2022-12-28 11:48:11,620 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-12-28 11:48:15,367 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-12-28 11:48:17.817  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Dec 28, 2022 11:48:25 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Dec 28, 2022 11:48:25 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Dec 28, 2022 11:48:25 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Dec 28, 2022 11:48:25 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-12-28 11:48:27.024 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-12-28 11:48:27.702  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-12-28 11:48:28.145  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-12-28 11:48:30.341 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-12-28 11:48:30.350 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-12-28 11:48:30.352 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-12-28 11:48:30.357 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-12-28 11:48:30.420 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-12-28 11:48:30.424 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-12-28 11:48:30.789 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-12-28 11:48:32.528 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Dec 28, 2022 11:48:33 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-12-28 11:48:34.052  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 27.556 seconds (JVM running for 38.885) Dec 28, 2022 11:48:38 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-12-28 13:04:44.461  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-12-28 13:04:44.496 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-12-28 13:04:44.621 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-28 13:04:44.634 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-28 13:04:44.722  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-28 13:04:44.730  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-12-28 13:04:44.732  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-12-28 13:04:44.735 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-12-28 13:04:44.736 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-28 13:04:44.744 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-12-28 13:04:44.767 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-12-28 13:04:44.776 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-12-28 13:04:44.936 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-12-28 13:04:45.532 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-28 13:04:45.542 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-28 13:04:45.549 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-28 13:04:46.823  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-12-28 13:04:46.828  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-12-28 13:04:46.829 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-12-28 13:04:46.832 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-28 13:04:46.867  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-12-28 13:04:46.871  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-12-28 13:04:46.873 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-28 13:04:46.876 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-28 13:04:46.876 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-28 13:04:46.911 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-28 13:04:46.912 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-28 13:04:46.912 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-28 13:04:46.921 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-28 13:04:46.921 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-28 13:04:46.922 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-28 13:04:46.926 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-28 13:04:46.990 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 601114373827294782145014670280278679400405609232 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Dec 28 11:10:14 UTC 2022 Final Date: Mon Dec 27 11:10:13 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [31:a3:83:7d:af:57:6a:32:1e:6b:3b:33:b4:3a:19:be:5b:f9:e4:24],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 58e62d95006a540df2b58454759bd2839d9a6e7c ebb14f2b89c792c347b40e0d818a5650330f0b84 dc958f59a50594a3d8510fad7f124640b91caba8 16021f101c5818686bd8dbdc0509498839b1ea83 5912f5cce11cf31b348eb0d91a395828821980ae 051080be2b23494f1c975fe99dbccd7dd91d27bd b21e5be9ea83561f2daa50cb9854d09fac611950 36cfc094cf9972515b3b3a3588e5ee6c021d2b63 18885a410b157b05f9fa5e3c0b7ea90969f6830a 54d9e730b5366a3eeb3d3e208c977380dff48956 516822292345326eb215c56f6f9411489d3d0b1f fda6ab1e055b693da5371011798d23579eb64d8c 1f7f19bf8ac3e3d1f1371ba4127577719d457707 1ae0beef7bedf6ad233358cebb21460a641522a4 fa224b4b219a676f7a9676b0f0160a0b86c79514 d6d20ce71d3afe623b2b0f722f41b503fa5eb805 4e69525eee0bfb2eb654526b7f53667dbf54113a 7716b695b3dd70eb7fbff5955aca2e7ee0c640e7 672010e9882a663cf692f93a9f1a438afb94475b 165bcd8d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d7:74:4d:ca:46:34:81:7f:c1:c4:d0:0a:15:a7:dd:d6:96:cc:67:d6],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-28 13:06:48.296  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-12-28 13:06:48.298 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-12-28 13:06:48.300 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-12-28 13:06:48.301 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-28 13:06:48.301  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-12-28 13:06:48.303  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-12-28 13:06:48.304  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-12-28 13:06:48.306 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-12-28 13:06:48.307 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-12-28 13:06:48.308 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-12-28 13:06:48.325 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-12-28 13:06:48.328 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-28 13:06:48.329 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-28 13:06:48.330 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-28 13:06:48.637  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-12-28 13:06:48.638  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-12-28 13:06:48.638 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-12-28 13:06:48.641 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-28 13:06:48.729  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-12-28 13:06:48.731  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-12-28 13:06:48.734 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-28 13:06:48.736 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-28 13:06:48.737 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-28 13:06:48.742 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-28 13:06:48.747 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-28 13:06:48.752 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-28 13:06:48.760 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-28 13:06:48.766 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-28 13:06:48.773 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-28 13:06:48.788 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-28 13:06:48.832 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 601114373827294782145014670280278679400405609232 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Dec 28 11:10:14 UTC 2022 Final Date: Mon Dec 27 11:10:13 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [31:a3:83:7d:af:57:6a:32:1e:6b:3b:33:b4:3a:19:be:5b:f9:e4:24],[56:66:d1:a4] modulus: d95a233d0fa46d2ec12940934cdb59082b398b495cdd52ba5fbf0f9700128446d48e182ef7ce7ae266819d721e38717c154054a2bf2260d2e33d99222531339c371a3b02a8204c1bf0c42d766d28a13766bdda5e371bb19e84dc0f8b1c23450ed37e005a7f00a7cae41f6158a3c96dac8cbfb676129cdfc3e84e5582380a35200258d9805b645c5ade5177198bbcf68bdd052ff35b51d25c319dde5a9c14472087f644056221cf37f42d3b45dae699f9489e5ff5c6da9de37b3cea8e165ea3bdcaad32ae92c7257de6fe809986a4e0d6f35a5933eb7247ff9d7641994b3e880706a99a55e559a4c3c8298c4b4d624e32af0cab2a7dc4963576ff00757e6b9510c51ef5732b4c0449bf6ded166e966923e7db109d37906938c2434575a946253b46a9b6a15f926f6dc471caabcccddaf43ccc30bf781715a8e1f379d167aaaa834669e5a3a61e61606f41be658ea37440eb4465366676f0644c23d65894e4027f07b2e847ac60d221300906e2d6f4fdf9c821bd0829ae6f8350765b6b13e66c95 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 58e62d95006a540df2b58454759bd2839d9a6e7c ebb14f2b89c792c347b40e0d818a5650330f0b84 dc958f59a50594a3d8510fad7f124640b91caba8 16021f101c5818686bd8dbdc0509498839b1ea83 5912f5cce11cf31b348eb0d91a395828821980ae 051080be2b23494f1c975fe99dbccd7dd91d27bd b21e5be9ea83561f2daa50cb9854d09fac611950 36cfc094cf9972515b3b3a3588e5ee6c021d2b63 18885a410b157b05f9fa5e3c0b7ea90969f6830a 54d9e730b5366a3eeb3d3e208c977380dff48956 516822292345326eb215c56f6f9411489d3d0b1f fda6ab1e055b693da5371011798d23579eb64d8c 1f7f19bf8ac3e3d1f1371ba4127577719d457707 1ae0beef7bedf6ad233358cebb21460a641522a4 fa224b4b219a676f7a9676b0f0160a0b86c79514 d6d20ce71d3afe623b2b0f722f41b503fa5eb805 4e69525eee0bfb2eb654526b7f53667dbf54113a 7716b695b3dd70eb7fbff5955aca2e7ee0c640e7 672010e9882a663cf692f93a9f1a438afb94475b 165bcd8d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [28:65:15:93:11:27:bd:44:36:d3:47:03:32:57:11:e7:57:4a:40:a2],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-28 13:08:27.996  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-12-28 13:08:27.998 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-12-28 13:08:28.000 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-12-28 13:08:28.002 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-28 13:08:28.006  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-12-28 13:08:28.009  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-12-28 13:08:28.010  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-12-28 13:08:28.012 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-12-28 13:08:28.014 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-12-28 13:08:28.017 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-12-28 13:08:28.033 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-12-28 13:08:28.034 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-28 13:08:28.035 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-28 13:08:28.036 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-28 13:08:28.206  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-12-28 13:08:28.208  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-12-28 13:08:28.210 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-12-28 13:08:28.213 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-28 13:08:28.220  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-12-28 13:08:28.222  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-12-28 13:08:28.226 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-28 13:08:28.230 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-28 13:08:28.233 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-28 13:08:28.245 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-28 13:08:28.251 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-28 13:08:28.254 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-28 13:08:28.265 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-28 13:08:28.266 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-28 13:08:28.269 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-28 13:08:28.277 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-28 13:08:28.306 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 601114373827294782145014670280278679400405609232 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Dec 28 11:10:14 UTC 2022 Final Date: Mon Dec 27 11:10:13 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [31:a3:83:7d:af:57:6a:32:1e:6b:3b:33:b4:3a:19:be:5b:f9:e4:24],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 58e62d95006a540df2b58454759bd2839d9a6e7c ebb14f2b89c792c347b40e0d818a5650330f0b84 dc958f59a50594a3d8510fad7f124640b91caba8 16021f101c5818686bd8dbdc0509498839b1ea83 5912f5cce11cf31b348eb0d91a395828821980ae 051080be2b23494f1c975fe99dbccd7dd91d27bd b21e5be9ea83561f2daa50cb9854d09fac611950 36cfc094cf9972515b3b3a3588e5ee6c021d2b63 18885a410b157b05f9fa5e3c0b7ea90969f6830a 54d9e730b5366a3eeb3d3e208c977380dff48956 516822292345326eb215c56f6f9411489d3d0b1f fda6ab1e055b693da5371011798d23579eb64d8c 1f7f19bf8ac3e3d1f1371ba4127577719d457707 1ae0beef7bedf6ad233358cebb21460a641522a4 fa224b4b219a676f7a9676b0f0160a0b86c79514 d6d20ce71d3afe623b2b0f722f41b503fa5eb805 4e69525eee0bfb2eb654526b7f53667dbf54113a 7716b695b3dd70eb7fbff5955aca2e7ee0c640e7 672010e9882a663cf692f93a9f1a438afb94475b 165bcd8d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b3:dc:d8:d5:da:ba:71:64:38:51:0b:0a:b6:29:4e:5c:a2:71:26:40],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-28 13:11:22.575  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-12-28 13:11:22.582 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-12-28 13:11:22.586 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-28 13:11:22.588 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-28 13:11:22.589  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-28 13:11:22.590  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-12-28 13:11:22.591  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-12-28 13:11:22.591 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-12-28 13:11:22.592 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-12-28 13:11:22.600 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-12-28 13:11:22.618 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-12-28 13:11:22.619 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-28 13:11:22.619 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-28 13:11:22.620 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-28 13:11:22.853  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-12-28 13:11:22.854  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-12-28 13:11:22.855 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-12-28 13:11:22.855 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-28 13:11:22.857  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-12-28 13:11:22.858  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-12-28 13:11:22.859 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-28 13:11:22.861 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-28 13:11:22.862 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-28 13:11:22.865 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-28 13:11:22.871 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-28 13:11:22.880 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-28 13:11:22.881 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-28 13:11:22.882 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-28 13:11:22.882 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-28 13:11:22.884 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-28 13:11:22.912 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 601114373827294782145014670280278679400405609232 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Dec 28 11:10:14 UTC 2022 Final Date: Mon Dec 27 11:10:13 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [31:a3:83:7d:af:57:6a:32:1e:6b:3b:33:b4:3a:19:be:5b:f9:e4:24],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 58e62d95006a540df2b58454759bd2839d9a6e7c ebb14f2b89c792c347b40e0d818a5650330f0b84 dc958f59a50594a3d8510fad7f124640b91caba8 16021f101c5818686bd8dbdc0509498839b1ea83 5912f5cce11cf31b348eb0d91a395828821980ae 051080be2b23494f1c975fe99dbccd7dd91d27bd b21e5be9ea83561f2daa50cb9854d09fac611950 36cfc094cf9972515b3b3a3588e5ee6c021d2b63 18885a410b157b05f9fa5e3c0b7ea90969f6830a 54d9e730b5366a3eeb3d3e208c977380dff48956 516822292345326eb215c56f6f9411489d3d0b1f fda6ab1e055b693da5371011798d23579eb64d8c 1f7f19bf8ac3e3d1f1371ba4127577719d457707 1ae0beef7bedf6ad233358cebb21460a641522a4 fa224b4b219a676f7a9676b0f0160a0b86c79514 d6d20ce71d3afe623b2b0f722f41b503fa5eb805 4e69525eee0bfb2eb654526b7f53667dbf54113a 7716b695b3dd70eb7fbff5955aca2e7ee0c640e7 672010e9882a663cf692f93a9f1a438afb94475b 165bcd8d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a9:a8:1a:3e:18:8a:74:62:cd:49:3d:e4:0b:14:85:d2:14:07:21:4a],[56:66:d1:a4] modulus: b8feee4c03cb32ead51bb222e4a66c08b3b2995e16a72f63137a649c31a448f5c151f24f1762c13bf67364c46667d0e30cff903562f471ecc0d3668152b313a098696b2c2136f77da8dca04d7f0fc042c70ad961d5b5b7225a7398e4017897ebe00561e8e5ae92b56b30b1489d40d08723eccab318ebb9edf3b8ccb5fd679e3c49c08249f2173249f72a3131901202c62532b0e5f5def9125882347163552f57ce419a64c6e09ad961b2468e0deffaae2a411e98c30174e637b04640b5cb930e589990dd77e608b8083e59a906cc6b328bf136edc403360c7837f76be03772c4bf6765c8d2f16e8068acc48d2568c059f915d8e5bdb01033c88370193e6ef60f public exponent: 10001 ] 2022-12-28 13:19:09.327  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-12-28 13:19:09.337 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-12-28 13:19:09.345 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-28 13:19:09.348 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-28 13:19:09.349  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-28 13:19:09.358  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-12-28 13:19:09.360  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-12-28 13:19:09.361 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-12-28 13:19:09.364 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-12-28 13:19:09.366 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-12-28 13:19:09.381 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-12-28 13:19:09.384 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-28 13:19:09.385 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-28 13:19:09.387 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-28 13:19:09.589  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-12-28 13:19:09.590  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-12-28 13:19:09.591 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-12-28 13:19:09.591 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-28 13:19:09.593  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-12-28 13:19:09.595  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-12-28 13:19:09.598 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-28 13:19:09.601 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-28 13:19:09.602 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-28 13:19:09.604 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-28 13:19:09.605 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-28 13:19:09.605 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-28 13:19:09.606 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-28 13:19:09.607 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-28 13:19:09.607 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-28 13:19:09.608 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-28 13:19:09.614 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 601114373827294782145014670280278679400405609232 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Dec 28 11:10:14 UTC 2022 Final Date: Mon Dec 27 11:10:13 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [31:a3:83:7d:af:57:6a:32:1e:6b:3b:33:b4:3a:19:be:5b:f9:e4:24],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 58e62d95006a540df2b58454759bd2839d9a6e7c ebb14f2b89c792c347b40e0d818a5650330f0b84 dc958f59a50594a3d8510fad7f124640b91caba8 16021f101c5818686bd8dbdc0509498839b1ea83 5912f5cce11cf31b348eb0d91a395828821980ae 051080be2b23494f1c975fe99dbccd7dd91d27bd b21e5be9ea83561f2daa50cb9854d09fac611950 36cfc094cf9972515b3b3a3588e5ee6c021d2b63 18885a410b157b05f9fa5e3c0b7ea90969f6830a 54d9e730b5366a3eeb3d3e208c977380dff48956 516822292345326eb215c56f6f9411489d3d0b1f fda6ab1e055b693da5371011798d23579eb64d8c 1f7f19bf8ac3e3d1f1371ba4127577719d457707 1ae0beef7bedf6ad233358cebb21460a641522a4 fa224b4b219a676f7a9676b0f0160a0b86c79514 d6d20ce71d3afe623b2b0f722f41b503fa5eb805 4e69525eee0bfb2eb654526b7f53667dbf54113a 7716b695b3dd70eb7fbff5955aca2e7ee0c640e7 672010e9882a663cf692f93a9f1a438afb94475b 165bcd8d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b7:3c:9c:62:42:ba:9b:e9:de:7a:e3:08:01:c5:1a:84:70:44:ac:ae],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-28 13:24:41.845  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-12-28 13:24:41.854 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-12-28 13:24:41.856 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-28 13:24:41.857 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-28 13:24:41.858  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-28 13:24:41.858  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-12-28 13:24:41.859  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-12-28 13:24:41.859 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-12-28 13:24:41.875 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-12-28 13:24:41.876 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-12-28 13:24:41.886 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-12-28 13:24:41.887 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-28 13:24:41.888 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-28 13:24:41.890 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-28 13:24:42.121  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-12-28 13:24:42.122  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-12-28 13:24:42.122 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-12-28 13:24:42.123 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-28 13:24:42.128  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-12-28 13:24:42.129  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-12-28 13:24:42.129 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-28 13:24:42.132 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-28 13:24:42.133 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-28 13:24:42.135 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-28 13:24:42.136 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-28 13:24:42.136 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-28 13:24:42.138 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-28 13:24:42.138 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-28 13:24:42.140 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-28 13:24:42.141 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-28 13:24:42.147 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 601114373827294782145014670280278679400405609232 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Dec 28 11:10:14 UTC 2022 Final Date: Mon Dec 27 11:10:13 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [31:a3:83:7d:af:57:6a:32:1e:6b:3b:33:b4:3a:19:be:5b:f9:e4:24],[56:66:d1:a4] modulus: d95a233d0fa46d2ec12940934cdb59082b398b495cdd52ba5fbf0f9700128446d48e182ef7ce7ae266819d721e38717c154054a2bf2260d2e33d99222531339c371a3b02a8204c1bf0c42d766d28a13766bdda5e371bb19e84dc0f8b1c23450ed37e005a7f00a7cae41f6158a3c96dac8cbfb676129cdfc3e84e5582380a35200258d9805b645c5ade5177198bbcf68bdd052ff35b51d25c319dde5a9c14472087f644056221cf37f42d3b45dae699f9489e5ff5c6da9de37b3cea8e165ea3bdcaad32ae92c7257de6fe809986a4e0d6f35a5933eb7247ff9d7641994b3e880706a99a55e559a4c3c8298c4b4d624e32af0cab2a7dc4963576ff00757e6b9510c51ef5732b4c0449bf6ded166e966923e7db109d37906938c2434575a946253b46a9b6a15f926f6dc471caabcccddaf43ccc30bf781715a8e1f379d167aaaa834669e5a3a61e61606f41be658ea37440eb4465366676f0644c23d65894e4027f07b2e847ac60d221300906e2d6f4fdf9c821bd0829ae6f8350765b6b13e66c95 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 58e62d95006a540df2b58454759bd2839d9a6e7c ebb14f2b89c792c347b40e0d818a5650330f0b84 dc958f59a50594a3d8510fad7f124640b91caba8 16021f101c5818686bd8dbdc0509498839b1ea83 5912f5cce11cf31b348eb0d91a395828821980ae 051080be2b23494f1c975fe99dbccd7dd91d27bd b21e5be9ea83561f2daa50cb9854d09fac611950 36cfc094cf9972515b3b3a3588e5ee6c021d2b63 18885a410b157b05f9fa5e3c0b7ea90969f6830a 54d9e730b5366a3eeb3d3e208c977380dff48956 516822292345326eb215c56f6f9411489d3d0b1f fda6ab1e055b693da5371011798d23579eb64d8c 1f7f19bf8ac3e3d1f1371ba4127577719d457707 1ae0beef7bedf6ad233358cebb21460a641522a4 fa224b4b219a676f7a9676b0f0160a0b86c79514 d6d20ce71d3afe623b2b0f722f41b503fa5eb805 4e69525eee0bfb2eb654526b7f53667dbf54113a 7716b695b3dd70eb7fbff5955aca2e7ee0c640e7 672010e9882a663cf692f93a9f1a438afb94475b 165bcd8d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2a:86:63:0b:df:cd:42:03:f3:26:4c:98:ce:2d:c0:fe:fc:20:ee:ed],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-28 13:32:06.870  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-12-28 13:32:06.874 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-12-28 13:32:06.880 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-12-28 13:32:06.881 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-28 13:32:06.882  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-12-28 13:32:06.884  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-12-28 13:32:06.885  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-12-28 13:32:06.885 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-12-28 13:32:06.886 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-12-28 13:32:06.888 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-12-28 13:32:06.901 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-12-28 13:32:06.902 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-28 13:32:06.902 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-28 13:32:06.903 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-28 13:32:07.088  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-12-28 13:32:07.088  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-12-28 13:32:07.089 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-12-28 13:32:07.089 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-28 13:32:07.091  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-12-28 13:32:07.092  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-12-28 13:32:07.092 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-28 13:32:07.093 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-28 13:32:07.093 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-28 13:32:07.094 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-28 13:32:07.095 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-28 13:32:07.103 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-28 13:32:07.105 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-28 13:32:07.105 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-28 13:32:07.105 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-28 13:32:07.108 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-28 13:32:07.141 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 601114373827294782145014670280278679400405609232 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Dec 28 11:10:14 UTC 2022 Final Date: Mon Dec 27 11:10:13 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [31:a3:83:7d:af:57:6a:32:1e:6b:3b:33:b4:3a:19:be:5b:f9:e4:24],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 58e62d95006a540df2b58454759bd2839d9a6e7c ebb14f2b89c792c347b40e0d818a5650330f0b84 dc958f59a50594a3d8510fad7f124640b91caba8 16021f101c5818686bd8dbdc0509498839b1ea83 5912f5cce11cf31b348eb0d91a395828821980ae 051080be2b23494f1c975fe99dbccd7dd91d27bd b21e5be9ea83561f2daa50cb9854d09fac611950 36cfc094cf9972515b3b3a3588e5ee6c021d2b63 18885a410b157b05f9fa5e3c0b7ea90969f6830a 54d9e730b5366a3eeb3d3e208c977380dff48956 516822292345326eb215c56f6f9411489d3d0b1f fda6ab1e055b693da5371011798d23579eb64d8c 1f7f19bf8ac3e3d1f1371ba4127577719d457707 1ae0beef7bedf6ad233358cebb21460a641522a4 fa224b4b219a676f7a9676b0f0160a0b86c79514 d6d20ce71d3afe623b2b0f722f41b503fa5eb805 4e69525eee0bfb2eb654526b7f53667dbf54113a 7716b695b3dd70eb7fbff5955aca2e7ee0c640e7 672010e9882a663cf692f93a9f1a438afb94475b 165bcd8d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5c:7a:9f:88:95:fa:c7:72:3a:d6:51:21:e5:72:0c:7a:88:e8:a9:07],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-28 13:37:56.236  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-12-28 13:37:56.242 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-12-28 13:37:56.262 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-12-28 13:37:56.269 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-28 13:37:56.272  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-12-28 13:37:56.276  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-12-28 13:37:56.293  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-12-28 13:37:56.294 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-12-28 13:37:56.295 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-12-28 13:37:56.296 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-12-28 13:37:56.304 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-12-28 13:37:56.306 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-28 13:37:56.306 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-28 13:37:56.307 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-28 13:37:56.555  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-12-28 13:37:56.556  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-12-28 13:37:56.557 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-12-28 13:37:56.558 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-28 13:37:56.561  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-12-28 13:37:56.562  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-12-28 13:37:56.563 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-28 13:37:56.564 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-28 13:37:56.564 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-28 13:37:56.567 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-28 13:37:56.568 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-28 13:37:56.569 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-28 13:37:56.571 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-28 13:37:56.573 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-28 13:37:56.574 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-28 13:37:56.576 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-28 13:37:56.585 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 601114373827294782145014670280278679400405609232 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Dec 28 11:10:14 UTC 2022 Final Date: Mon Dec 27 11:10:13 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [31:a3:83:7d:af:57:6a:32:1e:6b:3b:33:b4:3a:19:be:5b:f9:e4:24],[56:66:d1:a4] modulus: d95a233d0fa46d2ec12940934cdb59082b398b495cdd52ba5fbf0f9700128446d48e182ef7ce7ae266819d721e38717c154054a2bf2260d2e33d99222531339c371a3b02a8204c1bf0c42d766d28a13766bdda5e371bb19e84dc0f8b1c23450ed37e005a7f00a7cae41f6158a3c96dac8cbfb676129cdfc3e84e5582380a35200258d9805b645c5ade5177198bbcf68bdd052ff35b51d25c319dde5a9c14472087f644056221cf37f42d3b45dae699f9489e5ff5c6da9de37b3cea8e165ea3bdcaad32ae92c7257de6fe809986a4e0d6f35a5933eb7247ff9d7641994b3e880706a99a55e559a4c3c8298c4b4d624e32af0cab2a7dc4963576ff00757e6b9510c51ef5732b4c0449bf6ded166e966923e7db109d37906938c2434575a946253b46a9b6a15f926f6dc471caabcccddaf43ccc30bf781715a8e1f379d167aaaa834669e5a3a61e61606f41be658ea37440eb4465366676f0644c23d65894e4027f07b2e847ac60d221300906e2d6f4fdf9c821bd0829ae6f8350765b6b13e66c95 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 58e62d95006a540df2b58454759bd2839d9a6e7c ebb14f2b89c792c347b40e0d818a5650330f0b84 dc958f59a50594a3d8510fad7f124640b91caba8 16021f101c5818686bd8dbdc0509498839b1ea83 5912f5cce11cf31b348eb0d91a395828821980ae 051080be2b23494f1c975fe99dbccd7dd91d27bd b21e5be9ea83561f2daa50cb9854d09fac611950 36cfc094cf9972515b3b3a3588e5ee6c021d2b63 18885a410b157b05f9fa5e3c0b7ea90969f6830a 54d9e730b5366a3eeb3d3e208c977380dff48956 516822292345326eb215c56f6f9411489d3d0b1f fda6ab1e055b693da5371011798d23579eb64d8c 1f7f19bf8ac3e3d1f1371ba4127577719d457707 1ae0beef7bedf6ad233358cebb21460a641522a4 fa224b4b219a676f7a9676b0f0160a0b86c79514 d6d20ce71d3afe623b2b0f722f41b503fa5eb805 4e69525eee0bfb2eb654526b7f53667dbf54113a 7716b695b3dd70eb7fbff5955aca2e7ee0c640e7 672010e9882a663cf692f93a9f1a438afb94475b 165bcd8d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e8:9a:fb:22:38:df:63:66:18:54:3b:fe:9f:5d:57:65:4f:91:c7:9b],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-28 13:38:25.510  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-12-28 13:38:25.513 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-12-28 13:38:25.530 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-12-28 13:38:25.530 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-28 13:38:25.530  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-12-28 13:38:25.531  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-12-28 13:38:25.532  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-12-28 13:38:25.532 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-12-28 13:38:25.532 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-12-28 13:38:25.533 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-12-28 13:38:25.547 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-12-28 13:38:25.548 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-28 13:38:25.548 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-28 13:38:25.552 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-28 13:38:25.714  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-12-28 13:38:25.715  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-12-28 13:38:25.716 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-12-28 13:38:25.716 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-28 13:38:25.718  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-12-28 13:38:25.719  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-12-28 13:38:25.720 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-28 13:38:25.721 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-28 13:38:25.722 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-28 13:38:25.723 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-28 13:38:25.724 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-28 13:38:25.724 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-28 13:38:25.725 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-28 13:38:25.726 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-28 13:38:25.727 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-28 13:38:25.757 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-28 13:38:25.772 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 601114373827294782145014670280278679400405609232 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Dec 28 11:10:14 UTC 2022 Final Date: Mon Dec 27 11:10:13 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [31:a3:83:7d:af:57:6a:32:1e:6b:3b:33:b4:3a:19:be:5b:f9:e4:24],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 58e62d95006a540df2b58454759bd2839d9a6e7c ebb14f2b89c792c347b40e0d818a5650330f0b84 dc958f59a50594a3d8510fad7f124640b91caba8 16021f101c5818686bd8dbdc0509498839b1ea83 5912f5cce11cf31b348eb0d91a395828821980ae 051080be2b23494f1c975fe99dbccd7dd91d27bd b21e5be9ea83561f2daa50cb9854d09fac611950 36cfc094cf9972515b3b3a3588e5ee6c021d2b63 18885a410b157b05f9fa5e3c0b7ea90969f6830a 54d9e730b5366a3eeb3d3e208c977380dff48956 516822292345326eb215c56f6f9411489d3d0b1f fda6ab1e055b693da5371011798d23579eb64d8c 1f7f19bf8ac3e3d1f1371ba4127577719d457707 1ae0beef7bedf6ad233358cebb21460a641522a4 fa224b4b219a676f7a9676b0f0160a0b86c79514 d6d20ce71d3afe623b2b0f722f41b503fa5eb805 4e69525eee0bfb2eb654526b7f53667dbf54113a 7716b695b3dd70eb7fbff5955aca2e7ee0c640e7 672010e9882a663cf692f93a9f1a438afb94475b 165bcd8d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [40:35:42:d0:a9:20:92:56:c3:b2:54:47:1f:0e:ba:d1:9c:5f:f7:99],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-28 14:03:38.803  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-12-28 14:03:38.810 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-12-28 14:03:38.816 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-12-28 14:03:38.818 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-28 14:03:38.820  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-12-28 14:03:38.821  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-12-28 14:03:38.822  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-12-28 14:03:38.825 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-12-28 14:03:38.826 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-12-28 14:03:38.827 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-12-28 14:03:38.868 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-12-28 14:03:38.869 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-28 14:03:38.869 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-28 14:03:38.870 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-28 14:03:39.018  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-12-28 14:03:39.019  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-12-28 14:03:39.019 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-12-28 14:03:39.019 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-28 14:03:39.021  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-12-28 14:03:39.021  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-12-28 14:03:39.022 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-28 14:03:39.022 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-28 14:03:39.022 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-28 14:03:39.023 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-28 14:03:39.024 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-28 14:03:39.024 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-28 14:03:39.025 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-28 14:03:39.025 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-28 14:03:39.026 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-28 14:03:39.027 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-28 14:03:39.031 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 601114373827294782145014670280278679400405609232 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Dec 28 11:10:14 UTC 2022 Final Date: Mon Dec 27 11:10:13 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [31:a3:83:7d:af:57:6a:32:1e:6b:3b:33:b4:3a:19:be:5b:f9:e4:24],[56:66:d1:a4] modulus: d95a233d0fa46d2ec12940934cdb59082b398b495cdd52ba5fbf0f9700128446d48e182ef7ce7ae266819d721e38717c154054a2bf2260d2e33d99222531339c371a3b02a8204c1bf0c42d766d28a13766bdda5e371bb19e84dc0f8b1c23450ed37e005a7f00a7cae41f6158a3c96dac8cbfb676129cdfc3e84e5582380a35200258d9805b645c5ade5177198bbcf68bdd052ff35b51d25c319dde5a9c14472087f644056221cf37f42d3b45dae699f9489e5ff5c6da9de37b3cea8e165ea3bdcaad32ae92c7257de6fe809986a4e0d6f35a5933eb7247ff9d7641994b3e880706a99a55e559a4c3c8298c4b4d624e32af0cab2a7dc4963576ff00757e6b9510c51ef5732b4c0449bf6ded166e966923e7db109d37906938c2434575a946253b46a9b6a15f926f6dc471caabcccddaf43ccc30bf781715a8e1f379d167aaaa834669e5a3a61e61606f41be658ea37440eb4465366676f0644c23d65894e4027f07b2e847ac60d221300906e2d6f4fdf9c821bd0829ae6f8350765b6b13e66c95 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 58e62d95006a540df2b58454759bd2839d9a6e7c ebb14f2b89c792c347b40e0d818a5650330f0b84 dc958f59a50594a3d8510fad7f124640b91caba8 16021f101c5818686bd8dbdc0509498839b1ea83 5912f5cce11cf31b348eb0d91a395828821980ae 051080be2b23494f1c975fe99dbccd7dd91d27bd b21e5be9ea83561f2daa50cb9854d09fac611950 36cfc094cf9972515b3b3a3588e5ee6c021d2b63 18885a410b157b05f9fa5e3c0b7ea90969f6830a 54d9e730b5366a3eeb3d3e208c977380dff48956 516822292345326eb215c56f6f9411489d3d0b1f fda6ab1e055b693da5371011798d23579eb64d8c 1f7f19bf8ac3e3d1f1371ba4127577719d457707 1ae0beef7bedf6ad233358cebb21460a641522a4 fa224b4b219a676f7a9676b0f0160a0b86c79514 d6d20ce71d3afe623b2b0f722f41b503fa5eb805 4e69525eee0bfb2eb654526b7f53667dbf54113a 7716b695b3dd70eb7fbff5955aca2e7ee0c640e7 672010e9882a663cf692f93a9f1a438afb94475b 165bcd8d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [62:5a:3e:b7:85:d6:56:d1:d9:2c:a6:aa:ea:31:c1:43:13:bb:ee:aa],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-28 14:03:45.773  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-12-28 14:03:45.776 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-12-28 14:03:45.781 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-12-28 14:03:45.796 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-28 14:03:45.798  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-12-28 14:03:45.799  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-12-28 14:03:45.800  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-12-28 14:03:45.800 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-12-28 14:03:45.801 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-12-28 14:03:45.802 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-12-28 14:03:45.808 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-12-28 14:03:45.809 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-28 14:03:45.810 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-28 14:03:45.811 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-28 14:03:45.949  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-12-28 14:03:45.950  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-12-28 14:03:45.959 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-12-28 14:03:45.959 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-28 14:03:45.961  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-12-28 14:03:45.961  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-12-28 14:03:45.962 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-28 14:03:45.962 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-28 14:03:45.962 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-28 14:03:45.964 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-28 14:03:45.964 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-28 14:03:45.965 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-28 14:03:45.965 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-28 14:03:45.966 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-28 14:03:45.966 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-28 14:03:45.970 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-28 14:03:45.974 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 601114373827294782145014670280278679400405609232 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Dec 28 11:10:14 UTC 2022 Final Date: Mon Dec 27 11:10:13 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [31:a3:83:7d:af:57:6a:32:1e:6b:3b:33:b4:3a:19:be:5b:f9:e4:24],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 58e62d95006a540df2b58454759bd2839d9a6e7c ebb14f2b89c792c347b40e0d818a5650330f0b84 dc958f59a50594a3d8510fad7f124640b91caba8 16021f101c5818686bd8dbdc0509498839b1ea83 5912f5cce11cf31b348eb0d91a395828821980ae 051080be2b23494f1c975fe99dbccd7dd91d27bd b21e5be9ea83561f2daa50cb9854d09fac611950 36cfc094cf9972515b3b3a3588e5ee6c021d2b63 18885a410b157b05f9fa5e3c0b7ea90969f6830a 54d9e730b5366a3eeb3d3e208c977380dff48956 516822292345326eb215c56f6f9411489d3d0b1f fda6ab1e055b693da5371011798d23579eb64d8c 1f7f19bf8ac3e3d1f1371ba4127577719d457707 1ae0beef7bedf6ad233358cebb21460a641522a4 fa224b4b219a676f7a9676b0f0160a0b86c79514 d6d20ce71d3afe623b2b0f722f41b503fa5eb805 4e69525eee0bfb2eb654526b7f53667dbf54113a 7716b695b3dd70eb7fbff5955aca2e7ee0c640e7 672010e9882a663cf692f93a9f1a438afb94475b 165bcd8d Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [81:41:32:59:2f:1a:6b:e6:87:24:99:05:ac:64:04:ce:e1:7f:b8:ad],[56:66:d1:a4] modulus: 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 public exponent: 10001 ]