2022-09-28 05:08:36,441 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-09-28 05:08:37,530 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-09-28 05:08:38.311  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Sep 28, 2022 5:08:40 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Sep 28, 2022 5:08:40 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Sep 28, 2022 5:08:40 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Sep 28, 2022 5:08:40 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-09-28 05:08:40.874 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-09-28 05:08:41.177  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-09-28 05:08:41.337  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-09-28 05:08:42.029 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-09-28 05:08:42.032 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-09-28 05:08:42.033 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-09-28 05:08:42.037 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-09-28 05:08:42.077 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) 2022-09-28 05:08:42.080 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-09-28 05:08:42.222 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-09-28 05:08:42.788 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Sep 28, 2022 5:08:43 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-09-28 05:08:43.756  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 8.174 seconds (JVM running for 10.0) Sep 28, 2022 5:09:07 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-09-28 05:09:49.517  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-28 05:09:49.527 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-28 05:09:49.571 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-09-28 05:09:49.575 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-28 05:09:49.598  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-09-28 05:09:49.601  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-28 05:09:49.603  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-28 05:09:49.604 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-28 05:09:49.606 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-28 05:09:49.610 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-28 05:09:49.618 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-28 05:09:49.621 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-28 05:09:49.672 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-28 05:09:49.681 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-28 05:09:49.682 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-28 05:09:49.687 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-28 05:09:50.553  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-28 05:09:50.556  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-28 05:09:50.556 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-28 05:09:50.558 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-28 05:09:50.569  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-28 05:09:50.570  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-28 05:09:50.571 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-28 05:09:50.572 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-28 05:09:50.572 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-28 05:09:50.584 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-28 05:09:50.584 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-28 05:09:50.585 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-28 05:09:50.591 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-28 05:09:50.591 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-28 05:09:50.592 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-28 05:09:50.593 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-28 05:09:50.622 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 126532571313485926535656064583892493195441381172 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Sep 28 05:05:52 UTC 2022 Final Date: Mon Sep 27 05:05:51 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [70:45:b2:ad:28:41:8a:c1:ee:3f:e0:e9:eb:60:37:29:78:fa:41:fc] modulus: bebc660ff1893cec3167017652d640237a73c01728f3309ace9c3e01e920d9b5f4a55f394dbb2a3b1f38d80ea67a94eb0c99e4ab2929a74b31617452f0e62f7b26a25c52ac58973533695f7e40f770ff2dd9ab1efe8118e2d2209550f16b711caf30cb08d63527153c9a5a8653892345b6f54387fdbeb878bd199fc62c85d3c43abc88b1a6bce315883b620a8e711b63da31dfe22c794f17a581a2c221e975ece998a254192ca0f087ea5fd8da49ab320e8b71e4fb714bb32fdd96dba86df20830b3185e9b8df3fa1df9e123c1709f31364d3ae81e6f51b5f1fb52909c5fa835540d4fafe9203002d4736780fc19a43657e45216da7cb62cfe6af69a9ab0cfdf4caf3cd945d07b235f46f254cf9ac3060ed7d1e84396fbce25e791a4bf30ff842d74b5a208896d4d1251003c2d1271c4b923f36e3f4bc99c7bb2ca0ee178011d26f0dd3c194dd1913fa1a8d8fb1d7016ed31151a2f317c6e76d127dcdf0ef4198e115476a3fe8ee4161fe7785fef2c105f929e7cd2d6bbc03c24a4ce9081160d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 856c8930806183526f38ee7d67051809630278a3 6dea7a1fe1e0ee1dcccc48e1b42d2386e849b9b0 9f109800d3580ec6cd1bc3dc8eedde6afd7805d1 9a6940ecb27177ef6e5e29b80e6e3a3c9ca00baf 9b0852c797c86ab07f6c0b8afccc533ad728afec e08eb321ca96dfb995b0c77ae783f9b052e969aa 12c2165cd7950075c8c290aa574616bfa527e732 83a999152b0bbfd6da0d1818829de617c269ccf8 85f4895964085cc09fc721e4ff81d8154f984eb9 1b1d1777131e5c192c1cb2d6dcfe1f484e1f4944 ce39b8f3e429ef31ec15138670f9177459ed42fd 9021ac454ec0987d1355a3e6829389e12b1704a3 c1cd1910df7ef7b0bb37faa628ccec2fd69eb6a8 06ef2119f287c3c9181d955bebbeebc8dc68d8a0 51ef1966cc02c305c771aa772b6bedbe8547dfb1 a09b063e2ffd22b051061988ce0da4ba2a9cde5f bccb51c543fb2b72a53d92ecfc85038996b06c51 aa00296b0cea242dfcd8862c824f6d40d9aa402f fc90fd9d6ca0af96277acf34cf1835b976cd67a6 43cd5844 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8f:fa:9d:09:42:23:e9:b9:13:6d:4d:0f:14:c2:54:00:1a:7e:76:fe] modulus: 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 public exponent: 10001 ] 2022-09-28 06:12:08.410  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-28 06:12:08.415 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-28 06:12:08.418 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-28 06:12:08.420 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-28 06:12:08.421  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-28 06:12:08.422  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-28 06:12:08.423  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-28 06:12:08.423 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-28 06:12:08.424 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-28 06:12:08.425 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-28 06:12:08.434 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-28 06:12:08.435 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-28 06:12:08.436 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-28 06:12:08.436 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-28 06:12:08.684  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-28 06:12:08.685  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-28 06:12:08.686 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-28 06:12:08.687 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-28 06:12:08.690  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-28 06:12:08.691  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-28 06:12:08.692 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-28 06:12:08.692 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-28 06:12:08.692 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-28 06:12:08.694 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-28 06:12:08.694 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-28 06:12:08.695 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-28 06:12:08.697 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-28 06:12:08.697 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-28 06:12:08.698 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-28 06:12:08.699 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-28 06:12:08.707 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 126532571313485926535656064583892493195441381172 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Sep 28 05:05:52 UTC 2022 Final Date: Mon Sep 27 05:05:51 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [70:45:b2:ad:28:41:8a:c1:ee:3f:e0:e9:eb:60:37:29:78:fa:41:fc] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 856c8930806183526f38ee7d67051809630278a3 6dea7a1fe1e0ee1dcccc48e1b42d2386e849b9b0 9f109800d3580ec6cd1bc3dc8eedde6afd7805d1 9a6940ecb27177ef6e5e29b80e6e3a3c9ca00baf 9b0852c797c86ab07f6c0b8afccc533ad728afec e08eb321ca96dfb995b0c77ae783f9b052e969aa 12c2165cd7950075c8c290aa574616bfa527e732 83a999152b0bbfd6da0d1818829de617c269ccf8 85f4895964085cc09fc721e4ff81d8154f984eb9 1b1d1777131e5c192c1cb2d6dcfe1f484e1f4944 ce39b8f3e429ef31ec15138670f9177459ed42fd 9021ac454ec0987d1355a3e6829389e12b1704a3 c1cd1910df7ef7b0bb37faa628ccec2fd69eb6a8 06ef2119f287c3c9181d955bebbeebc8dc68d8a0 51ef1966cc02c305c771aa772b6bedbe8547dfb1 a09b063e2ffd22b051061988ce0da4ba2a9cde5f bccb51c543fb2b72a53d92ecfc85038996b06c51 aa00296b0cea242dfcd8862c824f6d40d9aa402f fc90fd9d6ca0af96277acf34cf1835b976cd67a6 43cd5844 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [23:34:82:8d:35:af:3a:87:59:5c:06:c6:54:a8:15:be:be:97:60:c5] modulus: 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 public exponent: 10001 ] 2022-09-28 06:13:56.096  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-28 06:13:56.098 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-28 06:13:56.100 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-09-28 06:13:56.101 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-28 06:13:56.101  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-09-28 06:13:56.102  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-28 06:13:56.102  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-28 06:13:56.103 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-28 06:13:56.103 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-28 06:13:56.104 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-28 06:13:56.113 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-28 06:13:56.114 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-28 06:13:56.114 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-28 06:13:56.115 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-28 06:13:56.296  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-28 06:13:56.297  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-28 06:13:56.298 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-28 06:13:56.298 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-28 06:13:56.301  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-28 06:13:56.302  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-28 06:13:56.302 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-28 06:13:56.302 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-28 06:13:56.303 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-28 06:13:56.304 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-28 06:13:56.304 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-28 06:13:56.305 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-28 06:13:56.305 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-28 06:13:56.306 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-28 06:13:56.306 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-28 06:13:56.307 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-28 06:13:56.311 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 126532571313485926535656064583892493195441381172 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Sep 28 05:05:52 UTC 2022 Final Date: Mon Sep 27 05:05:51 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [70:45:b2:ad:28:41:8a:c1:ee:3f:e0:e9:eb:60:37:29:78:fa:41:fc] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 856c8930806183526f38ee7d67051809630278a3 6dea7a1fe1e0ee1dcccc48e1b42d2386e849b9b0 9f109800d3580ec6cd1bc3dc8eedde6afd7805d1 9a6940ecb27177ef6e5e29b80e6e3a3c9ca00baf 9b0852c797c86ab07f6c0b8afccc533ad728afec e08eb321ca96dfb995b0c77ae783f9b052e969aa 12c2165cd7950075c8c290aa574616bfa527e732 83a999152b0bbfd6da0d1818829de617c269ccf8 85f4895964085cc09fc721e4ff81d8154f984eb9 1b1d1777131e5c192c1cb2d6dcfe1f484e1f4944 ce39b8f3e429ef31ec15138670f9177459ed42fd 9021ac454ec0987d1355a3e6829389e12b1704a3 c1cd1910df7ef7b0bb37faa628ccec2fd69eb6a8 06ef2119f287c3c9181d955bebbeebc8dc68d8a0 51ef1966cc02c305c771aa772b6bedbe8547dfb1 a09b063e2ffd22b051061988ce0da4ba2a9cde5f bccb51c543fb2b72a53d92ecfc85038996b06c51 aa00296b0cea242dfcd8862c824f6d40d9aa402f fc90fd9d6ca0af96277acf34cf1835b976cd67a6 43cd5844 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8b:79:c1:23:c4:14:fc:20:26:d2:d4:9f:05:16:11:0e:bc:79:3c:4e] modulus: bafa58288f956de9733318393c7daecde00af9207fb8629d7ed4fcad11e87cd42b961d15005a1b7f3cfeeb0cdf7a6d52ccb29e5d336ceddbef5977c1f62b0589e2b60b4cf144dcb8503b8bc351f22521ddf18d46679dba4912b9e896d00a54161035b9abe866a0a8375f73119ea135ea82f0c9ca433629305b20ae9ea0a1012a735245ad5f6698488a0c8acfa6f5745ab8727db10200f03c9f234be9b3adf8f2fd726ecb3846a0e2ae1a3a1cde6bfcabc688a970ea29b3fd98ec39c60af18017fd2e59eb35caf16bbc183b85154a09f4d9f9d2a0a4369d9d46e8610e362c2a1d0408988db6202cb698de8dc9a8ccbffc902dc95cf2cb7a40efae2a8fa26e60d5 public exponent: 10001 ] 2022-09-28 06:14:58.693  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-28 06:14:58.695 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-28 06:14:58.699 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-09-28 06:14:58.700 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-28 06:14:58.707  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-09-28 06:14:58.708  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-28 06:14:58.712  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-28 06:14:58.713 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-28 06:14:58.714 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-28 06:14:58.714 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-28 06:14:58.725 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-28 06:14:58.726 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-28 06:14:58.728 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-28 06:14:58.729 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-28 06:14:58.923  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-28 06:14:58.924  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-28 06:14:58.925 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-28 06:14:58.925 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-28 06:14:58.928  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-28 06:14:58.929  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-28 06:14:58.930 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-28 06:14:58.930 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-28 06:14:58.931 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-28 06:14:58.933 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-28 06:14:58.933 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-28 06:14:58.934 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-28 06:14:58.935 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-28 06:14:58.936 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-28 06:14:58.936 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-28 06:14:58.938 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-28 06:14:58.948 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 126532571313485926535656064583892493195441381172 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Sep 28 05:05:52 UTC 2022 Final Date: Mon Sep 27 05:05:51 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [70:45:b2:ad:28:41:8a:c1:ee:3f:e0:e9:eb:60:37:29:78:fa:41:fc] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 856c8930806183526f38ee7d67051809630278a3 6dea7a1fe1e0ee1dcccc48e1b42d2386e849b9b0 9f109800d3580ec6cd1bc3dc8eedde6afd7805d1 9a6940ecb27177ef6e5e29b80e6e3a3c9ca00baf 9b0852c797c86ab07f6c0b8afccc533ad728afec e08eb321ca96dfb995b0c77ae783f9b052e969aa 12c2165cd7950075c8c290aa574616bfa527e732 83a999152b0bbfd6da0d1818829de617c269ccf8 85f4895964085cc09fc721e4ff81d8154f984eb9 1b1d1777131e5c192c1cb2d6dcfe1f484e1f4944 ce39b8f3e429ef31ec15138670f9177459ed42fd 9021ac454ec0987d1355a3e6829389e12b1704a3 c1cd1910df7ef7b0bb37faa628ccec2fd69eb6a8 06ef2119f287c3c9181d955bebbeebc8dc68d8a0 51ef1966cc02c305c771aa772b6bedbe8547dfb1 a09b063e2ffd22b051061988ce0da4ba2a9cde5f bccb51c543fb2b72a53d92ecfc85038996b06c51 aa00296b0cea242dfcd8862c824f6d40d9aa402f fc90fd9d6ca0af96277acf34cf1835b976cd67a6 43cd5844 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b3:4d:78:6c:42:ca:11:f8:69:ad:e9:b4:63:dc:15:47:b0:80:41:da] modulus: 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 public exponent: 10001 ] 2022-09-28 06:17:02.100  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-28 06:17:02.102 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-28 06:17:02.103 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-28 06:17:02.104 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-28 06:17:02.105  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-28 06:17:02.105  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-28 06:17:02.106  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-28 06:17:02.106 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-28 06:17:02.107 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-28 06:17:02.107 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-28 06:17:02.112 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-28 06:17:02.113 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-28 06:17:02.113 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-28 06:17:02.114 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-28 06:17:02.303  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-28 06:17:02.304  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-28 06:17:02.305 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-28 06:17:02.305 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-28 06:17:02.307  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-28 06:17:02.307  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-28 06:17:02.308 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-28 06:17:02.308 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-28 06:17:02.309 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-28 06:17:02.309 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-28 06:17:02.310 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-28 06:17:02.310 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-28 06:17:02.311 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-28 06:17:02.312 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-28 06:17:02.312 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-28 06:17:02.313 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-28 06:17:02.317 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 126532571313485926535656064583892493195441381172 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Sep 28 05:05:52 UTC 2022 Final Date: Mon Sep 27 05:05:51 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [70:45:b2:ad:28:41:8a:c1:ee:3f:e0:e9:eb:60:37:29:78:fa:41:fc] modulus: bebc660ff1893cec3167017652d640237a73c01728f3309ace9c3e01e920d9b5f4a55f394dbb2a3b1f38d80ea67a94eb0c99e4ab2929a74b31617452f0e62f7b26a25c52ac58973533695f7e40f770ff2dd9ab1efe8118e2d2209550f16b711caf30cb08d63527153c9a5a8653892345b6f54387fdbeb878bd199fc62c85d3c43abc88b1a6bce315883b620a8e711b63da31dfe22c794f17a581a2c221e975ece998a254192ca0f087ea5fd8da49ab320e8b71e4fb714bb32fdd96dba86df20830b3185e9b8df3fa1df9e123c1709f31364d3ae81e6f51b5f1fb52909c5fa835540d4fafe9203002d4736780fc19a43657e45216da7cb62cfe6af69a9ab0cfdf4caf3cd945d07b235f46f254cf9ac3060ed7d1e84396fbce25e791a4bf30ff842d74b5a208896d4d1251003c2d1271c4b923f36e3f4bc99c7bb2ca0ee178011d26f0dd3c194dd1913fa1a8d8fb1d7016ed31151a2f317c6e76d127dcdf0ef4198e115476a3fe8ee4161fe7785fef2c105f929e7cd2d6bbc03c24a4ce9081160d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 856c8930806183526f38ee7d67051809630278a3 6dea7a1fe1e0ee1dcccc48e1b42d2386e849b9b0 9f109800d3580ec6cd1bc3dc8eedde6afd7805d1 9a6940ecb27177ef6e5e29b80e6e3a3c9ca00baf 9b0852c797c86ab07f6c0b8afccc533ad728afec e08eb321ca96dfb995b0c77ae783f9b052e969aa 12c2165cd7950075c8c290aa574616bfa527e732 83a999152b0bbfd6da0d1818829de617c269ccf8 85f4895964085cc09fc721e4ff81d8154f984eb9 1b1d1777131e5c192c1cb2d6dcfe1f484e1f4944 ce39b8f3e429ef31ec15138670f9177459ed42fd 9021ac454ec0987d1355a3e6829389e12b1704a3 c1cd1910df7ef7b0bb37faa628ccec2fd69eb6a8 06ef2119f287c3c9181d955bebbeebc8dc68d8a0 51ef1966cc02c305c771aa772b6bedbe8547dfb1 a09b063e2ffd22b051061988ce0da4ba2a9cde5f bccb51c543fb2b72a53d92ecfc85038996b06c51 aa00296b0cea242dfcd8862c824f6d40d9aa402f fc90fd9d6ca0af96277acf34cf1835b976cd67a6 43cd5844 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [64:f3:73:de:77:7e:b8:b6:a6:1e:f2:86:bb:f2:c8:a2:e4:ec:07:9f] modulus: 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 public exponent: 10001 ] 2022-09-28 06:23:55.712  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-28 06:23:55.715 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-28 06:23:55.718 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-28 06:23:55.719 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-28 06:23:55.720  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-28 06:23:55.720  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-28 06:23:55.721  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-28 06:23:55.721 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-28 06:23:55.722 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-28 06:23:55.722 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-28 06:23:55.729 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-28 06:23:55.730 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-28 06:23:55.730 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-28 06:23:55.731 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-28 06:23:55.926  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-28 06:23:55.928  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-28 06:23:55.929 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-28 06:23:55.929 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-28 06:23:55.931  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-28 06:23:55.933  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-28 06:23:55.934 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-28 06:23:55.937 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-28 06:23:55.939 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-28 06:23:55.943 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-28 06:23:55.945 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-28 06:23:55.945 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-28 06:23:55.946 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-28 06:23:55.947 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-28 06:23:55.947 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-28 06:23:55.948 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-28 06:23:55.954 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 126532571313485926535656064583892493195441381172 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Sep 28 05:05:52 UTC 2022 Final Date: Mon Sep 27 05:05:51 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [70:45:b2:ad:28:41:8a:c1:ee:3f:e0:e9:eb:60:37:29:78:fa:41:fc] modulus: bebc660ff1893cec3167017652d640237a73c01728f3309ace9c3e01e920d9b5f4a55f394dbb2a3b1f38d80ea67a94eb0c99e4ab2929a74b31617452f0e62f7b26a25c52ac58973533695f7e40f770ff2dd9ab1efe8118e2d2209550f16b711caf30cb08d63527153c9a5a8653892345b6f54387fdbeb878bd199fc62c85d3c43abc88b1a6bce315883b620a8e711b63da31dfe22c794f17a581a2c221e975ece998a254192ca0f087ea5fd8da49ab320e8b71e4fb714bb32fdd96dba86df20830b3185e9b8df3fa1df9e123c1709f31364d3ae81e6f51b5f1fb52909c5fa835540d4fafe9203002d4736780fc19a43657e45216da7cb62cfe6af69a9ab0cfdf4caf3cd945d07b235f46f254cf9ac3060ed7d1e84396fbce25e791a4bf30ff842d74b5a208896d4d1251003c2d1271c4b923f36e3f4bc99c7bb2ca0ee178011d26f0dd3c194dd1913fa1a8d8fb1d7016ed31151a2f317c6e76d127dcdf0ef4198e115476a3fe8ee4161fe7785fef2c105f929e7cd2d6bbc03c24a4ce9081160d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 856c8930806183526f38ee7d67051809630278a3 6dea7a1fe1e0ee1dcccc48e1b42d2386e849b9b0 9f109800d3580ec6cd1bc3dc8eedde6afd7805d1 9a6940ecb27177ef6e5e29b80e6e3a3c9ca00baf 9b0852c797c86ab07f6c0b8afccc533ad728afec e08eb321ca96dfb995b0c77ae783f9b052e969aa 12c2165cd7950075c8c290aa574616bfa527e732 83a999152b0bbfd6da0d1818829de617c269ccf8 85f4895964085cc09fc721e4ff81d8154f984eb9 1b1d1777131e5c192c1cb2d6dcfe1f484e1f4944 ce39b8f3e429ef31ec15138670f9177459ed42fd 9021ac454ec0987d1355a3e6829389e12b1704a3 c1cd1910df7ef7b0bb37faa628ccec2fd69eb6a8 06ef2119f287c3c9181d955bebbeebc8dc68d8a0 51ef1966cc02c305c771aa772b6bedbe8547dfb1 a09b063e2ffd22b051061988ce0da4ba2a9cde5f bccb51c543fb2b72a53d92ecfc85038996b06c51 aa00296b0cea242dfcd8862c824f6d40d9aa402f fc90fd9d6ca0af96277acf34cf1835b976cd67a6 43cd5844 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8e:d1:36:41:42:32:e2:5e:8b:e2:16:2d:87:f7:ee:f7:2a:93:53:35] modulus: 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 public exponent: 10001 ] 2022-09-28 06:27:58.478  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-28 06:27:58.486 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-28 06:27:58.488 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-28 06:27:58.489 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-28 06:27:58.490  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-09-28 06:27:58.490  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-28 06:27:58.491  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-28 06:27:58.491 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-28 06:27:58.492 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-28 06:27:58.492 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-28 06:27:58.497 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-28 06:27:58.498 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-28 06:27:58.499 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-28 06:27:58.499 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-28 06:27:58.685  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-28 06:27:58.686  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-28 06:27:58.686 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-28 06:27:58.687 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-28 06:27:58.688  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-28 06:27:58.689  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-28 06:27:58.689 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-28 06:27:58.690 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-28 06:27:58.690 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-28 06:27:58.691 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-28 06:27:58.691 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-28 06:27:58.692 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-28 06:27:58.692 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-28 06:27:58.693 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-28 06:27:58.693 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-28 06:27:58.694 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-28 06:27:58.698 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 126532571313485926535656064583892493195441381172 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Sep 28 05:05:52 UTC 2022 Final Date: Mon Sep 27 05:05:51 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [70:45:b2:ad:28:41:8a:c1:ee:3f:e0:e9:eb:60:37:29:78:fa:41:fc] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 856c8930806183526f38ee7d67051809630278a3 6dea7a1fe1e0ee1dcccc48e1b42d2386e849b9b0 9f109800d3580ec6cd1bc3dc8eedde6afd7805d1 9a6940ecb27177ef6e5e29b80e6e3a3c9ca00baf 9b0852c797c86ab07f6c0b8afccc533ad728afec e08eb321ca96dfb995b0c77ae783f9b052e969aa 12c2165cd7950075c8c290aa574616bfa527e732 83a999152b0bbfd6da0d1818829de617c269ccf8 85f4895964085cc09fc721e4ff81d8154f984eb9 1b1d1777131e5c192c1cb2d6dcfe1f484e1f4944 ce39b8f3e429ef31ec15138670f9177459ed42fd 9021ac454ec0987d1355a3e6829389e12b1704a3 c1cd1910df7ef7b0bb37faa628ccec2fd69eb6a8 06ef2119f287c3c9181d955bebbeebc8dc68d8a0 51ef1966cc02c305c771aa772b6bedbe8547dfb1 a09b063e2ffd22b051061988ce0da4ba2a9cde5f bccb51c543fb2b72a53d92ecfc85038996b06c51 aa00296b0cea242dfcd8862c824f6d40d9aa402f fc90fd9d6ca0af96277acf34cf1835b976cd67a6 43cd5844 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [02:3e:78:b9:29:57:8f:ca:60:fc:80:66:9a:59:5d:ef:0b:0e:3a:e3] modulus: 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 public exponent: 10001 ] 2022-09-28 06:34:36.280  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-28 06:34:36.283 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-28 06:34:36.285 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-09-28 06:34:36.286 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-28 06:34:36.286  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-09-28 06:34:36.287  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-28 06:34:36.288  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-28 06:34:36.288 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-28 06:34:36.288 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-28 06:34:36.289 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-28 06:34:36.294 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-28 06:34:36.294 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-28 06:34:36.295 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-28 06:34:36.295 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-28 06:34:36.520  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-28 06:34:36.521  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-28 06:34:36.521 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-28 06:34:36.522 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-28 06:34:36.523  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-28 06:34:36.523  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-28 06:34:36.524 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-28 06:34:36.524 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-28 06:34:36.524 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-28 06:34:36.525 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-28 06:34:36.526 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-28 06:34:36.526 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-28 06:34:36.527 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-28 06:34:36.527 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-28 06:34:36.527 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-28 06:34:36.528 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-28 06:34:36.532 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 126532571313485926535656064583892493195441381172 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Sep 28 05:05:52 UTC 2022 Final Date: Mon Sep 27 05:05:51 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [70:45:b2:ad:28:41:8a:c1:ee:3f:e0:e9:eb:60:37:29:78:fa:41:fc] modulus: bebc660ff1893cec3167017652d640237a73c01728f3309ace9c3e01e920d9b5f4a55f394dbb2a3b1f38d80ea67a94eb0c99e4ab2929a74b31617452f0e62f7b26a25c52ac58973533695f7e40f770ff2dd9ab1efe8118e2d2209550f16b711caf30cb08d63527153c9a5a8653892345b6f54387fdbeb878bd199fc62c85d3c43abc88b1a6bce315883b620a8e711b63da31dfe22c794f17a581a2c221e975ece998a254192ca0f087ea5fd8da49ab320e8b71e4fb714bb32fdd96dba86df20830b3185e9b8df3fa1df9e123c1709f31364d3ae81e6f51b5f1fb52909c5fa835540d4fafe9203002d4736780fc19a43657e45216da7cb62cfe6af69a9ab0cfdf4caf3cd945d07b235f46f254cf9ac3060ed7d1e84396fbce25e791a4bf30ff842d74b5a208896d4d1251003c2d1271c4b923f36e3f4bc99c7bb2ca0ee178011d26f0dd3c194dd1913fa1a8d8fb1d7016ed31151a2f317c6e76d127dcdf0ef4198e115476a3fe8ee4161fe7785fef2c105f929e7cd2d6bbc03c24a4ce9081160d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 856c8930806183526f38ee7d67051809630278a3 6dea7a1fe1e0ee1dcccc48e1b42d2386e849b9b0 9f109800d3580ec6cd1bc3dc8eedde6afd7805d1 9a6940ecb27177ef6e5e29b80e6e3a3c9ca00baf 9b0852c797c86ab07f6c0b8afccc533ad728afec e08eb321ca96dfb995b0c77ae783f9b052e969aa 12c2165cd7950075c8c290aa574616bfa527e732 83a999152b0bbfd6da0d1818829de617c269ccf8 85f4895964085cc09fc721e4ff81d8154f984eb9 1b1d1777131e5c192c1cb2d6dcfe1f484e1f4944 ce39b8f3e429ef31ec15138670f9177459ed42fd 9021ac454ec0987d1355a3e6829389e12b1704a3 c1cd1910df7ef7b0bb37faa628ccec2fd69eb6a8 06ef2119f287c3c9181d955bebbeebc8dc68d8a0 51ef1966cc02c305c771aa772b6bedbe8547dfb1 a09b063e2ffd22b051061988ce0da4ba2a9cde5f bccb51c543fb2b72a53d92ecfc85038996b06c51 aa00296b0cea242dfcd8862c824f6d40d9aa402f fc90fd9d6ca0af96277acf34cf1835b976cd67a6 43cd5844 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c9:f5:f3:1e:d7:08:46:2a:81:7f:7a:7b:00:67:96:38:38:0e:de:ba] modulus: e6c740034a6f1cafba73ac22cc8a8094e09ed187b981e09d8d0bda490af5e1fa8f6f50b40bbba69163f5dd4c5ed1e3915865e5404cd5b056aa93b448c31d76219f050cdd4c20cf6f25b6566edc6c75476168fc06935efe4764851d7aa74ced1912bb2ed98291adabc697af7f1f0f458aa1ab15f895292a0e72a841b0aa8854fde31372106a7aa835d50f936e4ffc49adc5a6320da1900e5e1905192f73fde7cbfbd4c3ca9da36d1fba6deb23f0f9bb504ca2c7ea0543aea71071c96fef79e2afa9c0b7b9f2699568c9794d9d2902ca08fa639cb1c341b17f94d3dbee0ca8b870ce6c6ecc3837ad6c9184f30d548e6d36577c8aefb42cfffd5cc5551c26ca1cdd public exponent: 10001 ] 2022-09-28 06:39:59.282  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-28 06:39:59.286 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-28 06:39:59.290 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-09-28 06:39:59.292 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-28 06:39:59.292  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-09-28 06:39:59.293  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-28 06:39:59.294  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-28 06:39:59.294 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-28 06:39:59.294 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-28 06:39:59.295 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-28 06:39:59.300 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-28 06:39:59.301 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-28 06:39:59.301 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-28 06:39:59.301 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-28 06:39:59.507  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-28 06:39:59.508  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-28 06:39:59.508 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-28 06:39:59.509 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-28 06:39:59.510  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-28 06:39:59.510  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-28 06:39:59.511 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-28 06:39:59.511 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-28 06:39:59.511 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-28 06:39:59.512 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-28 06:39:59.512 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-28 06:39:59.512 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-28 06:39:59.513 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-28 06:39:59.513 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-28 06:39:59.517 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-28 06:39:59.518 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-28 06:39:59.522 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 126532571313485926535656064583892493195441381172 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Sep 28 05:05:52 UTC 2022 Final Date: Mon Sep 27 05:05:51 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [70:45:b2:ad:28:41:8a:c1:ee:3f:e0:e9:eb:60:37:29:78:fa:41:fc] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 856c8930806183526f38ee7d67051809630278a3 6dea7a1fe1e0ee1dcccc48e1b42d2386e849b9b0 9f109800d3580ec6cd1bc3dc8eedde6afd7805d1 9a6940ecb27177ef6e5e29b80e6e3a3c9ca00baf 9b0852c797c86ab07f6c0b8afccc533ad728afec e08eb321ca96dfb995b0c77ae783f9b052e969aa 12c2165cd7950075c8c290aa574616bfa527e732 83a999152b0bbfd6da0d1818829de617c269ccf8 85f4895964085cc09fc721e4ff81d8154f984eb9 1b1d1777131e5c192c1cb2d6dcfe1f484e1f4944 ce39b8f3e429ef31ec15138670f9177459ed42fd 9021ac454ec0987d1355a3e6829389e12b1704a3 c1cd1910df7ef7b0bb37faa628ccec2fd69eb6a8 06ef2119f287c3c9181d955bebbeebc8dc68d8a0 51ef1966cc02c305c771aa772b6bedbe8547dfb1 a09b063e2ffd22b051061988ce0da4ba2a9cde5f bccb51c543fb2b72a53d92ecfc85038996b06c51 aa00296b0cea242dfcd8862c824f6d40d9aa402f fc90fd9d6ca0af96277acf34cf1835b976cd67a6 43cd5844 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4d:36:85:c6:ee:11:c1:f1:b3:0d:53:91:d7:f6:66:79:98:64:1b:6e] modulus: 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 public exponent: 10001 ] 2022-09-28 06:40:18.765  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-28 06:40:18.767 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-28 06:40:18.769 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-09-28 06:40:18.770 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-28 06:40:18.770  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-09-28 06:40:18.771  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-28 06:40:18.771  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-28 06:40:18.771 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-28 06:40:18.772 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-28 06:40:18.772 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-28 06:40:18.777 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-28 06:40:18.778 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-28 06:40:18.778 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-28 06:40:18.778 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-28 06:40:19.026  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-28 06:40:19.027  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-28 06:40:19.027 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-28 06:40:19.027 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-28 06:40:19.029  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-28 06:40:19.029  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-28 06:40:19.030 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-28 06:40:19.030 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-28 06:40:19.030 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-28 06:40:19.031 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-28 06:40:19.031 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-28 06:40:19.032 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-28 06:40:19.032 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-28 06:40:19.033 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-28 06:40:19.033 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-28 06:40:19.034 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-28 06:40:19.037 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 126532571313485926535656064583892493195441381172 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Sep 28 05:05:52 UTC 2022 Final Date: Mon Sep 27 05:05:51 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [70:45:b2:ad:28:41:8a:c1:ee:3f:e0:e9:eb:60:37:29:78:fa:41:fc] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 856c8930806183526f38ee7d67051809630278a3 6dea7a1fe1e0ee1dcccc48e1b42d2386e849b9b0 9f109800d3580ec6cd1bc3dc8eedde6afd7805d1 9a6940ecb27177ef6e5e29b80e6e3a3c9ca00baf 9b0852c797c86ab07f6c0b8afccc533ad728afec e08eb321ca96dfb995b0c77ae783f9b052e969aa 12c2165cd7950075c8c290aa574616bfa527e732 83a999152b0bbfd6da0d1818829de617c269ccf8 85f4895964085cc09fc721e4ff81d8154f984eb9 1b1d1777131e5c192c1cb2d6dcfe1f484e1f4944 ce39b8f3e429ef31ec15138670f9177459ed42fd 9021ac454ec0987d1355a3e6829389e12b1704a3 c1cd1910df7ef7b0bb37faa628ccec2fd69eb6a8 06ef2119f287c3c9181d955bebbeebc8dc68d8a0 51ef1966cc02c305c771aa772b6bedbe8547dfb1 a09b063e2ffd22b051061988ce0da4ba2a9cde5f bccb51c543fb2b72a53d92ecfc85038996b06c51 aa00296b0cea242dfcd8862c824f6d40d9aa402f fc90fd9d6ca0af96277acf34cf1835b976cd67a6 43cd5844 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a4:3a:8c:f1:74:58:f2:19:f5:01:ed:d7:fb:f6:5b:06:6e:6e:a1:3f] modulus: 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 public exponent: 10001 ] 2022-09-28 07:00:42.132  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-28 07:00:42.135 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-28 07:00:42.138 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-09-28 07:00:42.139 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-28 07:00:42.140  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-09-28 07:00:42.141  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-28 07:00:42.141  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-28 07:00:42.142 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-28 07:00:42.142 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-28 07:00:42.143 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-28 07:00:42.148 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-28 07:00:42.149 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-28 07:00:42.149 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-28 07:00:42.150 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-28 07:00:42.365  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-28 07:00:42.366  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-28 07:00:42.366 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-28 07:00:42.367 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-28 07:00:42.368  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-28 07:00:42.368  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-28 07:00:42.369 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-28 07:00:42.369 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-28 07:00:42.369 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-28 07:00:42.370 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-28 07:00:42.371 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-28 07:00:42.371 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-28 07:00:42.372 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-28 07:00:42.372 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-28 07:00:42.372 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-28 07:00:42.373 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-28 07:00:42.377 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 126532571313485926535656064583892493195441381172 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Sep 28 05:05:52 UTC 2022 Final Date: Mon Sep 27 05:05:51 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [70:45:b2:ad:28:41:8a:c1:ee:3f:e0:e9:eb:60:37:29:78:fa:41:fc] modulus: bebc660ff1893cec3167017652d640237a73c01728f3309ace9c3e01e920d9b5f4a55f394dbb2a3b1f38d80ea67a94eb0c99e4ab2929a74b31617452f0e62f7b26a25c52ac58973533695f7e40f770ff2dd9ab1efe8118e2d2209550f16b711caf30cb08d63527153c9a5a8653892345b6f54387fdbeb878bd199fc62c85d3c43abc88b1a6bce315883b620a8e711b63da31dfe22c794f17a581a2c221e975ece998a254192ca0f087ea5fd8da49ab320e8b71e4fb714bb32fdd96dba86df20830b3185e9b8df3fa1df9e123c1709f31364d3ae81e6f51b5f1fb52909c5fa835540d4fafe9203002d4736780fc19a43657e45216da7cb62cfe6af69a9ab0cfdf4caf3cd945d07b235f46f254cf9ac3060ed7d1e84396fbce25e791a4bf30ff842d74b5a208896d4d1251003c2d1271c4b923f36e3f4bc99c7bb2ca0ee178011d26f0dd3c194dd1913fa1a8d8fb1d7016ed31151a2f317c6e76d127dcdf0ef4198e115476a3fe8ee4161fe7785fef2c105f929e7cd2d6bbc03c24a4ce9081160d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 856c8930806183526f38ee7d67051809630278a3 6dea7a1fe1e0ee1dcccc48e1b42d2386e849b9b0 9f109800d3580ec6cd1bc3dc8eedde6afd7805d1 9a6940ecb27177ef6e5e29b80e6e3a3c9ca00baf 9b0852c797c86ab07f6c0b8afccc533ad728afec e08eb321ca96dfb995b0c77ae783f9b052e969aa 12c2165cd7950075c8c290aa574616bfa527e732 83a999152b0bbfd6da0d1818829de617c269ccf8 85f4895964085cc09fc721e4ff81d8154f984eb9 1b1d1777131e5c192c1cb2d6dcfe1f484e1f4944 ce39b8f3e429ef31ec15138670f9177459ed42fd 9021ac454ec0987d1355a3e6829389e12b1704a3 c1cd1910df7ef7b0bb37faa628ccec2fd69eb6a8 06ef2119f287c3c9181d955bebbeebc8dc68d8a0 51ef1966cc02c305c771aa772b6bedbe8547dfb1 a09b063e2ffd22b051061988ce0da4ba2a9cde5f bccb51c543fb2b72a53d92ecfc85038996b06c51 aa00296b0cea242dfcd8862c824f6d40d9aa402f fc90fd9d6ca0af96277acf34cf1835b976cd67a6 43cd5844 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [05:df:38:87:9b:54:76:4a:f6:2b:0f:6b:09:6b:03:4e:bd:7e:c5:5e] modulus: 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 public exponent: 10001 ] 2022-09-28 07:00:47.253  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-09-28 07:00:47.254 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-09-28 07:00:47.255 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-09-28 07:00:47.256 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-09-28 07:00:47.256  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-09-28 07:00:47.256  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-09-28 07:00:47.257  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-09-28 07:00:47.257 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-09-28 07:00:47.257 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-09-28 07:00:47.258 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-09-28 07:00:47.262 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-09-28 07:00:47.263 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-28 07:00:47.263 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-09-28 07:00:47.263 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-28 07:00:47.480  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-09-28 07:00:47.481  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-09-28 07:00:47.481 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-09-28 07:00:47.482 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-09-28 07:00:47.483  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-09-28 07:00:47.483  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-09-28 07:00:47.484 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-28 07:00:47.484 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-28 07:00:47.484 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-28 07:00:47.485 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-28 07:00:47.485 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-28 07:00:47.485 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-28 07:00:47.486 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-09-28 07:00:47.487 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-09-28 07:00:47.487 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-09-28 07:00:47.488 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-09-28 07:00:47.491 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 126532571313485926535656064583892493195441381172 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Sep 28 05:05:52 UTC 2022 Final Date: Mon Sep 27 05:05:51 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [70:45:b2:ad:28:41:8a:c1:ee:3f:e0:e9:eb:60:37:29:78:fa:41:fc] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 856c8930806183526f38ee7d67051809630278a3 6dea7a1fe1e0ee1dcccc48e1b42d2386e849b9b0 9f109800d3580ec6cd1bc3dc8eedde6afd7805d1 9a6940ecb27177ef6e5e29b80e6e3a3c9ca00baf 9b0852c797c86ab07f6c0b8afccc533ad728afec e08eb321ca96dfb995b0c77ae783f9b052e969aa 12c2165cd7950075c8c290aa574616bfa527e732 83a999152b0bbfd6da0d1818829de617c269ccf8 85f4895964085cc09fc721e4ff81d8154f984eb9 1b1d1777131e5c192c1cb2d6dcfe1f484e1f4944 ce39b8f3e429ef31ec15138670f9177459ed42fd 9021ac454ec0987d1355a3e6829389e12b1704a3 c1cd1910df7ef7b0bb37faa628ccec2fd69eb6a8 06ef2119f287c3c9181d955bebbeebc8dc68d8a0 51ef1966cc02c305c771aa772b6bedbe8547dfb1 a09b063e2ffd22b051061988ce0da4ba2a9cde5f bccb51c543fb2b72a53d92ecfc85038996b06c51 aa00296b0cea242dfcd8862c824f6d40d9aa402f fc90fd9d6ca0af96277acf34cf1835b976cd67a6 43cd5844 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b8:24:30:1c:b6:45:a7:71:4e:06:f4:dd:e2:be:c5:69:e6:7c:3a:79] modulus: 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 public exponent: 10001 ]