2022-10-25 04:53:04,334 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-10-25 04:53:05,320 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-10-25 04:53:05.986  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Oct 25, 2022 4:53:07 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Oct 25, 2022 4:53:07 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Oct 25, 2022 4:53:07 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Oct 25, 2022 4:53:07 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-10-25 04:53:08.436 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-10-25 04:53:08.693  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-10-25 04:53:08.840  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-10-25 04:53:09.600 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-10-25 04:53:09.603 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-10-25 04:53:09.605 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-10-25 04:53:09.609 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-10-25 04:53:09.650 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-10-25 04:53:09.655 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-10-25 04:53:09.754 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-10-25 04:53:10.360 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Oct 25, 2022 4:53:11 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-10-25 04:53:11.357  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 7.892 seconds (JVM running for 9.694) Oct 25, 2022 4:53:38 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-10-25 04:53:55.929  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-10-25 04:53:55.938 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-10-25 04:53:55.971 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-10-25 04:53:55.974 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-25 04:53:55.988  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-10-25 04:53:55.990  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-10-25 04:53:55.991  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-10-25 04:53:55.992 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-10-25 04:53:55.993 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-25 04:53:55.995 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-10-25 04:53:56.002 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-10-25 04:53:56.005 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-10-25 04:53:56.048 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-10-25 04:53:56.054 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-25 04:53:56.054 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-25 04:53:56.058 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-25 04:53:56.577  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-10-25 04:53:56.581  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-10-25 04:53:56.582 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-10-25 04:53:56.585 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-25 04:53:56.595  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-10-25 04:53:56.597  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-10-25 04:53:56.598 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 04:53:56.598 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-25 04:53:56.599 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-25 04:53:56.614 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 04:53:56.614 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-25 04:53:56.615 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-25 04:53:56.620 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 04:53:56.621 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-25 04:53:56.621 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-25 04:53:56.622 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-25 04:53:56.655 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 562651429647294948916732802945004324503750221452 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Oct 25 04:50:57 UTC 2022 Final Date: Sun Oct 24 04:50:56 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a5:59:cc:94:9c:63:90:81:0e:d3:81:aa:81:ef:86:08:f1:27:68:52],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 16e7c5d1012dc61a74f97df5980ce0c6e0b0f1a2 6d762624a919232ca7297628a2c4ec928a95b521 fa46640576f5aef6bc2bbb0ccdf5e3025419af1e 1090d83973cc7f8ce8f5f520e6db6e64e46c448c 0d1cf2dd5cef85140074f162952d6001ed875332 cd553c5d8811352671d21ea631b27bed533334f0 c09be0200c0dd31626d0ec4ee620b317ef96d765 76cb403a5bb4dea4fc162b4d6b416b38b4b176ac 09c8aa7a5b4a956a56054192f192b8deba3baa38 1ef2fea3d49d02ff90bdd85357bffa2e242b3d95 3a902e48f7e3d5fb5e00437fa240fd2aa0b0cf96 44eed11ea60026bab5d53c1a088fbd2333fd973c 5c06ef385fdf8fa276f0a7f30250051a974e5443 a6f3ddec6a4c899bc904a42b349b0fa98da46649 15ce8b538263fafefc254f1ff28cee6b1ab146b5 0e8cc09478e1fc12a771fcfb1df0890f3385d4d8 f11adfe1ec64a5caee4663b1df0901434d8a4ff1 a63a5ccb66bcc41fe12bdc3752a6c99eec2fc908 5653b11129f5c13a8a09d509804cfdb2b7f6a1b5 71af8eb3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [75:aa:5b:a0:3a:24:81:f1:28:c9:5f:77:aa:16:ec:64:eb:ea:9e:dd],[56:66:d1:a4] modulus: acc7b713adfd7d135ead1b08f55426314305c590538e22adcc67b3af0dce7c7e295f4d6943049f2cebf466cdffa9200fa2a4c21c896de5d4cced7f773ac8db0d6a52bcdf95442f219189da0ff8fe2a9841491717fb79cf903621e43e9741c3ec18c1e0e5c82adc36a2b6257eb6617b24c5a83652f136dd478c1b502e18d4645d4f029578bf62fa8e06ae926b952470f111cf4d862abdd991feab4f1a85ddd9be2cbf04448b160220acf949a755a8f57e2684f0750f4149e57c0081982c82d10f37aaff32a3928fff91e9be22a4095b2993a349ff7d73aab13eb388d3585630e469dcdb6174bdb8b8febd2677b980a305e7adb9291a0288eeb370a841c278348d public exponent: 10001 ] 2022-10-25 06:04:27.603  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-10-25 06:04:27.606 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-10-25 06:04:27.610 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-10-25 06:04:27.611 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-25 06:04:27.612  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-10-25 06:04:27.613  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-10-25 06:04:27.616  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-10-25 06:04:27.617 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-10-25 06:04:27.618 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-10-25 06:04:27.619 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-10-25 06:04:27.627 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-10-25 06:04:27.629 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-25 06:04:27.630 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-25 06:04:27.630 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-25 06:04:27.901  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-10-25 06:04:27.902  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-10-25 06:04:27.903 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-10-25 06:04:27.903 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-25 06:04:27.905  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-10-25 06:04:27.906  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-10-25 06:04:27.907 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 06:04:27.907 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-25 06:04:27.907 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-25 06:04:27.908 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 06:04:27.908 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-25 06:04:27.909 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-25 06:04:27.909 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 06:04:27.910 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-25 06:04:27.910 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-25 06:04:27.911 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-25 06:04:27.915 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 562651429647294948916732802945004324503750221452 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Oct 25 04:50:57 UTC 2022 Final Date: Sun Oct 24 04:50:56 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a5:59:cc:94:9c:63:90:81:0e:d3:81:aa:81:ef:86:08:f1:27:68:52],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 16e7c5d1012dc61a74f97df5980ce0c6e0b0f1a2 6d762624a919232ca7297628a2c4ec928a95b521 fa46640576f5aef6bc2bbb0ccdf5e3025419af1e 1090d83973cc7f8ce8f5f520e6db6e64e46c448c 0d1cf2dd5cef85140074f162952d6001ed875332 cd553c5d8811352671d21ea631b27bed533334f0 c09be0200c0dd31626d0ec4ee620b317ef96d765 76cb403a5bb4dea4fc162b4d6b416b38b4b176ac 09c8aa7a5b4a956a56054192f192b8deba3baa38 1ef2fea3d49d02ff90bdd85357bffa2e242b3d95 3a902e48f7e3d5fb5e00437fa240fd2aa0b0cf96 44eed11ea60026bab5d53c1a088fbd2333fd973c 5c06ef385fdf8fa276f0a7f30250051a974e5443 a6f3ddec6a4c899bc904a42b349b0fa98da46649 15ce8b538263fafefc254f1ff28cee6b1ab146b5 0e8cc09478e1fc12a771fcfb1df0890f3385d4d8 f11adfe1ec64a5caee4663b1df0901434d8a4ff1 a63a5ccb66bcc41fe12bdc3752a6c99eec2fc908 5653b11129f5c13a8a09d509804cfdb2b7f6a1b5 71af8eb3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3d:3c:7b:1b:84:0b:ad:b6:a4:d3:7b:77:2a:3a:bf:6d:d4:f5:ff:53],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-25 06:06:16.871  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-10-25 06:06:16.874 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-10-25 06:06:16.878 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-10-25 06:06:16.879 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-25 06:06:16.880  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-10-25 06:06:16.881  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-10-25 06:06:16.881  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-10-25 06:06:16.882 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-10-25 06:06:16.883 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-10-25 06:06:16.883 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-10-25 06:06:16.890 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-10-25 06:06:16.891 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-25 06:06:16.892 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-25 06:06:16.895 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-25 06:06:17.069  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-10-25 06:06:17.070  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-10-25 06:06:17.071 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-10-25 06:06:17.072 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-25 06:06:17.074  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-10-25 06:06:17.075  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-10-25 06:06:17.075 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 06:06:17.076 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-25 06:06:17.076 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-25 06:06:17.077 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 06:06:17.077 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-25 06:06:17.077 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-25 06:06:17.078 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 06:06:17.078 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-25 06:06:17.079 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-25 06:06:17.080 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-25 06:06:17.084 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 562651429647294948916732802945004324503750221452 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Oct 25 04:50:57 UTC 2022 Final Date: Sun Oct 24 04:50:56 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a5:59:cc:94:9c:63:90:81:0e:d3:81:aa:81:ef:86:08:f1:27:68:52],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 16e7c5d1012dc61a74f97df5980ce0c6e0b0f1a2 6d762624a919232ca7297628a2c4ec928a95b521 fa46640576f5aef6bc2bbb0ccdf5e3025419af1e 1090d83973cc7f8ce8f5f520e6db6e64e46c448c 0d1cf2dd5cef85140074f162952d6001ed875332 cd553c5d8811352671d21ea631b27bed533334f0 c09be0200c0dd31626d0ec4ee620b317ef96d765 76cb403a5bb4dea4fc162b4d6b416b38b4b176ac 09c8aa7a5b4a956a56054192f192b8deba3baa38 1ef2fea3d49d02ff90bdd85357bffa2e242b3d95 3a902e48f7e3d5fb5e00437fa240fd2aa0b0cf96 44eed11ea60026bab5d53c1a088fbd2333fd973c 5c06ef385fdf8fa276f0a7f30250051a974e5443 a6f3ddec6a4c899bc904a42b349b0fa98da46649 15ce8b538263fafefc254f1ff28cee6b1ab146b5 0e8cc09478e1fc12a771fcfb1df0890f3385d4d8 f11adfe1ec64a5caee4663b1df0901434d8a4ff1 a63a5ccb66bcc41fe12bdc3752a6c99eec2fc908 5653b11129f5c13a8a09d509804cfdb2b7f6a1b5 71af8eb3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8b:c5:82:3f:34:75:4b:e9:2d:bc:d0:7b:9f:e8:20:50:c9:c5:60:17],[56:66:d1:a4] modulus: bb3b1dded9cc3282d6c0f1409b3727f48e28410574be14c75cc10efa79a8aa490568fc48fb425301743a7b050a2a79fbe2871c3301c39678cca8e98a704a8382212327dbe6ca1ab61a341bc5579b660a2ca8683e154d9bc7718e4ffec21e639a551842f3d8dfd7bce531f3fdcc9eca243bc3a7193972c585fb279f50c2a7187c3e4ce90a9db79389eb4a359ba8cb3ac588a35d28c8f97f0b9d5b0606b9ceb5f758a351ee27398ce617503af12ae5eadac49e77d2279e16e4219ce3dba6bf166140ff64bbc6de70fd04ffec7d5c346ce1ee27e227367679fb58bbce9cac144af730f78ee219451636bc2ded32b9aaa3ffc674016414e53bc043dba7e26878744f public exponent: 10001 ] 2022-10-25 06:07:40.578  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-10-25 06:07:40.580 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-10-25 06:07:40.582 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-10-25 06:07:40.583 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-25 06:07:40.584  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-10-25 06:07:40.584  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-10-25 06:07:40.585  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-10-25 06:07:40.585 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-10-25 06:07:40.585 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-10-25 06:07:40.585 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-10-25 06:07:40.589 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-10-25 06:07:40.590 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-25 06:07:40.591 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-25 06:07:40.591 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-25 06:07:40.751  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-10-25 06:07:40.752  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-10-25 06:07:40.752 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-10-25 06:07:40.753 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-25 06:07:40.760  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-10-25 06:07:40.763  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-10-25 06:07:40.764 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 06:07:40.764 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-25 06:07:40.764 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-25 06:07:40.765 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 06:07:40.766 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-25 06:07:40.766 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-25 06:07:40.767 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 06:07:40.767 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-25 06:07:40.768 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-25 06:07:40.768 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-25 06:07:40.798 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 562651429647294948916732802945004324503750221452 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Oct 25 04:50:57 UTC 2022 Final Date: Sun Oct 24 04:50:56 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a5:59:cc:94:9c:63:90:81:0e:d3:81:aa:81:ef:86:08:f1:27:68:52],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 16e7c5d1012dc61a74f97df5980ce0c6e0b0f1a2 6d762624a919232ca7297628a2c4ec928a95b521 fa46640576f5aef6bc2bbb0ccdf5e3025419af1e 1090d83973cc7f8ce8f5f520e6db6e64e46c448c 0d1cf2dd5cef85140074f162952d6001ed875332 cd553c5d8811352671d21ea631b27bed533334f0 c09be0200c0dd31626d0ec4ee620b317ef96d765 76cb403a5bb4dea4fc162b4d6b416b38b4b176ac 09c8aa7a5b4a956a56054192f192b8deba3baa38 1ef2fea3d49d02ff90bdd85357bffa2e242b3d95 3a902e48f7e3d5fb5e00437fa240fd2aa0b0cf96 44eed11ea60026bab5d53c1a088fbd2333fd973c 5c06ef385fdf8fa276f0a7f30250051a974e5443 a6f3ddec6a4c899bc904a42b349b0fa98da46649 15ce8b538263fafefc254f1ff28cee6b1ab146b5 0e8cc09478e1fc12a771fcfb1df0890f3385d4d8 f11adfe1ec64a5caee4663b1df0901434d8a4ff1 a63a5ccb66bcc41fe12bdc3752a6c99eec2fc908 5653b11129f5c13a8a09d509804cfdb2b7f6a1b5 71af8eb3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f3:d8:f7:94:5d:c5:a6:1c:a9:07:4d:cf:e6:7f:c3:90:3b:78:0d:c7],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-25 06:09:26.499  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-10-25 06:09:26.502 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-10-25 06:09:26.505 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-10-25 06:09:26.506 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-25 06:09:26.507  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-10-25 06:09:26.508  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-10-25 06:09:26.508  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-10-25 06:09:26.509 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-10-25 06:09:26.509 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-10-25 06:09:26.510 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-10-25 06:09:26.513 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-10-25 06:09:26.514 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-25 06:09:26.515 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-25 06:09:26.516 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-25 06:09:26.653  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-10-25 06:09:26.654  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-10-25 06:09:26.655 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-10-25 06:09:26.656 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-25 06:09:26.657  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-10-25 06:09:26.658  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-10-25 06:09:26.659 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 06:09:26.659 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-25 06:09:26.660 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-25 06:09:26.660 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 06:09:26.661 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-25 06:09:26.661 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-25 06:09:26.662 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 06:09:26.662 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-25 06:09:26.662 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-25 06:09:26.663 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-25 06:09:26.667 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 562651429647294948916732802945004324503750221452 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Oct 25 04:50:57 UTC 2022 Final Date: Sun Oct 24 04:50:56 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a5:59:cc:94:9c:63:90:81:0e:d3:81:aa:81:ef:86:08:f1:27:68:52],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 16e7c5d1012dc61a74f97df5980ce0c6e0b0f1a2 6d762624a919232ca7297628a2c4ec928a95b521 fa46640576f5aef6bc2bbb0ccdf5e3025419af1e 1090d83973cc7f8ce8f5f520e6db6e64e46c448c 0d1cf2dd5cef85140074f162952d6001ed875332 cd553c5d8811352671d21ea631b27bed533334f0 c09be0200c0dd31626d0ec4ee620b317ef96d765 76cb403a5bb4dea4fc162b4d6b416b38b4b176ac 09c8aa7a5b4a956a56054192f192b8deba3baa38 1ef2fea3d49d02ff90bdd85357bffa2e242b3d95 3a902e48f7e3d5fb5e00437fa240fd2aa0b0cf96 44eed11ea60026bab5d53c1a088fbd2333fd973c 5c06ef385fdf8fa276f0a7f30250051a974e5443 a6f3ddec6a4c899bc904a42b349b0fa98da46649 15ce8b538263fafefc254f1ff28cee6b1ab146b5 0e8cc09478e1fc12a771fcfb1df0890f3385d4d8 f11adfe1ec64a5caee4663b1df0901434d8a4ff1 a63a5ccb66bcc41fe12bdc3752a6c99eec2fc908 5653b11129f5c13a8a09d509804cfdb2b7f6a1b5 71af8eb3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b3:e2:1a:f9:2a:4c:cb:1b:76:3f:33:d4:37:5a:ac:6f:fd:76:76:06],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-25 06:15:30.903  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-10-25 06:15:30.906 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-10-25 06:15:30.908 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-10-25 06:15:30.910 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-25 06:15:30.910  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-10-25 06:15:30.911  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-10-25 06:15:30.912  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-10-25 06:15:30.912 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-10-25 06:15:30.912 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-10-25 06:15:30.913 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-10-25 06:15:30.917 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-10-25 06:15:30.918 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-25 06:15:30.919 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-25 06:15:30.919 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-25 06:15:31.117  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-10-25 06:15:31.119  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-10-25 06:15:31.119 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-10-25 06:15:31.119 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-25 06:15:31.121  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-10-25 06:15:31.121  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-10-25 06:15:31.122 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 06:15:31.122 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-25 06:15:31.122 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-25 06:15:31.123 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 06:15:31.124 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-25 06:15:31.124 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-25 06:15:31.125 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 06:15:31.125 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-25 06:15:31.125 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-25 06:15:31.126 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-25 06:15:31.129 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 562651429647294948916732802945004324503750221452 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Oct 25 04:50:57 UTC 2022 Final Date: Sun Oct 24 04:50:56 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a5:59:cc:94:9c:63:90:81:0e:d3:81:aa:81:ef:86:08:f1:27:68:52],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 16e7c5d1012dc61a74f97df5980ce0c6e0b0f1a2 6d762624a919232ca7297628a2c4ec928a95b521 fa46640576f5aef6bc2bbb0ccdf5e3025419af1e 1090d83973cc7f8ce8f5f520e6db6e64e46c448c 0d1cf2dd5cef85140074f162952d6001ed875332 cd553c5d8811352671d21ea631b27bed533334f0 c09be0200c0dd31626d0ec4ee620b317ef96d765 76cb403a5bb4dea4fc162b4d6b416b38b4b176ac 09c8aa7a5b4a956a56054192f192b8deba3baa38 1ef2fea3d49d02ff90bdd85357bffa2e242b3d95 3a902e48f7e3d5fb5e00437fa240fd2aa0b0cf96 44eed11ea60026bab5d53c1a088fbd2333fd973c 5c06ef385fdf8fa276f0a7f30250051a974e5443 a6f3ddec6a4c899bc904a42b349b0fa98da46649 15ce8b538263fafefc254f1ff28cee6b1ab146b5 0e8cc09478e1fc12a771fcfb1df0890f3385d4d8 f11adfe1ec64a5caee4663b1df0901434d8a4ff1 a63a5ccb66bcc41fe12bdc3752a6c99eec2fc908 5653b11129f5c13a8a09d509804cfdb2b7f6a1b5 71af8eb3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [42:08:74:a1:2c:78:f2:9a:02:b2:59:61:40:c3:4a:66:da:b4:72:66],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-25 06:19:07.096  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-10-25 06:19:07.099 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-10-25 06:19:07.102 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-10-25 06:19:07.103 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-25 06:19:07.107  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-10-25 06:19:07.109  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-10-25 06:19:07.110  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-10-25 06:19:07.110 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-10-25 06:19:07.110 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-10-25 06:19:07.111 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-10-25 06:19:07.114 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-10-25 06:19:07.116 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-25 06:19:07.119 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-25 06:19:07.120 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-25 06:19:07.282  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-10-25 06:19:07.283  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-10-25 06:19:07.283 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-10-25 06:19:07.284 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-25 06:19:07.285  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-10-25 06:19:07.285  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-10-25 06:19:07.286 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 06:19:07.286 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-25 06:19:07.286 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-25 06:19:07.287 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 06:19:07.288 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-25 06:19:07.288 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-25 06:19:07.289 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 06:19:07.289 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-25 06:19:07.289 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-25 06:19:07.290 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-25 06:19:07.293 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 562651429647294948916732802945004324503750221452 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Oct 25 04:50:57 UTC 2022 Final Date: Sun Oct 24 04:50:56 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a5:59:cc:94:9c:63:90:81:0e:d3:81:aa:81:ef:86:08:f1:27:68:52],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 16e7c5d1012dc61a74f97df5980ce0c6e0b0f1a2 6d762624a919232ca7297628a2c4ec928a95b521 fa46640576f5aef6bc2bbb0ccdf5e3025419af1e 1090d83973cc7f8ce8f5f520e6db6e64e46c448c 0d1cf2dd5cef85140074f162952d6001ed875332 cd553c5d8811352671d21ea631b27bed533334f0 c09be0200c0dd31626d0ec4ee620b317ef96d765 76cb403a5bb4dea4fc162b4d6b416b38b4b176ac 09c8aa7a5b4a956a56054192f192b8deba3baa38 1ef2fea3d49d02ff90bdd85357bffa2e242b3d95 3a902e48f7e3d5fb5e00437fa240fd2aa0b0cf96 44eed11ea60026bab5d53c1a088fbd2333fd973c 5c06ef385fdf8fa276f0a7f30250051a974e5443 a6f3ddec6a4c899bc904a42b349b0fa98da46649 15ce8b538263fafefc254f1ff28cee6b1ab146b5 0e8cc09478e1fc12a771fcfb1df0890f3385d4d8 f11adfe1ec64a5caee4663b1df0901434d8a4ff1 a63a5ccb66bcc41fe12bdc3752a6c99eec2fc908 5653b11129f5c13a8a09d509804cfdb2b7f6a1b5 71af8eb3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [79:49:71:b3:1b:17:51:2d:f2:5f:4f:1d:c5:e3:74:e3:ec:ca:57:35],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-25 06:25:30.459  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-10-25 06:25:30.472 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-10-25 06:25:30.476 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-10-25 06:25:30.477 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-25 06:25:30.478  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-10-25 06:25:30.479  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-10-25 06:25:30.479  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-10-25 06:25:30.480 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-10-25 06:25:30.480 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-10-25 06:25:30.481 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-10-25 06:25:30.487 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-10-25 06:25:30.489 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-25 06:25:30.490 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-25 06:25:30.490 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-25 06:25:30.674  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-10-25 06:25:30.675  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-10-25 06:25:30.675 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-10-25 06:25:30.676 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-25 06:25:30.679  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-10-25 06:25:30.680  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-10-25 06:25:30.681 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 06:25:30.681 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-25 06:25:30.682 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-25 06:25:30.683 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 06:25:30.683 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-25 06:25:30.683 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-25 06:25:30.684 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 06:25:30.684 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-25 06:25:30.684 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-25 06:25:30.685 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-25 06:25:30.689 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 562651429647294948916732802945004324503750221452 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Oct 25 04:50:57 UTC 2022 Final Date: Sun Oct 24 04:50:56 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a5:59:cc:94:9c:63:90:81:0e:d3:81:aa:81:ef:86:08:f1:27:68:52],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 16e7c5d1012dc61a74f97df5980ce0c6e0b0f1a2 6d762624a919232ca7297628a2c4ec928a95b521 fa46640576f5aef6bc2bbb0ccdf5e3025419af1e 1090d83973cc7f8ce8f5f520e6db6e64e46c448c 0d1cf2dd5cef85140074f162952d6001ed875332 cd553c5d8811352671d21ea631b27bed533334f0 c09be0200c0dd31626d0ec4ee620b317ef96d765 76cb403a5bb4dea4fc162b4d6b416b38b4b176ac 09c8aa7a5b4a956a56054192f192b8deba3baa38 1ef2fea3d49d02ff90bdd85357bffa2e242b3d95 3a902e48f7e3d5fb5e00437fa240fd2aa0b0cf96 44eed11ea60026bab5d53c1a088fbd2333fd973c 5c06ef385fdf8fa276f0a7f30250051a974e5443 a6f3ddec6a4c899bc904a42b349b0fa98da46649 15ce8b538263fafefc254f1ff28cee6b1ab146b5 0e8cc09478e1fc12a771fcfb1df0890f3385d4d8 f11adfe1ec64a5caee4663b1df0901434d8a4ff1 a63a5ccb66bcc41fe12bdc3752a6c99eec2fc908 5653b11129f5c13a8a09d509804cfdb2b7f6a1b5 71af8eb3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [3a:0a:a4:19:e7:29:37:15:f8:1a:0e:06:29:07:76:05:e7:e6:be:84],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-25 06:29:58.710  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-10-25 06:29:58.714 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-10-25 06:29:58.718 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-10-25 06:29:58.720 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-25 06:29:58.720  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-10-25 06:29:58.721  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-10-25 06:29:58.721  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-10-25 06:29:58.721 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-10-25 06:29:58.722 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-10-25 06:29:58.723 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-10-25 06:29:58.727 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-10-25 06:29:58.728 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-25 06:29:58.728 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-25 06:29:58.729 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-25 06:29:58.936  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-10-25 06:29:58.937  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-10-25 06:29:58.937 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-10-25 06:29:58.937 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-25 06:29:58.939  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-10-25 06:29:58.939  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-10-25 06:29:58.939 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 06:29:58.940 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-25 06:29:58.940 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-25 06:29:58.940 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 06:29:58.941 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-25 06:29:58.941 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-25 06:29:58.941 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 06:29:58.941 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-25 06:29:58.941 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-25 06:29:58.943 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-25 06:29:58.948 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 562651429647294948916732802945004324503750221452 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Oct 25 04:50:57 UTC 2022 Final Date: Sun Oct 24 04:50:56 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a5:59:cc:94:9c:63:90:81:0e:d3:81:aa:81:ef:86:08:f1:27:68:52],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 16e7c5d1012dc61a74f97df5980ce0c6e0b0f1a2 6d762624a919232ca7297628a2c4ec928a95b521 fa46640576f5aef6bc2bbb0ccdf5e3025419af1e 1090d83973cc7f8ce8f5f520e6db6e64e46c448c 0d1cf2dd5cef85140074f162952d6001ed875332 cd553c5d8811352671d21ea631b27bed533334f0 c09be0200c0dd31626d0ec4ee620b317ef96d765 76cb403a5bb4dea4fc162b4d6b416b38b4b176ac 09c8aa7a5b4a956a56054192f192b8deba3baa38 1ef2fea3d49d02ff90bdd85357bffa2e242b3d95 3a902e48f7e3d5fb5e00437fa240fd2aa0b0cf96 44eed11ea60026bab5d53c1a088fbd2333fd973c 5c06ef385fdf8fa276f0a7f30250051a974e5443 a6f3ddec6a4c899bc904a42b349b0fa98da46649 15ce8b538263fafefc254f1ff28cee6b1ab146b5 0e8cc09478e1fc12a771fcfb1df0890f3385d4d8 f11adfe1ec64a5caee4663b1df0901434d8a4ff1 a63a5ccb66bcc41fe12bdc3752a6c99eec2fc908 5653b11129f5c13a8a09d509804cfdb2b7f6a1b5 71af8eb3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f4:7a:d9:c4:2d:06:a8:8b:fc:a3:6b:f6:0b:8e:9e:7a:dd:b8:74:f1],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-25 06:30:15.858  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-10-25 06:30:15.859 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-10-25 06:30:15.861 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-10-25 06:30:15.862 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-25 06:30:15.863  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-10-25 06:30:15.863  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-10-25 06:30:15.864  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-10-25 06:30:15.864 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-10-25 06:30:15.864 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-10-25 06:30:15.865 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-10-25 06:30:15.868 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-10-25 06:30:15.869 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-25 06:30:15.869 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-25 06:30:15.870 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-25 06:30:15.977  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-10-25 06:30:15.978  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-10-25 06:30:15.979 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-10-25 06:30:15.979 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-25 06:30:15.980  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-10-25 06:30:15.981  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-10-25 06:30:15.981 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 06:30:15.981 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-25 06:30:15.981 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-25 06:30:15.982 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 06:30:15.982 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-25 06:30:15.982 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-25 06:30:15.983 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 06:30:15.983 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-25 06:30:15.984 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-25 06:30:15.984 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-25 06:30:15.987 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 562651429647294948916732802945004324503750221452 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Oct 25 04:50:57 UTC 2022 Final Date: Sun Oct 24 04:50:56 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a5:59:cc:94:9c:63:90:81:0e:d3:81:aa:81:ef:86:08:f1:27:68:52],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 16e7c5d1012dc61a74f97df5980ce0c6e0b0f1a2 6d762624a919232ca7297628a2c4ec928a95b521 fa46640576f5aef6bc2bbb0ccdf5e3025419af1e 1090d83973cc7f8ce8f5f520e6db6e64e46c448c 0d1cf2dd5cef85140074f162952d6001ed875332 cd553c5d8811352671d21ea631b27bed533334f0 c09be0200c0dd31626d0ec4ee620b317ef96d765 76cb403a5bb4dea4fc162b4d6b416b38b4b176ac 09c8aa7a5b4a956a56054192f192b8deba3baa38 1ef2fea3d49d02ff90bdd85357bffa2e242b3d95 3a902e48f7e3d5fb5e00437fa240fd2aa0b0cf96 44eed11ea60026bab5d53c1a088fbd2333fd973c 5c06ef385fdf8fa276f0a7f30250051a974e5443 a6f3ddec6a4c899bc904a42b349b0fa98da46649 15ce8b538263fafefc254f1ff28cee6b1ab146b5 0e8cc09478e1fc12a771fcfb1df0890f3385d4d8 f11adfe1ec64a5caee4663b1df0901434d8a4ff1 a63a5ccb66bcc41fe12bdc3752a6c99eec2fc908 5653b11129f5c13a8a09d509804cfdb2b7f6a1b5 71af8eb3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e3:c9:1d:b3:ac:5f:dc:3c:fe:bc:0d:46:a1:89:e9:f2:6b:c2:b3:5c],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-25 06:48:17.430  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-10-25 06:48:17.432 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-10-25 06:48:17.435 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-10-25 06:48:17.436 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-25 06:48:17.436  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-10-25 06:48:17.437  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-10-25 06:48:17.437  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-10-25 06:48:17.437 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-10-25 06:48:17.438 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-10-25 06:48:17.438 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-10-25 06:48:17.441 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-10-25 06:48:17.442 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-25 06:48:17.443 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-25 06:48:17.443 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-25 06:48:17.602  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-10-25 06:48:17.604  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-10-25 06:48:17.604 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-10-25 06:48:17.604 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-25 06:48:17.606  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-10-25 06:48:17.606  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-10-25 06:48:17.607 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 06:48:17.607 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-25 06:48:17.607 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-25 06:48:17.609 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 06:48:17.610 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-25 06:48:17.610 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-25 06:48:17.610 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 06:48:17.611 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-25 06:48:17.611 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-25 06:48:17.613 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-25 06:48:17.619 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 562651429647294948916732802945004324503750221452 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Oct 25 04:50:57 UTC 2022 Final Date: Sun Oct 24 04:50:56 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a5:59:cc:94:9c:63:90:81:0e:d3:81:aa:81:ef:86:08:f1:27:68:52],[56:66:d1:a4] modulus: 9722c69fcdc633bf3f6c6c9f15be2e17e94f45917fe9d16f701b5efa5ad74b8256aa0dbede5c1e7ef8827a6289b7754de44d9ccf1e1c2abfa287c52bea7e8e2b073d344fe761b8ccbb4b806b7baa6ae782992b7f3fd1cf4448bddbe5c846dbdb6c5add25844f594d6e93b19049d8b1f3be03398068815433e9bb124abb7af5b911e213e30b4143d473146c4fc8efa214c334309283b78d421522aea6f623edfbe4774c72cae0f45cfb5ff49a940550bf7d8eb19fbf81517257b3dcdec57ffdbf7fe728de6c4d14094616b864cc9f7039e22ac06bd1e0713e1eae6a3cb76bb138375cba37f1f4d4ffbcf386315dc0c36d870fd5da2bae739fbcf8061cfcef0393c4b2cbdbde8393d070eca81b2333c0df7993791e93efef225faa8d48bd689a1f8a70c7855e4aeb6538e70c52da41078c3232e3978b8062bb8dde35bf9d0d1278f35a935c45842d85f96846f2a56faee94fa9d91286df14df31ae65d43c0eeb6e6608ef9afa1b89fb956a63cd9afdffa35ccff2f2cf7e41b4ba7dab760f46b997 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 16e7c5d1012dc61a74f97df5980ce0c6e0b0f1a2 6d762624a919232ca7297628a2c4ec928a95b521 fa46640576f5aef6bc2bbb0ccdf5e3025419af1e 1090d83973cc7f8ce8f5f520e6db6e64e46c448c 0d1cf2dd5cef85140074f162952d6001ed875332 cd553c5d8811352671d21ea631b27bed533334f0 c09be0200c0dd31626d0ec4ee620b317ef96d765 76cb403a5bb4dea4fc162b4d6b416b38b4b176ac 09c8aa7a5b4a956a56054192f192b8deba3baa38 1ef2fea3d49d02ff90bdd85357bffa2e242b3d95 3a902e48f7e3d5fb5e00437fa240fd2aa0b0cf96 44eed11ea60026bab5d53c1a088fbd2333fd973c 5c06ef385fdf8fa276f0a7f30250051a974e5443 a6f3ddec6a4c899bc904a42b349b0fa98da46649 15ce8b538263fafefc254f1ff28cee6b1ab146b5 0e8cc09478e1fc12a771fcfb1df0890f3385d4d8 f11adfe1ec64a5caee4663b1df0901434d8a4ff1 a63a5ccb66bcc41fe12bdc3752a6c99eec2fc908 5653b11129f5c13a8a09d509804cfdb2b7f6a1b5 71af8eb3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [98:22:f2:84:7d:b0:95:42:47:48:5e:59:36:ce:7f:54:a1:51:98:39],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-10-25 06:48:24.244  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-10-25 06:48:24.245 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-10-25 06:48:24.246 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-10-25 06:48:24.247 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-10-25 06:48:24.247  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-10-25 06:48:24.247  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-10-25 06:48:24.248  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-10-25 06:48:24.248 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-10-25 06:48:24.248 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-10-25 06:48:24.248 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-10-25 06:48:24.251 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-10-25 06:48:24.251 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-25 06:48:24.252 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-10-25 06:48:24.252 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-25 06:48:24.358  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-10-25 06:48:24.359  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-10-25 06:48:24.359 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-10-25 06:48:24.359 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-10-25 06:48:24.360  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-10-25 06:48:24.361  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-10-25 06:48:24.361 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 06:48:24.361 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-25 06:48:24.361 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-25 06:48:24.362 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 06:48:24.362 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-25 06:48:24.362 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-25 06:48:24.363 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-10-25 06:48:24.363 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-10-25 06:48:24.363 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-10-25 06:48:24.364 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-10-25 06:48:24.367 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 562651429647294948916732802945004324503750221452 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Oct 25 04:50:57 UTC 2022 Final Date: Sun Oct 24 04:50:56 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [a5:59:cc:94:9c:63:90:81:0e:d3:81:aa:81:ef:86:08:f1:27:68:52],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 16e7c5d1012dc61a74f97df5980ce0c6e0b0f1a2 6d762624a919232ca7297628a2c4ec928a95b521 fa46640576f5aef6bc2bbb0ccdf5e3025419af1e 1090d83973cc7f8ce8f5f520e6db6e64e46c448c 0d1cf2dd5cef85140074f162952d6001ed875332 cd553c5d8811352671d21ea631b27bed533334f0 c09be0200c0dd31626d0ec4ee620b317ef96d765 76cb403a5bb4dea4fc162b4d6b416b38b4b176ac 09c8aa7a5b4a956a56054192f192b8deba3baa38 1ef2fea3d49d02ff90bdd85357bffa2e242b3d95 3a902e48f7e3d5fb5e00437fa240fd2aa0b0cf96 44eed11ea60026bab5d53c1a088fbd2333fd973c 5c06ef385fdf8fa276f0a7f30250051a974e5443 a6f3ddec6a4c899bc904a42b349b0fa98da46649 15ce8b538263fafefc254f1ff28cee6b1ab146b5 0e8cc09478e1fc12a771fcfb1df0890f3385d4d8 f11adfe1ec64a5caee4663b1df0901434d8a4ff1 a63a5ccb66bcc41fe12bdc3752a6c99eec2fc908 5653b11129f5c13a8a09d509804cfdb2b7f6a1b5 71af8eb3 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [29:64:75:e8:4f:8b:cd:e8:de:30:bf:f7:ae:19:ec:80:2f:9c:94:87],[56:66:d1:a4] modulus: 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 public exponent: 10001 ]