2023-01-09 03:19:40,232 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2023-01-09 03:19:41,671 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2023-01-09 03:19:42.504  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Jan 09, 2023 3:19:44 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jan 09, 2023 3:19:44 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jan 09, 2023 3:19:44 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jan 09, 2023 3:19:44 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2023-01-09 03:19:45.063 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2023-01-09 03:19:45.391  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2023-01-09 03:19:45.560  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2023-01-09 03:19:46.388 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2023-01-09 03:19:46.393 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2023-01-09 03:19:46.394 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2023-01-09 03:19:46.400 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2023-01-09 03:19:46.449 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2023-01-09 03:19:46.453 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2023-01-09 03:19:46.627 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2023-01-09 03:19:47.555 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jan 09, 2023 3:19:48 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2023-01-09 03:19:48.522  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 9.175 seconds (JVM running for 11.059) Jan 09, 2023 3:20:10 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2023-01-09 03:20:37.844  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-09 03:20:37.852 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-09 03:20:37.891 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2023-01-09 03:20:37.895 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-09 03:20:37.914  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2023-01-09 03:20:37.917  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-09 03:20:37.918  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-09 03:20:37.919 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-09 03:20:37.919 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-09 03:20:37.924 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-09 03:20:37.933 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-09 03:20:37.937 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-09 03:20:38.000 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-09 03:20:38.012 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-09 03:20:38.012 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-09 03:20:38.017 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-09 03:20:39.289  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-09 03:20:39.292  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-09 03:20:39.293 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-09 03:20:39.294 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-09 03:20:39.312  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-09 03:20:39.313  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-09 03:20:39.314 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 03:20:39.315 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-09 03:20:39.316 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-09 03:20:39.342 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 03:20:39.343 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-09 03:20:39.344 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-09 03:20:39.354 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 03:20:39.354 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-09 03:20:39.355 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-09 03:20:39.357 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-09 03:20:39.393 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 562942738559669878030832421375045642922985564089 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jan 09 03:17:00 UTC 2023 Final Date: Sat Jan 08 03:16:59 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f8:76:7e:b7:e8:11:35:4b:9f:f0:1f:bd:5e:b4:15:a8:53:85:cb:32],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0e986f2a2ded7047f9eff208c63ffc0a91e840f5 863c0667d0c4b3d066e542e3bbf48961eadf057f 098b2b64de04a74e5f6d3e7c4cce0f83a9a28611 1465e38e1597cc3e3b3195e1aa5fc47887c9f4c8 e819e3991476872d947bb7717958ca3dcb916340 25537e936aacb3ca8149788e4881eb80346e2b5f 349d0eeaf1cadc406058655c561d7847cad22aad 22bd01cbfd6832f90053be42fe8bb16fe4440fd2 64079652343410d74b6ad12db706d32bb5756691 70c0c992ffa782efdaa3f59cbdf508ed3320ba3b aeae1b07345627f62d6ae16a184ec24d7705c69f e732031142ba8f11c1c9b511fa112de52eda8a87 2d6baf078caa0620d08f9fe0ad8d43ec633b0a01 264ad11da3cc3aab20cd5bbbcba18458bb404b37 3bbb8325483ec7ae714d84763a430b81f8ed622c b4103e4c6f22b7db8500ab98a90030f832c11869 d4580cddc40044f40c03c351d7b8eca080700cee 9c5fa75bab788711b4546fbfb7d02487d13b3e90 21ff1f6bac401fa4123059e0073f97265de01ccd 9c7adb60 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [14:54:20:94:0a:b1:c8:79:c8:49:c2:7a:0a:22:12:78:2d:e2:ec:eb],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-09 05:05:21.903  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-09 05:05:21.906 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-09 05:05:21.909 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-09 05:05:21.911 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-09 05:05:21.914  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-09 05:05:21.916  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-09 05:05:21.916  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-09 05:05:21.917 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-09 05:05:21.918 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-09 05:05:21.918 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-09 05:05:21.924 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-09 05:05:21.925 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-09 05:05:21.925 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-09 05:05:21.925 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-09 05:05:22.132  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-09 05:05:22.133  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-09 05:05:22.133 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-09 05:05:22.134 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-09 05:05:22.137  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-09 05:05:22.138  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-09 05:05:22.138 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 05:05:22.139 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-09 05:05:22.139 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-09 05:05:22.141 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 05:05:22.141 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-09 05:05:22.142 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-09 05:05:22.143 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 05:05:22.143 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-09 05:05:22.144 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-09 05:05:22.145 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-09 05:05:22.152 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 562942738559669878030832421375045642922985564089 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jan 09 03:17:00 UTC 2023 Final Date: Sat Jan 08 03:16:59 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f8:76:7e:b7:e8:11:35:4b:9f:f0:1f:bd:5e:b4:15:a8:53:85:cb:32],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0e986f2a2ded7047f9eff208c63ffc0a91e840f5 863c0667d0c4b3d066e542e3bbf48961eadf057f 098b2b64de04a74e5f6d3e7c4cce0f83a9a28611 1465e38e1597cc3e3b3195e1aa5fc47887c9f4c8 e819e3991476872d947bb7717958ca3dcb916340 25537e936aacb3ca8149788e4881eb80346e2b5f 349d0eeaf1cadc406058655c561d7847cad22aad 22bd01cbfd6832f90053be42fe8bb16fe4440fd2 64079652343410d74b6ad12db706d32bb5756691 70c0c992ffa782efdaa3f59cbdf508ed3320ba3b aeae1b07345627f62d6ae16a184ec24d7705c69f e732031142ba8f11c1c9b511fa112de52eda8a87 2d6baf078caa0620d08f9fe0ad8d43ec633b0a01 264ad11da3cc3aab20cd5bbbcba18458bb404b37 3bbb8325483ec7ae714d84763a430b81f8ed622c b4103e4c6f22b7db8500ab98a90030f832c11869 d4580cddc40044f40c03c351d7b8eca080700cee 9c5fa75bab788711b4546fbfb7d02487d13b3e90 21ff1f6bac401fa4123059e0073f97265de01ccd 9c7adb60 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [db:12:50:2c:a5:a3:ee:fc:ad:50:28:50:f7:1a:9c:ba:4c:f6:c2:71],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-09 05:07:10.681  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-09 05:07:10.683 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-09 05:07:10.688 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2023-01-09 05:07:10.691 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-09 05:07:10.692  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2023-01-09 05:07:10.694  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-09 05:07:10.695  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-09 05:07:10.697 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-09 05:07:10.703 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-09 05:07:10.705 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-09 05:07:10.714 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-09 05:07:10.716 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-09 05:07:10.716 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-09 05:07:10.717 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-09 05:07:10.886  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-09 05:07:10.890  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-09 05:07:10.892 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-09 05:07:10.909 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-09 05:07:10.913  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-09 05:07:10.916  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-09 05:07:10.922 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 05:07:10.923 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-09 05:07:10.923 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-09 05:07:10.925 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 05:07:10.926 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-09 05:07:10.927 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-09 05:07:10.928 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 05:07:10.928 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-09 05:07:10.928 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-09 05:07:10.930 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-09 05:07:10.935 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 562942738559669878030832421375045642922985564089 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jan 09 03:17:00 UTC 2023 Final Date: Sat Jan 08 03:16:59 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f8:76:7e:b7:e8:11:35:4b:9f:f0:1f:bd:5e:b4:15:a8:53:85:cb:32],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0e986f2a2ded7047f9eff208c63ffc0a91e840f5 863c0667d0c4b3d066e542e3bbf48961eadf057f 098b2b64de04a74e5f6d3e7c4cce0f83a9a28611 1465e38e1597cc3e3b3195e1aa5fc47887c9f4c8 e819e3991476872d947bb7717958ca3dcb916340 25537e936aacb3ca8149788e4881eb80346e2b5f 349d0eeaf1cadc406058655c561d7847cad22aad 22bd01cbfd6832f90053be42fe8bb16fe4440fd2 64079652343410d74b6ad12db706d32bb5756691 70c0c992ffa782efdaa3f59cbdf508ed3320ba3b aeae1b07345627f62d6ae16a184ec24d7705c69f e732031142ba8f11c1c9b511fa112de52eda8a87 2d6baf078caa0620d08f9fe0ad8d43ec633b0a01 264ad11da3cc3aab20cd5bbbcba18458bb404b37 3bbb8325483ec7ae714d84763a430b81f8ed622c b4103e4c6f22b7db8500ab98a90030f832c11869 d4580cddc40044f40c03c351d7b8eca080700cee 9c5fa75bab788711b4546fbfb7d02487d13b3e90 21ff1f6bac401fa4123059e0073f97265de01ccd 9c7adb60 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [30:9c:6e:d7:17:42:e9:bd:3a:f6:0e:e3:7d:43:b6:ee:a6:c1:4b:bd],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-09 05:09:12.360  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-09 05:09:12.362 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-09 05:09:12.364 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2023-01-09 05:09:12.365 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-09 05:09:12.366  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2023-01-09 05:09:12.367  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-09 05:09:12.367  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-09 05:09:12.368 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-09 05:09:12.368 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-09 05:09:12.369 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-09 05:09:12.373 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-09 05:09:12.374 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-09 05:09:12.374 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-09 05:09:12.375 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-09 05:09:12.528  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-09 05:09:12.529  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-09 05:09:12.530 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-09 05:09:12.530 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-09 05:09:12.531  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-09 05:09:12.532  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-09 05:09:12.532 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 05:09:12.533 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-09 05:09:12.533 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-09 05:09:12.534 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 05:09:12.534 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-09 05:09:12.534 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-09 05:09:12.535 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 05:09:12.535 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-09 05:09:12.536 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-09 05:09:12.538 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-09 05:09:12.543 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 562942738559669878030832421375045642922985564089 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jan 09 03:17:00 UTC 2023 Final Date: Sat Jan 08 03:16:59 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f8:76:7e:b7:e8:11:35:4b:9f:f0:1f:bd:5e:b4:15:a8:53:85:cb:32],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0e986f2a2ded7047f9eff208c63ffc0a91e840f5 863c0667d0c4b3d066e542e3bbf48961eadf057f 098b2b64de04a74e5f6d3e7c4cce0f83a9a28611 1465e38e1597cc3e3b3195e1aa5fc47887c9f4c8 e819e3991476872d947bb7717958ca3dcb916340 25537e936aacb3ca8149788e4881eb80346e2b5f 349d0eeaf1cadc406058655c561d7847cad22aad 22bd01cbfd6832f90053be42fe8bb16fe4440fd2 64079652343410d74b6ad12db706d32bb5756691 70c0c992ffa782efdaa3f59cbdf508ed3320ba3b aeae1b07345627f62d6ae16a184ec24d7705c69f e732031142ba8f11c1c9b511fa112de52eda8a87 2d6baf078caa0620d08f9fe0ad8d43ec633b0a01 264ad11da3cc3aab20cd5bbbcba18458bb404b37 3bbb8325483ec7ae714d84763a430b81f8ed622c b4103e4c6f22b7db8500ab98a90030f832c11869 d4580cddc40044f40c03c351d7b8eca080700cee 9c5fa75bab788711b4546fbfb7d02487d13b3e90 21ff1f6bac401fa4123059e0073f97265de01ccd 9c7adb60 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [12:c9:82:1c:4e:2c:65:58:05:91:b6:46:38:a4:12:7d:1d:bf:37:26],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-09 05:12:04.668  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-09 05:12:04.670 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-09 05:12:04.672 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-09 05:12:04.673 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-09 05:12:04.674  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-09 05:12:04.675  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-09 05:12:04.677  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-09 05:12:04.678 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-09 05:12:04.678 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-09 05:12:04.679 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-09 05:12:04.683 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-09 05:12:04.685 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-09 05:12:04.685 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-09 05:12:04.686 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-09 05:12:04.875  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-09 05:12:04.876  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-09 05:12:04.877 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-09 05:12:04.877 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-09 05:12:04.878  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-09 05:12:04.879  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-09 05:12:04.879 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 05:12:04.880 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-09 05:12:04.880 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-09 05:12:04.881 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 05:12:04.882 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-09 05:12:04.882 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-09 05:12:04.882 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 05:12:04.883 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-09 05:12:04.883 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-09 05:12:04.884 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-09 05:12:04.886 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 562942738559669878030832421375045642922985564089 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jan 09 03:17:00 UTC 2023 Final Date: Sat Jan 08 03:16:59 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f8:76:7e:b7:e8:11:35:4b:9f:f0:1f:bd:5e:b4:15:a8:53:85:cb:32],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0e986f2a2ded7047f9eff208c63ffc0a91e840f5 863c0667d0c4b3d066e542e3bbf48961eadf057f 098b2b64de04a74e5f6d3e7c4cce0f83a9a28611 1465e38e1597cc3e3b3195e1aa5fc47887c9f4c8 e819e3991476872d947bb7717958ca3dcb916340 25537e936aacb3ca8149788e4881eb80346e2b5f 349d0eeaf1cadc406058655c561d7847cad22aad 22bd01cbfd6832f90053be42fe8bb16fe4440fd2 64079652343410d74b6ad12db706d32bb5756691 70c0c992ffa782efdaa3f59cbdf508ed3320ba3b aeae1b07345627f62d6ae16a184ec24d7705c69f e732031142ba8f11c1c9b511fa112de52eda8a87 2d6baf078caa0620d08f9fe0ad8d43ec633b0a01 264ad11da3cc3aab20cd5bbbcba18458bb404b37 3bbb8325483ec7ae714d84763a430b81f8ed622c b4103e4c6f22b7db8500ab98a90030f832c11869 d4580cddc40044f40c03c351d7b8eca080700cee 9c5fa75bab788711b4546fbfb7d02487d13b3e90 21ff1f6bac401fa4123059e0073f97265de01ccd 9c7adb60 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b5:40:23:bb:47:60:c1:37:8e:4b:bd:65:07:15:71:49:4f:1a:11:3d],[56:66:d1:a4] modulus: a437f55ee03dba9e61adc3b4464b90fff3a832ec4f6ef0d3c8300cce5d84c46573a882cee934b7c3dcea098e101200a832c5a4f81366d1ccbc0424abaee2dc188def26b3c57105fe2319edd1d714af12f48e8f06d651e3667010f823fcdc6bf70eeaef1723a1adf50404be9f5a7be9620ebac16f0d2cbb0bfe0d7567b7d20abc1fda5fa80b132c6504b2746b3382d360c5d918240fcc1c5b440d5dec0a7fc965c36ff51977524ed8bdb590872846b18cb6855d858385ccd8d35d5e94bf0b5f675d6af6beb4e56461fa0d03caed398f275dc0b4b16953ecf33de2328ef3d375605b66ff69184c740155a50dde0546f767910d4e36195830e46997063935e93d67 public exponent: 10001 ] 2023-01-09 05:19:57.639  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-09 05:19:57.643 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-09 05:19:57.645 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-09 05:19:57.646 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-09 05:19:57.647  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-09 05:19:57.648  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-09 05:19:57.648  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-09 05:19:57.649 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-09 05:19:57.649 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-09 05:19:57.649 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-09 05:19:57.657 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-09 05:19:57.658 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-09 05:19:57.658 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-09 05:19:57.659 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-09 05:19:57.850  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-09 05:19:57.850  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-09 05:19:57.851 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-09 05:19:57.851 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-09 05:19:57.852  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-09 05:19:57.853  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-09 05:19:57.853 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 05:19:57.853 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-09 05:19:57.854 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-09 05:19:57.854 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 05:19:57.855 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-09 05:19:57.855 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-09 05:19:57.856 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 05:19:57.856 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-09 05:19:57.857 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-09 05:19:57.858 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-09 05:19:57.862 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 562942738559669878030832421375045642922985564089 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jan 09 03:17:00 UTC 2023 Final Date: Sat Jan 08 03:16:59 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f8:76:7e:b7:e8:11:35:4b:9f:f0:1f:bd:5e:b4:15:a8:53:85:cb:32],[56:66:d1:a4] modulus: a595783ba68d447e8766ba0f8b749a6123448f0899de732529abef5012a62453f6747f7d47af8e143f7bd5056da0c46c9be414e32efd93191080b58be517582836303ad08006c0124bd778b24b55ee4b1c9ed7ad255f43d2cb190715e1cf4d1b7394cd50c998342b4708c69d66d1d4e18030303d511b9b2d10aecc5e35ec0faf306fbeb9574044f8e3c97e0f083f95bab7359bffeab4f44f750a32af4ace0c22b9482936696aa001bbf150c54d910cbb6ee6ace0ebc43eab489dedf635a0220a66524de78410c6727cac113d8c2c16c3a7f9677a84b700466f15bf328517e69738d9f544310f7cbf464ee9835e04364d82af037fea3f88a7770410623b6fdb4df03ced2c270e3c79f2defc5fbb227f1dd2da7d29f39261d579eb38656a53dbb7b64b9a0f856a9ed86fd2ea13b6205bd43c97a4f56b81aee8c795afcfd5c520261fc807e61e7325ee95379552eb10cd08729a8233a4fef5ec723f5ffbe19d6622a8197266dd3c2da70d76d967c89374a926196a514f329e70482915a8d536e173 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0e986f2a2ded7047f9eff208c63ffc0a91e840f5 863c0667d0c4b3d066e542e3bbf48961eadf057f 098b2b64de04a74e5f6d3e7c4cce0f83a9a28611 1465e38e1597cc3e3b3195e1aa5fc47887c9f4c8 e819e3991476872d947bb7717958ca3dcb916340 25537e936aacb3ca8149788e4881eb80346e2b5f 349d0eeaf1cadc406058655c561d7847cad22aad 22bd01cbfd6832f90053be42fe8bb16fe4440fd2 64079652343410d74b6ad12db706d32bb5756691 70c0c992ffa782efdaa3f59cbdf508ed3320ba3b aeae1b07345627f62d6ae16a184ec24d7705c69f e732031142ba8f11c1c9b511fa112de52eda8a87 2d6baf078caa0620d08f9fe0ad8d43ec633b0a01 264ad11da3cc3aab20cd5bbbcba18458bb404b37 3bbb8325483ec7ae714d84763a430b81f8ed622c b4103e4c6f22b7db8500ab98a90030f832c11869 d4580cddc40044f40c03c351d7b8eca080700cee 9c5fa75bab788711b4546fbfb7d02487d13b3e90 21ff1f6bac401fa4123059e0073f97265de01ccd 9c7adb60 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7a:3b:cd:ff:93:72:68:ba:82:83:02:12:25:84:58:f1:26:90:27:b1],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-09 05:26:13.703  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-09 05:26:13.705 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-09 05:26:13.707 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-09 05:26:13.708 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-09 05:26:13.708  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-09 05:26:13.709  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-09 05:26:13.710  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-09 05:26:13.710 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-09 05:26:13.711 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-09 05:26:13.711 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-09 05:26:13.716 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-09 05:26:13.716 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-09 05:26:13.717 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-09 05:26:13.717 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-09 05:26:13.880  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-09 05:26:13.881  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-09 05:26:13.882 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-09 05:26:13.882 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-09 05:26:13.884  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-09 05:26:13.884  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-09 05:26:13.884 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 05:26:13.885 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-09 05:26:13.885 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-09 05:26:13.885 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 05:26:13.886 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-09 05:26:13.886 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-09 05:26:13.887 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 05:26:13.887 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-09 05:26:13.887 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-09 05:26:13.888 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-09 05:26:13.891 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 562942738559669878030832421375045642922985564089 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jan 09 03:17:00 UTC 2023 Final Date: Sat Jan 08 03:16:59 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f8:76:7e:b7:e8:11:35:4b:9f:f0:1f:bd:5e:b4:15:a8:53:85:cb:32],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0e986f2a2ded7047f9eff208c63ffc0a91e840f5 863c0667d0c4b3d066e542e3bbf48961eadf057f 098b2b64de04a74e5f6d3e7c4cce0f83a9a28611 1465e38e1597cc3e3b3195e1aa5fc47887c9f4c8 e819e3991476872d947bb7717958ca3dcb916340 25537e936aacb3ca8149788e4881eb80346e2b5f 349d0eeaf1cadc406058655c561d7847cad22aad 22bd01cbfd6832f90053be42fe8bb16fe4440fd2 64079652343410d74b6ad12db706d32bb5756691 70c0c992ffa782efdaa3f59cbdf508ed3320ba3b aeae1b07345627f62d6ae16a184ec24d7705c69f e732031142ba8f11c1c9b511fa112de52eda8a87 2d6baf078caa0620d08f9fe0ad8d43ec633b0a01 264ad11da3cc3aab20cd5bbbcba18458bb404b37 3bbb8325483ec7ae714d84763a430b81f8ed622c b4103e4c6f22b7db8500ab98a90030f832c11869 d4580cddc40044f40c03c351d7b8eca080700cee 9c5fa75bab788711b4546fbfb7d02487d13b3e90 21ff1f6bac401fa4123059e0073f97265de01ccd 9c7adb60 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b8:29:de:a1:6f:52:cf:65:a6:96:69:34:3e:c2:fe:05:29:84:f6:b4],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-09 05:33:54.742  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-09 05:33:54.744 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-09 05:33:54.746 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-09 05:33:54.748 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-09 05:33:54.748  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-09 05:33:54.749  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-09 05:33:54.750  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-09 05:33:54.750 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-09 05:33:54.751 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-09 05:33:54.752 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-09 05:33:54.756 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-09 05:33:54.757 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-09 05:33:54.757 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-09 05:33:54.758 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-09 05:33:54.896  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-09 05:33:54.896  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-09 05:33:54.897 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-09 05:33:54.897 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-09 05:33:54.898  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-09 05:33:54.899  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-09 05:33:54.899 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 05:33:54.899 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-09 05:33:54.900 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-09 05:33:54.900 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 05:33:54.901 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-09 05:33:54.901 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-09 05:33:54.901 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 05:33:54.902 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-09 05:33:54.902 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-09 05:33:54.903 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-09 05:33:54.906 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 562942738559669878030832421375045642922985564089 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jan 09 03:17:00 UTC 2023 Final Date: Sat Jan 08 03:16:59 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f8:76:7e:b7:e8:11:35:4b:9f:f0:1f:bd:5e:b4:15:a8:53:85:cb:32],[56:66:d1:a4] modulus: a595783ba68d447e8766ba0f8b749a6123448f0899de732529abef5012a62453f6747f7d47af8e143f7bd5056da0c46c9be414e32efd93191080b58be517582836303ad08006c0124bd778b24b55ee4b1c9ed7ad255f43d2cb190715e1cf4d1b7394cd50c998342b4708c69d66d1d4e18030303d511b9b2d10aecc5e35ec0faf306fbeb9574044f8e3c97e0f083f95bab7359bffeab4f44f750a32af4ace0c22b9482936696aa001bbf150c54d910cbb6ee6ace0ebc43eab489dedf635a0220a66524de78410c6727cac113d8c2c16c3a7f9677a84b700466f15bf328517e69738d9f544310f7cbf464ee9835e04364d82af037fea3f88a7770410623b6fdb4df03ced2c270e3c79f2defc5fbb227f1dd2da7d29f39261d579eb38656a53dbb7b64b9a0f856a9ed86fd2ea13b6205bd43c97a4f56b81aee8c795afcfd5c520261fc807e61e7325ee95379552eb10cd08729a8233a4fef5ec723f5ffbe19d6622a8197266dd3c2da70d76d967c89374a926196a514f329e70482915a8d536e173 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0e986f2a2ded7047f9eff208c63ffc0a91e840f5 863c0667d0c4b3d066e542e3bbf48961eadf057f 098b2b64de04a74e5f6d3e7c4cce0f83a9a28611 1465e38e1597cc3e3b3195e1aa5fc47887c9f4c8 e819e3991476872d947bb7717958ca3dcb916340 25537e936aacb3ca8149788e4881eb80346e2b5f 349d0eeaf1cadc406058655c561d7847cad22aad 22bd01cbfd6832f90053be42fe8bb16fe4440fd2 64079652343410d74b6ad12db706d32bb5756691 70c0c992ffa782efdaa3f59cbdf508ed3320ba3b aeae1b07345627f62d6ae16a184ec24d7705c69f e732031142ba8f11c1c9b511fa112de52eda8a87 2d6baf078caa0620d08f9fe0ad8d43ec633b0a01 264ad11da3cc3aab20cd5bbbcba18458bb404b37 3bbb8325483ec7ae714d84763a430b81f8ed622c b4103e4c6f22b7db8500ab98a90030f832c11869 d4580cddc40044f40c03c351d7b8eca080700cee 9c5fa75bab788711b4546fbfb7d02487d13b3e90 21ff1f6bac401fa4123059e0073f97265de01ccd 9c7adb60 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b6:dd:5a:47:87:d4:c6:f1:f4:f2:1c:b1:81:3f:83:35:08:ee:36:ad],[56:66:d1:a4] modulus: bf97daa1aa569bac1bfc54224a5d675c9b20279f9602c91ec0342f09254f80eb1cb08a49d455c6c64c0c8613d6a7980999588d968bb3006d5d0672fb524565d62a184075eff5e616bd258839b1f559efafbd2d4326dab6f089a9f899282b22fb606dc855050aabc6544de15f7212087306020c37ab55ca77b740e7fb3c400cc092027d5d42ab3496d2c6713b5d334c2d52e7fcbc535a0b7c41900bc1082e5193806ea150a79bb62faf9cff612f82d31e8c588207c04a95bd3f77514bf3b9cadd1c962e6dafb2a6973f6473f0ece6ff4ea9bfa947d8cdb088c9dc6850b6199b5f1a987e34f9342c9f47c39e1e5cb5687b85fb4b82e7ff7bb2854026e5b986ffdd public exponent: 10001 ] 2023-01-09 05:39:25.093  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-09 05:39:25.096 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-09 05:39:25.102 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-09 05:39:25.103 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-09 05:39:25.103  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-09 05:39:25.104  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-09 05:39:25.104  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-09 05:39:25.105 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-09 05:39:25.107 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-09 05:39:25.107 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-09 05:39:25.113 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-09 05:39:25.115 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-09 05:39:25.115 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-09 05:39:25.116 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-09 05:39:25.274  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-09 05:39:25.275  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-09 05:39:25.275 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-09 05:39:25.276 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-09 05:39:25.277  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-09 05:39:25.278  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-09 05:39:25.278 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 05:39:25.279 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-09 05:39:25.279 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-09 05:39:25.280 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 05:39:25.281 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-09 05:39:25.281 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-09 05:39:25.282 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 05:39:25.282 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-09 05:39:25.283 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-09 05:39:25.283 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-09 05:39:25.287 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 562942738559669878030832421375045642922985564089 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jan 09 03:17:00 UTC 2023 Final Date: Sat Jan 08 03:16:59 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f8:76:7e:b7:e8:11:35:4b:9f:f0:1f:bd:5e:b4:15:a8:53:85:cb:32],[56:66:d1:a4] modulus: a595783ba68d447e8766ba0f8b749a6123448f0899de732529abef5012a62453f6747f7d47af8e143f7bd5056da0c46c9be414e32efd93191080b58be517582836303ad08006c0124bd778b24b55ee4b1c9ed7ad255f43d2cb190715e1cf4d1b7394cd50c998342b4708c69d66d1d4e18030303d511b9b2d10aecc5e35ec0faf306fbeb9574044f8e3c97e0f083f95bab7359bffeab4f44f750a32af4ace0c22b9482936696aa001bbf150c54d910cbb6ee6ace0ebc43eab489dedf635a0220a66524de78410c6727cac113d8c2c16c3a7f9677a84b700466f15bf328517e69738d9f544310f7cbf464ee9835e04364d82af037fea3f88a7770410623b6fdb4df03ced2c270e3c79f2defc5fbb227f1dd2da7d29f39261d579eb38656a53dbb7b64b9a0f856a9ed86fd2ea13b6205bd43c97a4f56b81aee8c795afcfd5c520261fc807e61e7325ee95379552eb10cd08729a8233a4fef5ec723f5ffbe19d6622a8197266dd3c2da70d76d967c89374a926196a514f329e70482915a8d536e173 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0e986f2a2ded7047f9eff208c63ffc0a91e840f5 863c0667d0c4b3d066e542e3bbf48961eadf057f 098b2b64de04a74e5f6d3e7c4cce0f83a9a28611 1465e38e1597cc3e3b3195e1aa5fc47887c9f4c8 e819e3991476872d947bb7717958ca3dcb916340 25537e936aacb3ca8149788e4881eb80346e2b5f 349d0eeaf1cadc406058655c561d7847cad22aad 22bd01cbfd6832f90053be42fe8bb16fe4440fd2 64079652343410d74b6ad12db706d32bb5756691 70c0c992ffa782efdaa3f59cbdf508ed3320ba3b aeae1b07345627f62d6ae16a184ec24d7705c69f e732031142ba8f11c1c9b511fa112de52eda8a87 2d6baf078caa0620d08f9fe0ad8d43ec633b0a01 264ad11da3cc3aab20cd5bbbcba18458bb404b37 3bbb8325483ec7ae714d84763a430b81f8ed622c b4103e4c6f22b7db8500ab98a90030f832c11869 d4580cddc40044f40c03c351d7b8eca080700cee 9c5fa75bab788711b4546fbfb7d02487d13b3e90 21ff1f6bac401fa4123059e0073f97265de01ccd 9c7adb60 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [22:e2:f6:ea:18:91:6d:e7:58:f0:a4:96:8f:3c:f2:09:0a:53:c8:7b],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-09 05:46:41.879  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-09 05:46:41.882 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-09 05:46:41.884 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2023-01-09 05:46:41.885 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-09 05:46:41.885  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2023-01-09 05:46:41.885  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-09 05:46:41.886  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-09 05:46:41.886 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-09 05:46:41.886 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-09 05:46:41.887 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-09 05:46:41.891 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-09 05:46:41.891 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-09 05:46:41.891 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-09 05:46:41.892 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-09 05:46:42.030  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-09 05:46:42.031  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-09 05:46:42.031 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-09 05:46:42.031 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-09 05:46:42.032  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-09 05:46:42.033  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-09 05:46:42.033 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 05:46:42.033 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-09 05:46:42.034 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-09 05:46:42.034 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 05:46:42.034 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-09 05:46:42.035 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-09 05:46:42.035 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 05:46:42.035 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-09 05:46:42.036 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-09 05:46:42.037 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-09 05:46:42.041 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 562942738559669878030832421375045642922985564089 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jan 09 03:17:00 UTC 2023 Final Date: Sat Jan 08 03:16:59 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f8:76:7e:b7:e8:11:35:4b:9f:f0:1f:bd:5e:b4:15:a8:53:85:cb:32],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0e986f2a2ded7047f9eff208c63ffc0a91e840f5 863c0667d0c4b3d066e542e3bbf48961eadf057f 098b2b64de04a74e5f6d3e7c4cce0f83a9a28611 1465e38e1597cc3e3b3195e1aa5fc47887c9f4c8 e819e3991476872d947bb7717958ca3dcb916340 25537e936aacb3ca8149788e4881eb80346e2b5f 349d0eeaf1cadc406058655c561d7847cad22aad 22bd01cbfd6832f90053be42fe8bb16fe4440fd2 64079652343410d74b6ad12db706d32bb5756691 70c0c992ffa782efdaa3f59cbdf508ed3320ba3b aeae1b07345627f62d6ae16a184ec24d7705c69f e732031142ba8f11c1c9b511fa112de52eda8a87 2d6baf078caa0620d08f9fe0ad8d43ec633b0a01 264ad11da3cc3aab20cd5bbbcba18458bb404b37 3bbb8325483ec7ae714d84763a430b81f8ed622c b4103e4c6f22b7db8500ab98a90030f832c11869 d4580cddc40044f40c03c351d7b8eca080700cee 9c5fa75bab788711b4546fbfb7d02487d13b3e90 21ff1f6bac401fa4123059e0073f97265de01ccd 9c7adb60 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c9:f7:9f:cf:c1:28:c3:86:41:15:08:bc:a4:0a:b3:34:a8:dd:88:1c],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-09 05:52:57.261  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-09 05:52:57.263 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-09 05:52:57.266 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-09 05:52:57.267 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-09 05:52:57.267  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-09 05:52:57.268  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-09 05:52:57.269  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-09 05:52:57.269 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-09 05:52:57.270 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-09 05:52:57.270 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-09 05:52:57.274 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-09 05:52:57.275 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-09 05:52:57.275 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-09 05:52:57.276 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-09 05:52:57.440  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-09 05:52:57.441  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-09 05:52:57.441 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-09 05:52:57.442 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-09 05:52:57.443  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-09 05:52:57.444  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-09 05:52:57.444 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 05:52:57.445 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-09 05:52:57.445 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-09 05:52:57.446 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 05:52:57.446 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-09 05:52:57.446 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-09 05:52:57.447 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 05:52:57.447 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-09 05:52:57.447 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-09 05:52:57.448 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-09 05:52:57.451 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 562942738559669878030832421375045642922985564089 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jan 09 03:17:00 UTC 2023 Final Date: Sat Jan 08 03:16:59 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f8:76:7e:b7:e8:11:35:4b:9f:f0:1f:bd:5e:b4:15:a8:53:85:cb:32],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0e986f2a2ded7047f9eff208c63ffc0a91e840f5 863c0667d0c4b3d066e542e3bbf48961eadf057f 098b2b64de04a74e5f6d3e7c4cce0f83a9a28611 1465e38e1597cc3e3b3195e1aa5fc47887c9f4c8 e819e3991476872d947bb7717958ca3dcb916340 25537e936aacb3ca8149788e4881eb80346e2b5f 349d0eeaf1cadc406058655c561d7847cad22aad 22bd01cbfd6832f90053be42fe8bb16fe4440fd2 64079652343410d74b6ad12db706d32bb5756691 70c0c992ffa782efdaa3f59cbdf508ed3320ba3b aeae1b07345627f62d6ae16a184ec24d7705c69f e732031142ba8f11c1c9b511fa112de52eda8a87 2d6baf078caa0620d08f9fe0ad8d43ec633b0a01 264ad11da3cc3aab20cd5bbbcba18458bb404b37 3bbb8325483ec7ae714d84763a430b81f8ed622c b4103e4c6f22b7db8500ab98a90030f832c11869 d4580cddc40044f40c03c351d7b8eca080700cee 9c5fa75bab788711b4546fbfb7d02487d13b3e90 21ff1f6bac401fa4123059e0073f97265de01ccd 9c7adb60 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f6:ae:bd:5d:b9:f1:6b:67:0c:5c:9d:0f:e5:3c:34:5a:89:14:fc:d2],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-09 05:53:36.083  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-09 05:53:36.083 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-09 05:53:36.085 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-09 05:53:36.086 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-09 05:53:36.086  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-09 05:53:36.087  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-09 05:53:36.087  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-09 05:53:36.087 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-09 05:53:36.088 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-09 05:53:36.088 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-09 05:53:36.092 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-09 05:53:36.096 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-09 05:53:36.097 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-09 05:53:36.097 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-09 05:53:36.222  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-09 05:53:36.222  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-09 05:53:36.223 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-09 05:53:36.223 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-09 05:53:36.224  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-09 05:53:36.224  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-09 05:53:36.225 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 05:53:36.225 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-09 05:53:36.225 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-09 05:53:36.226 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 05:53:36.226 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-09 05:53:36.226 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-09 05:53:36.227 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 05:53:36.227 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-09 05:53:36.227 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-09 05:53:36.228 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-09 05:53:36.230 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 562942738559669878030832421375045642922985564089 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jan 09 03:17:00 UTC 2023 Final Date: Sat Jan 08 03:16:59 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f8:76:7e:b7:e8:11:35:4b:9f:f0:1f:bd:5e:b4:15:a8:53:85:cb:32],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0e986f2a2ded7047f9eff208c63ffc0a91e840f5 863c0667d0c4b3d066e542e3bbf48961eadf057f 098b2b64de04a74e5f6d3e7c4cce0f83a9a28611 1465e38e1597cc3e3b3195e1aa5fc47887c9f4c8 e819e3991476872d947bb7717958ca3dcb916340 25537e936aacb3ca8149788e4881eb80346e2b5f 349d0eeaf1cadc406058655c561d7847cad22aad 22bd01cbfd6832f90053be42fe8bb16fe4440fd2 64079652343410d74b6ad12db706d32bb5756691 70c0c992ffa782efdaa3f59cbdf508ed3320ba3b aeae1b07345627f62d6ae16a184ec24d7705c69f e732031142ba8f11c1c9b511fa112de52eda8a87 2d6baf078caa0620d08f9fe0ad8d43ec633b0a01 264ad11da3cc3aab20cd5bbbcba18458bb404b37 3bbb8325483ec7ae714d84763a430b81f8ed622c b4103e4c6f22b7db8500ab98a90030f832c11869 d4580cddc40044f40c03c351d7b8eca080700cee 9c5fa75bab788711b4546fbfb7d02487d13b3e90 21ff1f6bac401fa4123059e0073f97265de01ccd 9c7adb60 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [74:82:27:30:c1:e0:18:81:7e:d4:9e:38:c8:0d:ae:71:91:c8:75:03],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-09 06:19:21.942  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-09 06:19:21.944 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-09 06:19:21.946 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-09 06:19:21.947 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-09 06:19:21.948  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-09 06:19:21.948  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-09 06:19:21.949  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-09 06:19:21.949 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-09 06:19:21.950 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-09 06:19:21.950 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-09 06:19:21.960 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-09 06:19:21.962 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-09 06:19:21.962 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-09 06:19:21.962 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-09 06:19:22.144  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-09 06:19:22.144  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-09 06:19:22.144 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-09 06:19:22.145 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-09 06:19:22.146  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-09 06:19:22.146  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-09 06:19:22.147 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 06:19:22.147 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-09 06:19:22.147 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-09 06:19:22.148 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 06:19:22.148 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-09 06:19:22.148 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-09 06:19:22.149 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 06:19:22.149 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-09 06:19:22.149 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-09 06:19:22.150 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-09 06:19:22.154 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 562942738559669878030832421375045642922985564089 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jan 09 03:17:00 UTC 2023 Final Date: Sat Jan 08 03:16:59 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f8:76:7e:b7:e8:11:35:4b:9f:f0:1f:bd:5e:b4:15:a8:53:85:cb:32],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0e986f2a2ded7047f9eff208c63ffc0a91e840f5 863c0667d0c4b3d066e542e3bbf48961eadf057f 098b2b64de04a74e5f6d3e7c4cce0f83a9a28611 1465e38e1597cc3e3b3195e1aa5fc47887c9f4c8 e819e3991476872d947bb7717958ca3dcb916340 25537e936aacb3ca8149788e4881eb80346e2b5f 349d0eeaf1cadc406058655c561d7847cad22aad 22bd01cbfd6832f90053be42fe8bb16fe4440fd2 64079652343410d74b6ad12db706d32bb5756691 70c0c992ffa782efdaa3f59cbdf508ed3320ba3b aeae1b07345627f62d6ae16a184ec24d7705c69f e732031142ba8f11c1c9b511fa112de52eda8a87 2d6baf078caa0620d08f9fe0ad8d43ec633b0a01 264ad11da3cc3aab20cd5bbbcba18458bb404b37 3bbb8325483ec7ae714d84763a430b81f8ed622c b4103e4c6f22b7db8500ab98a90030f832c11869 d4580cddc40044f40c03c351d7b8eca080700cee 9c5fa75bab788711b4546fbfb7d02487d13b3e90 21ff1f6bac401fa4123059e0073f97265de01ccd 9c7adb60 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [62:16:80:ee:3f:96:b7:9e:4d:42:6f:43:67:97:a9:d0:bc:d1:7c:94],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-09 06:19:27.574  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-09 06:19:27.575 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-09 06:19:27.576 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-09 06:19:27.578 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-09 06:19:27.579  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-09 06:19:27.579  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-09 06:19:27.580  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-09 06:19:27.580 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-09 06:19:27.580 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-09 06:19:27.581 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-09 06:19:27.584 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-09 06:19:27.585 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-09 06:19:27.585 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-09 06:19:27.586 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-09 06:19:27.695  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-09 06:19:27.696  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-09 06:19:27.696 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-09 06:19:27.696 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-09 06:19:27.697  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-09 06:19:27.697  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-09 06:19:27.698 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 06:19:27.698 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-09 06:19:27.698 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-09 06:19:27.699 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 06:19:27.699 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-09 06:19:27.699 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-09 06:19:27.700 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-09 06:19:27.700 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-09 06:19:27.701 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-09 06:19:27.701 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-09 06:19:27.704 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 562942738559669878030832421375045642922985564089 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Jan 09 03:17:00 UTC 2023 Final Date: Sat Jan 08 03:16:59 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f8:76:7e:b7:e8:11:35:4b:9f:f0:1f:bd:5e:b4:15:a8:53:85:cb:32],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 0e986f2a2ded7047f9eff208c63ffc0a91e840f5 863c0667d0c4b3d066e542e3bbf48961eadf057f 098b2b64de04a74e5f6d3e7c4cce0f83a9a28611 1465e38e1597cc3e3b3195e1aa5fc47887c9f4c8 e819e3991476872d947bb7717958ca3dcb916340 25537e936aacb3ca8149788e4881eb80346e2b5f 349d0eeaf1cadc406058655c561d7847cad22aad 22bd01cbfd6832f90053be42fe8bb16fe4440fd2 64079652343410d74b6ad12db706d32bb5756691 70c0c992ffa782efdaa3f59cbdf508ed3320ba3b aeae1b07345627f62d6ae16a184ec24d7705c69f e732031142ba8f11c1c9b511fa112de52eda8a87 2d6baf078caa0620d08f9fe0ad8d43ec633b0a01 264ad11da3cc3aab20cd5bbbcba18458bb404b37 3bbb8325483ec7ae714d84763a430b81f8ed622c b4103e4c6f22b7db8500ab98a90030f832c11869 d4580cddc40044f40c03c351d7b8eca080700cee 9c5fa75bab788711b4546fbfb7d02487d13b3e90 21ff1f6bac401fa4123059e0073f97265de01ccd 9c7adb60 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [61:f0:44:0b:bc:2f:b4:f5:9b:bc:13:6c:c4:76:ed:6c:fa:e3:c0:15],[56:66:d1:a4] modulus: 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 public exponent: 10001 ]