849 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-07-07 05:11:04.849 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-07-07 05:11:04.849 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-07-07 05:11:04.850 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-07-07 05:11:04.854 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 261318776211531600269814961323108254942233957019 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Thu Jul 07 03:27:26 UTC 2022 Final Date: Tue Jul 06 03:27:25 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [b4:d9:68:6e:28:30:4b:01:b2:f4:00:75:bc:d7:50:f9:2c:b7:42:4d] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 342a7431812229144b778db7bfd7b87dfd29ce02 358595d44a1a845a876e509782148b1758a0e31b f1582644464b5c781751243786e5d19464d1e264 aa90d5eac4016ab6b684879afe54aa6a083ad6fc 411928b4bcad74a6ad9bada22286134067e68a78 b0e59b79366ddda29633bfa7a3d04e16253036bc 981aaaf2bc4e63bf9b96ff0f8b75cff6bd1175ba 699b6761cd13ba0edc090ed4cb65ec929887bc66 4970d4d566d6b523a184b06425db5d90ebc551e9 ca1f0b9f01aa34077de44d2c0675a8368bd30e61 1ce2ec5f7b7ff9bc8f78f44f129251ad7291ed56 dd306c8901eb00af37724f33b8ea60e391bbe534 9a427bb820391afc04516345f3c6875222424800 b43deb58d5f2fb51fd8fe06eea157a6460764e2b 6ef3196c0bb78d67d598ce7c7f7ac7ef7b53f9b4 514f39ff4bb94e162e1e3882fca80c271f533b48 c7d0a4f7d534e987b0a48138fd4141bfe85c84c8 2c1a918be1bcd4ee12869c1fcf6bdb77778957d4 d99b9a71da1e39ff8b29bf116f6f8ef03d66eb4f f7f2edd2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d1:2f:71:05:ec:d8:ee:e4:01:5f:04:da:f9:93:bd:48:5d:d8:d8:b5] modulus: c01d08eb7a3b8e70b9901d7c442a40a65c6e2bf5a8c9150c60d7b3a83b732430ee08e4cc67ab4f20d117f7f0b313fe0592ae89b0d7c2a8ff4a474f9ea83f5585d3a270a308629d83170485049d1182094b4ff4640fe501fdc07a972935faa9b94b8b07d94cb46079ff79b1056f662f4ce29fc0a5a8714966d871f3ce1c12cad1ba297fb70e0e251d40f677af7561fd1c59e201cf9744cd2e25a941e47b5caecba1f6c16e0d2df152b65c18a4c8393e42bf833aa9d8262a12c456b439ed82b991ad24524253ac7f7d7bc222b141e859400fe9a17accde95d373b802438f888ec2c94ce4a67c45763d3f61ed5d46850b5400dfd0a6a38279ebb7c8138ff7f40a17 public exponent: 10001 ]