2022-11-18 11:32:28,923 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-11-18 11:32:30,320 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-11-18 11:32:31.089  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Nov 18, 2022 11:32:33 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Nov 18, 2022 11:32:33 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Nov 18, 2022 11:32:33 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Nov 18, 2022 11:32:33 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-11-18 11:32:33.857 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-11-18 11:32:34.133  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-11-18 11:32:34.314  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-11-18 11:32:34.978 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-11-18 11:32:34.980 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-11-18 11:32:34.982 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-11-18 11:32:34.985 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-11-18 11:32:35.021 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-11-18 11:32:35.024 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-11-18 11:32:35.145 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-11-18 11:32:35.755 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Nov 18, 2022 11:32:36 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-11-18 11:32:36.656  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 8.583 seconds (JVM running for 10.374) Nov 18, 2022 11:33:01 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-11-18 11:33:19.330  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-18 11:33:19.336 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-18 11:33:19.377 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-11-18 11:33:19.383 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-18 11:33:19.400  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-11-18 11:33:19.402  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-18 11:33:19.403  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-18 11:33:19.405 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-18 11:33:19.405 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-18 11:33:19.409 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-18 11:33:19.417 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-18 11:33:19.420 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-18 11:33:19.492 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-18 11:33:19.501 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-18 11:33:19.503 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-18 11:33:19.506 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-18 11:33:20.380  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-18 11:33:20.385  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-18 11:33:20.386 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-18 11:33:20.389 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-18 11:33:20.404  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-18 11:33:20.405  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-18 11:33:20.406 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 11:33:20.407 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-18 11:33:20.407 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-18 11:33:20.433 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 11:33:20.434 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-18 11:33:20.434 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-18 11:33:20.441 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 11:33:20.441 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-18 11:33:20.441 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-18 11:33:20.443 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-18 11:33:20.480 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 264615270662292841690625017522374185256956760947 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 18 11:30:13 UTC 2022 Final Date: Wed Nov 17 11:30:12 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a1:9b:2b:b1:ba:98:07:d1:e3:df:6a:54:47:72:6d:79:db:dd:8b:59],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6902b4802b5000d510818d0643ec8118a4e9c861 134a943c4294aa43d28ff5dd9b10fe40ce6f76d2 9f05facfdcd82f051bdbe61fac0c206331bae43c d4e94544a1ca69a82622cac80b6c549fd44f26fb 03c61c18a3da7785e9c5322b56991e607c520af0 5c7692ce0b82290251f65ebc329a465e639d28a9 ca12636734549d088884af2b0390be4146f17260 07b3ffb1273c20647bd895f4356a6f1ecef1fb7f 823db61cb89cc454250677a301ca026d0b9a937a fb792412e8da4f6d9c219a01bad08230e70e7e3a 250fc9d34f497a448d12ef20bf3b9741a3564041 bfc06e1820df591e5c3363df61df02ce1b15a85c c95f617d4be5c8def4812fd609bb633c320861cf 025944da711b4dea6b3d53cde418743bbbfaa133 007b05c554dd1b5c85c6c3062575fbe5e9e946d6 cbfc05653fa34f3f664a1b141b3addd0e6090b93 9a6e982873db30a0f7cafa30bacf5d10c9f21ccd 858b688bb41b03ad93cc697b34e1613282629001 87f13ad1346a71f524d26027b26a805833706ad6 07fc09d2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0a:c6:71:f1:d9:04:11:73:db:e7:8d:0a:13:e9:eb:68:6f:50:cc:9e],[56:66:d1:a4] modulus: 9b1712fcc5beb280773d2d9f733f02375117edeecf22a0668056ee714e715c613546b7ae402575f1d9201f3c56c4884eaac2224f50a643e61585f84892dc386bf53339b73645efe435cc67cfd1d536c166ca9172aa425c247e9cd88a95324759819ec3ce81f9ace651c7c216d45a786475ff60e284a1ee7ddd7cb76e5ac840559d47a32108b498e48584c2a7ba1d25d8517c48aa49067ff4505cdcbf24df8ba28a03dd8d49bb0ddbc4faa39cc960261860f0306bba45d615e207a8648b1200501840f9f80801687c7321a496c1bbf7ccbf592b3550fae696b82373e3137331e25e866e3741a371235bd193fef999f18fcd45473148083fe7f4a2c543dea33f09 public exponent: 10001 ] 2022-11-18 13:00:42.785  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-18 13:00:42.789 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-18 13:00:42.791 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-18 13:00:42.795 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-18 13:00:42.796  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-18 13:00:42.797  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-18 13:00:42.798  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-18 13:00:42.799 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-18 13:00:42.799 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-18 13:00:42.801 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-18 13:00:42.811 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-18 13:00:42.814 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-18 13:00:42.815 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-18 13:00:42.816 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-18 13:00:43.175  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-18 13:00:43.177  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-18 13:00:43.177 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-18 13:00:43.178 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-18 13:00:43.182  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-18 13:00:43.182  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-18 13:00:43.183 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 13:00:43.183 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-18 13:00:43.184 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-18 13:00:43.185 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 13:00:43.186 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-18 13:00:43.187 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-18 13:00:43.189 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 13:00:43.190 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-18 13:00:43.190 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-18 13:00:43.193 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-18 13:00:43.202 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 264615270662292841690625017522374185256956760947 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 18 11:30:13 UTC 2022 Final Date: Wed Nov 17 11:30:12 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a1:9b:2b:b1:ba:98:07:d1:e3:df:6a:54:47:72:6d:79:db:dd:8b:59],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6902b4802b5000d510818d0643ec8118a4e9c861 134a943c4294aa43d28ff5dd9b10fe40ce6f76d2 9f05facfdcd82f051bdbe61fac0c206331bae43c d4e94544a1ca69a82622cac80b6c549fd44f26fb 03c61c18a3da7785e9c5322b56991e607c520af0 5c7692ce0b82290251f65ebc329a465e639d28a9 ca12636734549d088884af2b0390be4146f17260 07b3ffb1273c20647bd895f4356a6f1ecef1fb7f 823db61cb89cc454250677a301ca026d0b9a937a fb792412e8da4f6d9c219a01bad08230e70e7e3a 250fc9d34f497a448d12ef20bf3b9741a3564041 bfc06e1820df591e5c3363df61df02ce1b15a85c c95f617d4be5c8def4812fd609bb633c320861cf 025944da711b4dea6b3d53cde418743bbbfaa133 007b05c554dd1b5c85c6c3062575fbe5e9e946d6 cbfc05653fa34f3f664a1b141b3addd0e6090b93 9a6e982873db30a0f7cafa30bacf5d10c9f21ccd 858b688bb41b03ad93cc697b34e1613282629001 87f13ad1346a71f524d26027b26a805833706ad6 07fc09d2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f4:8d:82:50:c3:5b:3f:aa:3a:28:fb:b5:e9:bf:20:40:6e:f6:df:93],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-18 13:02:14.485  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-18 13:02:14.486 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-18 13:02:14.489 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-11-18 13:02:14.490 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-18 13:02:14.490  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-11-18 13:02:14.491  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-18 13:02:14.492  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-18 13:02:14.493 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-18 13:02:14.493 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-18 13:02:14.494 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-18 13:02:14.501 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-18 13:02:14.502 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-18 13:02:14.502 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-18 13:02:14.503 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-18 13:02:14.643  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-18 13:02:14.643  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-18 13:02:14.644 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-18 13:02:14.644 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-18 13:02:14.647  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-18 13:02:14.647  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-18 13:02:14.648 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 13:02:14.648 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-18 13:02:14.649 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-18 13:02:14.650 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 13:02:14.650 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-18 13:02:14.650 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-18 13:02:14.651 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 13:02:14.652 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-18 13:02:14.652 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-18 13:02:14.653 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-18 13:02:14.657 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 264615270662292841690625017522374185256956760947 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 18 11:30:13 UTC 2022 Final Date: Wed Nov 17 11:30:12 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a1:9b:2b:b1:ba:98:07:d1:e3:df:6a:54:47:72:6d:79:db:dd:8b:59],[56:66:d1:a4] modulus: ac4a799395f476e472c2c92bfbf0eeed442b031880750ecf58b8b6661d08f05a05e2c4a7f264df89e3c62033b39944c14965cd16de53fda5283487d668d36944656b45b05fc4f2a33d08ccda8c9979352d5d04c6b0fb37f37d86f0393083ab602ff9a26a322124dcaed15b35b921a954414dc3090af57d5e46958d09635879a082b2ce76bc197a6bbfa2f29d9dbb6763fc5302b627f18510d46306391da761953cfd922912e856fe39ce4b5d46fc2484fdf12213fafd8b0b8d8efbdd71f46c884b238b63eded1d76ac12e2c694b09ae1f3cc0b1047e3ea761e658507cb9dea51612b12c37b5bcbe11509495ae388057dda1f966f848ddcc01a4d1092a5decf0dc77e26ecd10f193514356d0017d667f713a5979a49c631ea9fcbe6ef8b5cd1406b6186e738c747c9c37caa650796f8f0df36534b86fd8ea04f2a4645a7fdf3f5de5ab523db5925d0c9d0786a348597c6e0a83ab40a7d9640d6113f3355ad5ecdeaa95820be3dd4fd25950cc688f1bf47fac1635ea75cc120e407b13287433135 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6902b4802b5000d510818d0643ec8118a4e9c861 134a943c4294aa43d28ff5dd9b10fe40ce6f76d2 9f05facfdcd82f051bdbe61fac0c206331bae43c d4e94544a1ca69a82622cac80b6c549fd44f26fb 03c61c18a3da7785e9c5322b56991e607c520af0 5c7692ce0b82290251f65ebc329a465e639d28a9 ca12636734549d088884af2b0390be4146f17260 07b3ffb1273c20647bd895f4356a6f1ecef1fb7f 823db61cb89cc454250677a301ca026d0b9a937a fb792412e8da4f6d9c219a01bad08230e70e7e3a 250fc9d34f497a448d12ef20bf3b9741a3564041 bfc06e1820df591e5c3363df61df02ce1b15a85c c95f617d4be5c8def4812fd609bb633c320861cf 025944da711b4dea6b3d53cde418743bbbfaa133 007b05c554dd1b5c85c6c3062575fbe5e9e946d6 cbfc05653fa34f3f664a1b141b3addd0e6090b93 9a6e982873db30a0f7cafa30bacf5d10c9f21ccd 858b688bb41b03ad93cc697b34e1613282629001 87f13ad1346a71f524d26027b26a805833706ad6 07fc09d2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [bf:1e:47:7c:81:a2:09:cb:12:13:37:8c:61:f1:2a:1d:30:cd:bc:fe],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-18 13:03:36.712  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-18 13:03:36.713 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-18 13:03:36.715 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-11-18 13:03:36.715 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-18 13:03:36.716  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-11-18 13:03:36.716  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-18 13:03:36.717  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-18 13:03:36.717 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-18 13:03:36.718 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-18 13:03:36.718 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-18 13:03:36.722 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-18 13:03:36.722 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-18 13:03:36.723 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-18 13:03:36.723 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-18 13:03:36.871  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-18 13:03:36.871  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-18 13:03:36.872 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-18 13:03:36.872 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-18 13:03:36.874  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-18 13:03:36.875  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-18 13:03:36.875 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 13:03:36.876 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-18 13:03:36.876 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-18 13:03:36.877 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 13:03:36.877 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-18 13:03:36.878 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-18 13:03:36.879 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 13:03:36.879 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-18 13:03:36.879 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-18 13:03:36.880 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-18 13:03:36.884 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 264615270662292841690625017522374185256956760947 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 18 11:30:13 UTC 2022 Final Date: Wed Nov 17 11:30:12 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a1:9b:2b:b1:ba:98:07:d1:e3:df:6a:54:47:72:6d:79:db:dd:8b:59],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6902b4802b5000d510818d0643ec8118a4e9c861 134a943c4294aa43d28ff5dd9b10fe40ce6f76d2 9f05facfdcd82f051bdbe61fac0c206331bae43c d4e94544a1ca69a82622cac80b6c549fd44f26fb 03c61c18a3da7785e9c5322b56991e607c520af0 5c7692ce0b82290251f65ebc329a465e639d28a9 ca12636734549d088884af2b0390be4146f17260 07b3ffb1273c20647bd895f4356a6f1ecef1fb7f 823db61cb89cc454250677a301ca026d0b9a937a fb792412e8da4f6d9c219a01bad08230e70e7e3a 250fc9d34f497a448d12ef20bf3b9741a3564041 bfc06e1820df591e5c3363df61df02ce1b15a85c c95f617d4be5c8def4812fd609bb633c320861cf 025944da711b4dea6b3d53cde418743bbbfaa133 007b05c554dd1b5c85c6c3062575fbe5e9e946d6 cbfc05653fa34f3f664a1b141b3addd0e6090b93 9a6e982873db30a0f7cafa30bacf5d10c9f21ccd 858b688bb41b03ad93cc697b34e1613282629001 87f13ad1346a71f524d26027b26a805833706ad6 07fc09d2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [da:38:62:1c:8d:76:34:68:8f:e5:54:a6:0c:37:a8:bb:2e:f2:32:e7],[56:66:d1:a4] modulus: db6f887cc08c51ca7e3a5a64923daed1b0f1977349ca31cb53b775187da7eb1a5796561dfb3f9d48d17b448a90145717c82dbd76cbb43e83a9e6a2ddd8babf860d651ada81ff4565e0a2b23dcd14edc4cb17c345eaf248d06c095512b745659a6b8d722f98773b2d668b828c4b4a996c9484ec434fc3fb510237079bcc949d697cdbe7dca2e4acbb67609eae4f5ed64c7cff270d8c70e07d6604d5840e626c5d72f7887cab5c35baf008d1c8a64beb44e70d3f810a13b3bf5fe92b1a02b56f7ac6407d6669d99e64d1748ccf3575c82ed10b5e38194a460200597aa48f87305f4d1dec4d3b723fbf653a7d7e67a84468cbe9c785ccc176f0b5ce9ad1a76c191d public exponent: 10001 ] 2022-11-18 13:06:01.578  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-18 13:06:01.581 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-18 13:06:01.583 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-18 13:06:01.584 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-18 13:06:01.585  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-18 13:06:01.585  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-18 13:06:01.586  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-18 13:06:01.586 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-18 13:06:01.587 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-18 13:06:01.587 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-18 13:06:01.592 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-18 13:06:01.592 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-18 13:06:01.593 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-18 13:06:01.593 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-18 13:06:01.770  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-18 13:06:01.770  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-18 13:06:01.771 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-18 13:06:01.771 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-18 13:06:01.772  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-18 13:06:01.773  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-18 13:06:01.773 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 13:06:01.774 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-18 13:06:01.774 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-18 13:06:01.775 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 13:06:01.775 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-18 13:06:01.775 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-18 13:06:01.776 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 13:06:01.777 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-18 13:06:01.777 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-18 13:06:01.778 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-18 13:06:01.781 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 264615270662292841690625017522374185256956760947 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 18 11:30:13 UTC 2022 Final Date: Wed Nov 17 11:30:12 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a1:9b:2b:b1:ba:98:07:d1:e3:df:6a:54:47:72:6d:79:db:dd:8b:59],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6902b4802b5000d510818d0643ec8118a4e9c861 134a943c4294aa43d28ff5dd9b10fe40ce6f76d2 9f05facfdcd82f051bdbe61fac0c206331bae43c d4e94544a1ca69a82622cac80b6c549fd44f26fb 03c61c18a3da7785e9c5322b56991e607c520af0 5c7692ce0b82290251f65ebc329a465e639d28a9 ca12636734549d088884af2b0390be4146f17260 07b3ffb1273c20647bd895f4356a6f1ecef1fb7f 823db61cb89cc454250677a301ca026d0b9a937a fb792412e8da4f6d9c219a01bad08230e70e7e3a 250fc9d34f497a448d12ef20bf3b9741a3564041 bfc06e1820df591e5c3363df61df02ce1b15a85c c95f617d4be5c8def4812fd609bb633c320861cf 025944da711b4dea6b3d53cde418743bbbfaa133 007b05c554dd1b5c85c6c3062575fbe5e9e946d6 cbfc05653fa34f3f664a1b141b3addd0e6090b93 9a6e982873db30a0f7cafa30bacf5d10c9f21ccd 858b688bb41b03ad93cc697b34e1613282629001 87f13ad1346a71f524d26027b26a805833706ad6 07fc09d2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6c:9b:b4:a5:8a:f5:a4:7b:e1:86:6a:08:27:41:d5:12:29:da:6f:02],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-18 13:13:24.865  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-18 13:13:24.870 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-18 13:13:24.873 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-18 13:13:24.875 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-18 13:13:24.875  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-18 13:13:24.880  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-18 13:13:24.881  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-18 13:13:24.881 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-18 13:13:24.882 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-18 13:13:24.882 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-18 13:13:24.907 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-18 13:13:24.914 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-18 13:13:24.915 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-18 13:13:24.915 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-18 13:13:25.054  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-18 13:13:25.054  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-18 13:13:25.055 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-18 13:13:25.055 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-18 13:13:25.056  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-18 13:13:25.056  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-18 13:13:25.057 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 13:13:25.057 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-18 13:13:25.057 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-18 13:13:25.058 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 13:13:25.058 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-18 13:13:25.058 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-18 13:13:25.059 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 13:13:25.059 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-18 13:13:25.060 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-18 13:13:25.060 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-18 13:13:25.063 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 264615270662292841690625017522374185256956760947 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 18 11:30:13 UTC 2022 Final Date: Wed Nov 17 11:30:12 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a1:9b:2b:b1:ba:98:07:d1:e3:df:6a:54:47:72:6d:79:db:dd:8b:59],[56:66:d1:a4] modulus: ac4a799395f476e472c2c92bfbf0eeed442b031880750ecf58b8b6661d08f05a05e2c4a7f264df89e3c62033b39944c14965cd16de53fda5283487d668d36944656b45b05fc4f2a33d08ccda8c9979352d5d04c6b0fb37f37d86f0393083ab602ff9a26a322124dcaed15b35b921a954414dc3090af57d5e46958d09635879a082b2ce76bc197a6bbfa2f29d9dbb6763fc5302b627f18510d46306391da761953cfd922912e856fe39ce4b5d46fc2484fdf12213fafd8b0b8d8efbdd71f46c884b238b63eded1d76ac12e2c694b09ae1f3cc0b1047e3ea761e658507cb9dea51612b12c37b5bcbe11509495ae388057dda1f966f848ddcc01a4d1092a5decf0dc77e26ecd10f193514356d0017d667f713a5979a49c631ea9fcbe6ef8b5cd1406b6186e738c747c9c37caa650796f8f0df36534b86fd8ea04f2a4645a7fdf3f5de5ab523db5925d0c9d0786a348597c6e0a83ab40a7d9640d6113f3355ad5ecdeaa95820be3dd4fd25950cc688f1bf47fac1635ea75cc120e407b13287433135 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6902b4802b5000d510818d0643ec8118a4e9c861 134a943c4294aa43d28ff5dd9b10fe40ce6f76d2 9f05facfdcd82f051bdbe61fac0c206331bae43c d4e94544a1ca69a82622cac80b6c549fd44f26fb 03c61c18a3da7785e9c5322b56991e607c520af0 5c7692ce0b82290251f65ebc329a465e639d28a9 ca12636734549d088884af2b0390be4146f17260 07b3ffb1273c20647bd895f4356a6f1ecef1fb7f 823db61cb89cc454250677a301ca026d0b9a937a fb792412e8da4f6d9c219a01bad08230e70e7e3a 250fc9d34f497a448d12ef20bf3b9741a3564041 bfc06e1820df591e5c3363df61df02ce1b15a85c c95f617d4be5c8def4812fd609bb633c320861cf 025944da711b4dea6b3d53cde418743bbbfaa133 007b05c554dd1b5c85c6c3062575fbe5e9e946d6 cbfc05653fa34f3f664a1b141b3addd0e6090b93 9a6e982873db30a0f7cafa30bacf5d10c9f21ccd 858b688bb41b03ad93cc697b34e1613282629001 87f13ad1346a71f524d26027b26a805833706ad6 07fc09d2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [57:3f:63:4e:07:04:52:93:e0:fd:af:da:e8:1f:54:93:bd:3a:11:cb],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-18 13:18:10.263  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-18 13:18:10.270 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-18 13:18:10.274 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-18 13:18:10.275 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-18 13:18:10.276  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-18 13:18:10.276  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-18 13:18:10.277  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-18 13:18:10.277 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-18 13:18:10.278 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-18 13:18:10.278 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-18 13:18:10.282 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-18 13:18:10.283 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-18 13:18:10.284 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-18 13:18:10.284 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-18 13:18:10.435  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-18 13:18:10.436  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-18 13:18:10.436 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-18 13:18:10.437 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-18 13:18:10.438  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-18 13:18:10.438  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-18 13:18:10.439 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 13:18:10.439 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-18 13:18:10.439 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-18 13:18:10.440 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 13:18:10.440 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-18 13:18:10.441 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-18 13:18:10.441 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 13:18:10.443 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-18 13:18:10.443 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-18 13:18:10.444 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-18 13:18:10.447 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 264615270662292841690625017522374185256956760947 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 18 11:30:13 UTC 2022 Final Date: Wed Nov 17 11:30:12 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a1:9b:2b:b1:ba:98:07:d1:e3:df:6a:54:47:72:6d:79:db:dd:8b:59],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6902b4802b5000d510818d0643ec8118a4e9c861 134a943c4294aa43d28ff5dd9b10fe40ce6f76d2 9f05facfdcd82f051bdbe61fac0c206331bae43c d4e94544a1ca69a82622cac80b6c549fd44f26fb 03c61c18a3da7785e9c5322b56991e607c520af0 5c7692ce0b82290251f65ebc329a465e639d28a9 ca12636734549d088884af2b0390be4146f17260 07b3ffb1273c20647bd895f4356a6f1ecef1fb7f 823db61cb89cc454250677a301ca026d0b9a937a fb792412e8da4f6d9c219a01bad08230e70e7e3a 250fc9d34f497a448d12ef20bf3b9741a3564041 bfc06e1820df591e5c3363df61df02ce1b15a85c c95f617d4be5c8def4812fd609bb633c320861cf 025944da711b4dea6b3d53cde418743bbbfaa133 007b05c554dd1b5c85c6c3062575fbe5e9e946d6 cbfc05653fa34f3f664a1b141b3addd0e6090b93 9a6e982873db30a0f7cafa30bacf5d10c9f21ccd 858b688bb41b03ad93cc697b34e1613282629001 87f13ad1346a71f524d26027b26a805833706ad6 07fc09d2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8f:cd:62:56:1f:fa:24:b9:1e:09:09:38:f8:f8:38:8c:06:ab:36:78],[56:66:d1:a4] modulus: e7ba0c9ae0e0c2105ab7d7ff8a2b2362222f1b8e6e9290b13054ceea1d1d81bc85460e6eaea6ee3b6b0d640b7b5d869f935e71ad2f41bc4b43f54a896544c6e08936c6d4d7fe19d1fb2730b5bc0cf064e5f79b4d7016f707dd8d6f9be2de8aebaa289379dde7f2fab45a2b97ce942da6980ea836119d2ddecc25e232adc2f51d7402f027be06b07ad6a45ddd8207b4ee78acc7de3293f50e768630d365977645433f60c4c61a9c8d87e61b4949e78aa4005ce24e2cd6a63c72539c2db2e677cfc6130fe0f6f464e46b2989892177a482ee3eccedc7df5b7d6a0f94e9655704bb2d186aabfd78a0d87c3d0742df41ceb06dd2ad13eb2d6cca1fa02d4d8869eb25 public exponent: 10001 ] 2022-11-18 13:27:14.207  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-18 13:27:14.210 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-18 13:27:14.223 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-11-18 13:27:14.225 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-18 13:27:14.225  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-11-18 13:27:14.226  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-18 13:27:14.227  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-18 13:27:14.227 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-18 13:27:14.227 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-18 13:27:14.228 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-18 13:27:14.233 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-18 13:27:14.234 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-18 13:27:14.234 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-18 13:27:14.234 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-18 13:27:14.478  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-18 13:27:14.478  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-18 13:27:14.479 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-18 13:27:14.479 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-18 13:27:14.480  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-18 13:27:14.480  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-18 13:27:14.481 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 13:27:14.481 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-18 13:27:14.481 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-18 13:27:14.482 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 13:27:14.482 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-18 13:27:14.483 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-18 13:27:14.483 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 13:27:14.483 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-18 13:27:14.484 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-18 13:27:14.484 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-18 13:27:14.491 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 264615270662292841690625017522374185256956760947 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 18 11:30:13 UTC 2022 Final Date: Wed Nov 17 11:30:12 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a1:9b:2b:b1:ba:98:07:d1:e3:df:6a:54:47:72:6d:79:db:dd:8b:59],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6902b4802b5000d510818d0643ec8118a4e9c861 134a943c4294aa43d28ff5dd9b10fe40ce6f76d2 9f05facfdcd82f051bdbe61fac0c206331bae43c d4e94544a1ca69a82622cac80b6c549fd44f26fb 03c61c18a3da7785e9c5322b56991e607c520af0 5c7692ce0b82290251f65ebc329a465e639d28a9 ca12636734549d088884af2b0390be4146f17260 07b3ffb1273c20647bd895f4356a6f1ecef1fb7f 823db61cb89cc454250677a301ca026d0b9a937a fb792412e8da4f6d9c219a01bad08230e70e7e3a 250fc9d34f497a448d12ef20bf3b9741a3564041 bfc06e1820df591e5c3363df61df02ce1b15a85c c95f617d4be5c8def4812fd609bb633c320861cf 025944da711b4dea6b3d53cde418743bbbfaa133 007b05c554dd1b5c85c6c3062575fbe5e9e946d6 cbfc05653fa34f3f664a1b141b3addd0e6090b93 9a6e982873db30a0f7cafa30bacf5d10c9f21ccd 858b688bb41b03ad93cc697b34e1613282629001 87f13ad1346a71f524d26027b26a805833706ad6 07fc09d2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c4:e2:19:ee:5e:06:5c:bb:69:ba:02:56:a5:b8:b4:34:9c:a4:e9:47],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-18 13:33:01.267  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-18 13:33:01.271 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-18 13:33:01.273 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-18 13:33:01.273 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-18 13:33:01.274  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-18 13:33:01.274  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-18 13:33:01.274  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-18 13:33:01.275 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-18 13:33:01.275 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-18 13:33:01.275 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-18 13:33:01.279 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-18 13:33:01.280 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-18 13:33:01.280 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-18 13:33:01.280 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-18 13:33:01.441  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-18 13:33:01.444  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-18 13:33:01.445 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-18 13:33:01.445 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-18 13:33:01.446  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-18 13:33:01.446  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-18 13:33:01.447 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 13:33:01.447 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-18 13:33:01.447 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-18 13:33:01.448 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 13:33:01.448 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-18 13:33:01.448 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-18 13:33:01.449 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 13:33:01.449 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-18 13:33:01.450 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-18 13:33:01.451 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-18 13:33:01.453 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 264615270662292841690625017522374185256956760947 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 18 11:30:13 UTC 2022 Final Date: Wed Nov 17 11:30:12 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a1:9b:2b:b1:ba:98:07:d1:e3:df:6a:54:47:72:6d:79:db:dd:8b:59],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6902b4802b5000d510818d0643ec8118a4e9c861 134a943c4294aa43d28ff5dd9b10fe40ce6f76d2 9f05facfdcd82f051bdbe61fac0c206331bae43c d4e94544a1ca69a82622cac80b6c549fd44f26fb 03c61c18a3da7785e9c5322b56991e607c520af0 5c7692ce0b82290251f65ebc329a465e639d28a9 ca12636734549d088884af2b0390be4146f17260 07b3ffb1273c20647bd895f4356a6f1ecef1fb7f 823db61cb89cc454250677a301ca026d0b9a937a fb792412e8da4f6d9c219a01bad08230e70e7e3a 250fc9d34f497a448d12ef20bf3b9741a3564041 bfc06e1820df591e5c3363df61df02ce1b15a85c c95f617d4be5c8def4812fd609bb633c320861cf 025944da711b4dea6b3d53cde418743bbbfaa133 007b05c554dd1b5c85c6c3062575fbe5e9e946d6 cbfc05653fa34f3f664a1b141b3addd0e6090b93 9a6e982873db30a0f7cafa30bacf5d10c9f21ccd 858b688bb41b03ad93cc697b34e1613282629001 87f13ad1346a71f524d26027b26a805833706ad6 07fc09d2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [32:0a:ce:6c:09:a5:84:8a:9c:8b:fe:11:f1:df:28:69:a4:e0:86:be],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-18 13:33:16.624  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-18 13:33:16.625 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-18 13:33:16.628 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-18 13:33:16.628 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-18 13:33:16.629  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-18 13:33:16.629  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-18 13:33:16.630  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-18 13:33:16.631 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-18 13:33:16.631 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-18 13:33:16.632 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-18 13:33:16.637 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-18 13:33:16.638 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-18 13:33:16.638 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-18 13:33:16.638 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-18 13:33:16.806  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-18 13:33:16.807  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-18 13:33:16.807 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-18 13:33:16.808 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-18 13:33:16.809  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-18 13:33:16.809  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-18 13:33:16.810 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 13:33:16.810 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-18 13:33:16.810 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-18 13:33:16.811 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 13:33:16.812 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-18 13:33:16.812 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-18 13:33:16.812 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 13:33:16.813 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-18 13:33:16.813 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-18 13:33:16.814 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-18 13:33:16.817 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 264615270662292841690625017522374185256956760947 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 18 11:30:13 UTC 2022 Final Date: Wed Nov 17 11:30:12 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a1:9b:2b:b1:ba:98:07:d1:e3:df:6a:54:47:72:6d:79:db:dd:8b:59],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6902b4802b5000d510818d0643ec8118a4e9c861 134a943c4294aa43d28ff5dd9b10fe40ce6f76d2 9f05facfdcd82f051bdbe61fac0c206331bae43c d4e94544a1ca69a82622cac80b6c549fd44f26fb 03c61c18a3da7785e9c5322b56991e607c520af0 5c7692ce0b82290251f65ebc329a465e639d28a9 ca12636734549d088884af2b0390be4146f17260 07b3ffb1273c20647bd895f4356a6f1ecef1fb7f 823db61cb89cc454250677a301ca026d0b9a937a fb792412e8da4f6d9c219a01bad08230e70e7e3a 250fc9d34f497a448d12ef20bf3b9741a3564041 bfc06e1820df591e5c3363df61df02ce1b15a85c c95f617d4be5c8def4812fd609bb633c320861cf 025944da711b4dea6b3d53cde418743bbbfaa133 007b05c554dd1b5c85c6c3062575fbe5e9e946d6 cbfc05653fa34f3f664a1b141b3addd0e6090b93 9a6e982873db30a0f7cafa30bacf5d10c9f21ccd 858b688bb41b03ad93cc697b34e1613282629001 87f13ad1346a71f524d26027b26a805833706ad6 07fc09d2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b0:5c:40:d8:8b:b5:4f:08:03:a6:27:74:e4:f5:34:79:b7:bc:36:de],[56:66:d1:a4] modulus: c5d34d1e4a53310248d1b75da11211b4c22bba42087ec6a45a466cae380a2ac78eb1dd5a98b095a3bf53c853562aee9ed695809b730f652023182bcbd18ad5972302f14bd1e9f974dd9cadf9f74c17758b566241b1ca98c53ffb4ed318d4fa7314409a69490114aafbbfa9336237109864c1915a0aeb32b24e155c6a6d6257ae156416d9ec3fba861f010854f2e391045da68215648a6fedece014da373174f10d072d739c1296ca680505042a77a3a8d469395940bdc1f654014db48ce42f35b3d9ea3fa705c57a1704bd8a6e271aeda3f8bd7dbd53f1c63cca528344b089dbb95d9b25b087d5cacf2d68714c19cc2abbac7b88cc59006418bcc3e586e5287f public exponent: 10001 ] 2022-11-18 14:01:49.526  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-18 14:01:49.529 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-18 14:01:49.531 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-18 14:01:49.532 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-18 14:01:49.533  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-18 14:01:49.533  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-18 14:01:49.534  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-18 14:01:49.534 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-18 14:01:49.535 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-18 14:01:49.535 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-18 14:01:49.540 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-18 14:01:49.541 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-18 14:01:49.541 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-18 14:01:49.542 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-18 14:01:49.689  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-18 14:01:49.690  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-18 14:01:49.690 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-18 14:01:49.691 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-18 14:01:49.693  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-18 14:01:49.694  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-18 14:01:49.694 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 14:01:49.694 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-18 14:01:49.695 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-18 14:01:49.696 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 14:01:49.696 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-18 14:01:49.696 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-18 14:01:49.697 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 14:01:49.698 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-18 14:01:49.698 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-18 14:01:49.699 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-18 14:01:49.712 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 264615270662292841690625017522374185256956760947 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 18 11:30:13 UTC 2022 Final Date: Wed Nov 17 11:30:12 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a1:9b:2b:b1:ba:98:07:d1:e3:df:6a:54:47:72:6d:79:db:dd:8b:59],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6902b4802b5000d510818d0643ec8118a4e9c861 134a943c4294aa43d28ff5dd9b10fe40ce6f76d2 9f05facfdcd82f051bdbe61fac0c206331bae43c d4e94544a1ca69a82622cac80b6c549fd44f26fb 03c61c18a3da7785e9c5322b56991e607c520af0 5c7692ce0b82290251f65ebc329a465e639d28a9 ca12636734549d088884af2b0390be4146f17260 07b3ffb1273c20647bd895f4356a6f1ecef1fb7f 823db61cb89cc454250677a301ca026d0b9a937a fb792412e8da4f6d9c219a01bad08230e70e7e3a 250fc9d34f497a448d12ef20bf3b9741a3564041 bfc06e1820df591e5c3363df61df02ce1b15a85c c95f617d4be5c8def4812fd609bb633c320861cf 025944da711b4dea6b3d53cde418743bbbfaa133 007b05c554dd1b5c85c6c3062575fbe5e9e946d6 cbfc05653fa34f3f664a1b141b3addd0e6090b93 9a6e982873db30a0f7cafa30bacf5d10c9f21ccd 858b688bb41b03ad93cc697b34e1613282629001 87f13ad1346a71f524d26027b26a805833706ad6 07fc09d2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b4:58:f5:a9:37:40:72:55:d2:fa:48:e0:7e:5a:fb:7f:0d:8a:54:e2],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-18 14:01:56.570  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-18 14:01:56.571 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-18 14:01:56.574 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-18 14:01:56.574 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-18 14:01:56.575  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-18 14:01:56.575  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-18 14:01:56.576  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-18 14:01:56.576 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-18 14:01:56.578 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-18 14:01:56.579 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-18 14:01:56.582 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-18 14:01:56.583 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-18 14:01:56.583 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-18 14:01:56.583 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-18 14:01:56.686  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-18 14:01:56.687  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-18 14:01:56.687 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-18 14:01:56.689 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-18 14:01:56.690  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-18 14:01:56.690  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-18 14:01:56.691 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 14:01:56.691 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-18 14:01:56.691 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-18 14:01:56.693 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 14:01:56.693 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-18 14:01:56.694 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-18 14:01:56.695 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-18 14:01:56.696 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-18 14:01:56.696 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-18 14:01:56.697 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-18 14:01:56.699 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 264615270662292841690625017522374185256956760947 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 18 11:30:13 UTC 2022 Final Date: Wed Nov 17 11:30:12 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a1:9b:2b:b1:ba:98:07:d1:e3:df:6a:54:47:72:6d:79:db:dd:8b:59],[56:66:d1:a4] modulus: ac4a799395f476e472c2c92bfbf0eeed442b031880750ecf58b8b6661d08f05a05e2c4a7f264df89e3c62033b39944c14965cd16de53fda5283487d668d36944656b45b05fc4f2a33d08ccda8c9979352d5d04c6b0fb37f37d86f0393083ab602ff9a26a322124dcaed15b35b921a954414dc3090af57d5e46958d09635879a082b2ce76bc197a6bbfa2f29d9dbb6763fc5302b627f18510d46306391da761953cfd922912e856fe39ce4b5d46fc2484fdf12213fafd8b0b8d8efbdd71f46c884b238b63eded1d76ac12e2c694b09ae1f3cc0b1047e3ea761e658507cb9dea51612b12c37b5bcbe11509495ae388057dda1f966f848ddcc01a4d1092a5decf0dc77e26ecd10f193514356d0017d667f713a5979a49c631ea9fcbe6ef8b5cd1406b6186e738c747c9c37caa650796f8f0df36534b86fd8ea04f2a4645a7fdf3f5de5ab523db5925d0c9d0786a348597c6e0a83ab40a7d9640d6113f3355ad5ecdeaa95820be3dd4fd25950cc688f1bf47fac1635ea75cc120e407b13287433135 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6902b4802b5000d510818d0643ec8118a4e9c861 134a943c4294aa43d28ff5dd9b10fe40ce6f76d2 9f05facfdcd82f051bdbe61fac0c206331bae43c d4e94544a1ca69a82622cac80b6c549fd44f26fb 03c61c18a3da7785e9c5322b56991e607c520af0 5c7692ce0b82290251f65ebc329a465e639d28a9 ca12636734549d088884af2b0390be4146f17260 07b3ffb1273c20647bd895f4356a6f1ecef1fb7f 823db61cb89cc454250677a301ca026d0b9a937a fb792412e8da4f6d9c219a01bad08230e70e7e3a 250fc9d34f497a448d12ef20bf3b9741a3564041 bfc06e1820df591e5c3363df61df02ce1b15a85c c95f617d4be5c8def4812fd609bb633c320861cf 025944da711b4dea6b3d53cde418743bbbfaa133 007b05c554dd1b5c85c6c3062575fbe5e9e946d6 cbfc05653fa34f3f664a1b141b3addd0e6090b93 9a6e982873db30a0f7cafa30bacf5d10c9f21ccd 858b688bb41b03ad93cc697b34e1613282629001 87f13ad1346a71f524d26027b26a805833706ad6 07fc09d2 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [33:10:11:66:f6:49:84:17:ab:cf:ff:34:7d:6d:37:76:aa:cc:ff:5c],[56:66:d1:a4] modulus: 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 public exponent: 10001 ]