2022-11-11 05:04:52,713 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-11-11 05:04:53,705 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-11-11 05:04:54.472  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Nov 11, 2022 5:04:56 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Nov 11, 2022 5:04:56 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Nov 11, 2022 5:04:56 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Nov 11, 2022 5:04:56 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-11-11 05:04:56.993 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-11-11 05:04:57.288  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-11-11 05:04:57.457  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-11-11 05:04:58.278 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-11-11 05:04:58.281 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-11-11 05:04:58.282 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-11-11 05:04:58.285 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-11-11 05:04:58.328 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-11-11 05:04:58.331 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-11-11 05:04:58.471 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-11-11 05:04:59.234 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Nov 11, 2022 5:04:59 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-11-11 05:05:00.245  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 8.443 seconds (JVM running for 10.25) Nov 11, 2022 5:05:21 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-11-11 05:05:35.474  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-11 05:05:35.484 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-11 05:05:35.525 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-11-11 05:05:35.528 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-11 05:05:35.548  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-11-11 05:05:35.550  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-11 05:05:35.551  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-11 05:05:35.552 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-11 05:05:35.553 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-11 05:05:35.557 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-11 05:05:35.566 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-11 05:05:35.570 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-11 05:05:35.640 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-11 05:05:35.646 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-11 05:05:35.646 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-11 05:05:35.650 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-11 05:05:36.169  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-11 05:05:36.173  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-11 05:05:36.173 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-11 05:05:36.175 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-11 05:05:36.185  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-11 05:05:36.186  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-11 05:05:36.187 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-11 05:05:36.188 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-11 05:05:36.188 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-11 05:05:36.204 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-11 05:05:36.205 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-11 05:05:36.205 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-11 05:05:36.211 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-11 05:05:36.211 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-11 05:05:36.212 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-11 05:05:36.213 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-11 05:05:36.245 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 66508811459583591192954014939501822665891397286 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 11 05:02:22 UTC 2022 Final Date: Wed Nov 10 05:02:21 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [87:38:8d:f6:63:21:89:d5:97:3c:ea:71:12:18:16:1d:5d:c5:75:02],[56:66:d1:a4] modulus: bb6d13fa3286b789fa3d38d0c0335e023df85895c4ed9c73fa91dc2c3a2e72c51d3cc1fa3256909e53cb237ab52c60ae6a84880c8414e7b0986b525e5aa45afddb60f57d6083238f221ebc128d2ed6023fbcd466b501b9e900f06f6d2a2946a1ce0b129ad003b9bf4c6c3bacb8a5adf3cf9ee76151cdb33b9023f5bc624efb9c4ad4b3a7ba9b1b9199d1b68d705281c170022e0beec677be106f48903b88c2dd96ac5aeacfd259b4c8f06249f1abae742131afb71198746b0fd17099c9ca0bb134691b448e3e605471910bc808d92b70e260ad8256fc42c38d2bfda09bf9e6804c4674466219ddb44cf4af754469c16c2ba02e7cbe7a65137a20af5f63bd688727d1a4fc8a410e980561e3d337c2bb65d8840d24884e898d37895991ec32a8b90841ee4a1156cdd157a8e80f92eacd84f756f4ead06fcf3cdc93b2cc309504d922632465de040cf6961341c2868b9002df954f4c37911446fc057aff021a808149e5412bd99c229a79dd7955833c91da9f36eeef110e74cddf805b9769c5221d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 608d916d7c763c69c88665b47318a34f0cef6605 312cfcf41c103c8f041fca325dfcc2793a36e67f 60392113184659c86d8fc9b4cbcab7ee1f4b5e69 9dc6c63a50072100ff10536b3d8e0b3fa5ac2196 d9ad7f7e45976dc1b586c2d12c71ea95ccc758da 8bfc906643861783462d9bb53fce36bbbb480085 1c4b9eca3a8146c51ccb53abfe67775a325507ce a76af3419086c38aba007e0aabd235eb35300ac1 b7882c0c4bc4a3d7f97aa9b087c2fcdc3a628710 c0adeca9cc78b03b5ec77b63fc824f13a6b3cf19 41c279a640b9e8edc9d5056df13a87149a05e4b0 a9a9e487ef79597cc3a9985f98d51b78dd87c854 5b092f81c66d7c4e3320f6932125b9286856e8a2 72f99cc64bc6d034468538ec920539efecbb1cac 21a791f9fe819edc6f80cfb1c34711161e0354e8 109a7002be88d5e6bd13dd9f903502dcdde50d6a 34f0aa3a1b9e7cd696f26060fa923dd8f16ee908 3183ea9ab8e8617762273558bd46a70221cb1f41 db7471eb455ebf458726884c343eb12a6af5cab2 67ccde40 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [67:72:d5:19:9c:fb:f3:5f:d2:45:32:ee:06:4e:ff:6c:0e:d6:80:31],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-11 06:23:33.264  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-11 06:23:33.267 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-11 06:23:33.270 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-11 06:23:33.271 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-11 06:23:33.272  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-11 06:23:33.274  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-11 06:23:33.274  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-11 06:23:33.275 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-11 06:23:33.276 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-11 06:23:33.276 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-11 06:23:33.283 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-11 06:23:33.284 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-11 06:23:33.284 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-11 06:23:33.285 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-11 06:23:33.532  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-11 06:23:33.533  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-11 06:23:33.534 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-11 06:23:33.534 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-11 06:23:33.538  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-11 06:23:33.539  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-11 06:23:33.539 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-11 06:23:33.540 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-11 06:23:33.540 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-11 06:23:33.542 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-11 06:23:33.543 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-11 06:23:33.543 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-11 06:23:33.544 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-11 06:23:33.545 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-11 06:23:33.545 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-11 06:23:33.547 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-11 06:23:33.552 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 66508811459583591192954014939501822665891397286 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 11 05:02:22 UTC 2022 Final Date: Wed Nov 10 05:02:21 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [87:38:8d:f6:63:21:89:d5:97:3c:ea:71:12:18:16:1d:5d:c5:75:02],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 608d916d7c763c69c88665b47318a34f0cef6605 312cfcf41c103c8f041fca325dfcc2793a36e67f 60392113184659c86d8fc9b4cbcab7ee1f4b5e69 9dc6c63a50072100ff10536b3d8e0b3fa5ac2196 d9ad7f7e45976dc1b586c2d12c71ea95ccc758da 8bfc906643861783462d9bb53fce36bbbb480085 1c4b9eca3a8146c51ccb53abfe67775a325507ce a76af3419086c38aba007e0aabd235eb35300ac1 b7882c0c4bc4a3d7f97aa9b087c2fcdc3a628710 c0adeca9cc78b03b5ec77b63fc824f13a6b3cf19 41c279a640b9e8edc9d5056df13a87149a05e4b0 a9a9e487ef79597cc3a9985f98d51b78dd87c854 5b092f81c66d7c4e3320f6932125b9286856e8a2 72f99cc64bc6d034468538ec920539efecbb1cac 21a791f9fe819edc6f80cfb1c34711161e0354e8 109a7002be88d5e6bd13dd9f903502dcdde50d6a 34f0aa3a1b9e7cd696f26060fa923dd8f16ee908 3183ea9ab8e8617762273558bd46a70221cb1f41 db7471eb455ebf458726884c343eb12a6af5cab2 67ccde40 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8e:5b:09:c7:72:2e:5b:c3:c3:e4:a7:af:ae:f1:24:ba:8a:d0:22:13],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-11 06:25:20.879  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-11 06:25:20.883 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-11 06:25:20.886 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-11-11 06:25:20.887 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-11 06:25:20.887  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-11-11 06:25:20.888  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-11 06:25:20.889  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-11 06:25:20.889 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-11 06:25:20.890 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-11 06:25:20.891 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-11 06:25:20.896 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-11 06:25:20.897 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-11 06:25:20.897 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-11 06:25:20.898 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-11 06:25:21.117  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-11 06:25:21.118  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-11 06:25:21.118 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-11 06:25:21.118 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-11 06:25:21.121  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-11 06:25:21.122  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-11 06:25:21.122 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-11 06:25:21.123 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-11 06:25:21.123 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-11 06:25:21.124 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-11 06:25:21.125 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-11 06:25:21.125 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-11 06:25:21.126 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-11 06:25:21.126 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-11 06:25:21.126 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-11 06:25:21.129 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-11 06:25:21.133 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 66508811459583591192954014939501822665891397286 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 11 05:02:22 UTC 2022 Final Date: Wed Nov 10 05:02:21 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [87:38:8d:f6:63:21:89:d5:97:3c:ea:71:12:18:16:1d:5d:c5:75:02],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 608d916d7c763c69c88665b47318a34f0cef6605 312cfcf41c103c8f041fca325dfcc2793a36e67f 60392113184659c86d8fc9b4cbcab7ee1f4b5e69 9dc6c63a50072100ff10536b3d8e0b3fa5ac2196 d9ad7f7e45976dc1b586c2d12c71ea95ccc758da 8bfc906643861783462d9bb53fce36bbbb480085 1c4b9eca3a8146c51ccb53abfe67775a325507ce a76af3419086c38aba007e0aabd235eb35300ac1 b7882c0c4bc4a3d7f97aa9b087c2fcdc3a628710 c0adeca9cc78b03b5ec77b63fc824f13a6b3cf19 41c279a640b9e8edc9d5056df13a87149a05e4b0 a9a9e487ef79597cc3a9985f98d51b78dd87c854 5b092f81c66d7c4e3320f6932125b9286856e8a2 72f99cc64bc6d034468538ec920539efecbb1cac 21a791f9fe819edc6f80cfb1c34711161e0354e8 109a7002be88d5e6bd13dd9f903502dcdde50d6a 34f0aa3a1b9e7cd696f26060fa923dd8f16ee908 3183ea9ab8e8617762273558bd46a70221cb1f41 db7471eb455ebf458726884c343eb12a6af5cab2 67ccde40 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [43:50:c2:48:3a:5e:d9:83:4b:a3:1e:20:6f:25:bf:55:98:07:8b:ca],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-11 06:27:49.654  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-11 06:27:49.655 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-11 06:27:49.657 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-11-11 06:27:49.657 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-11 06:27:49.659  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-11-11 06:27:49.659  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-11 06:27:49.660  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-11 06:27:49.660 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-11 06:27:49.661 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-11 06:27:49.661 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-11 06:27:49.665 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-11 06:27:49.665 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-11 06:27:49.666 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-11 06:27:49.666 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-11 06:27:49.911  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-11 06:27:49.912  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-11 06:27:49.912 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-11 06:27:49.913 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-11 06:27:49.914  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-11 06:27:49.915  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-11 06:27:49.915 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-11 06:27:49.916 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-11 06:27:49.916 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-11 06:27:49.917 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-11 06:27:49.917 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-11 06:27:49.917 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-11 06:27:49.918 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-11 06:27:49.919 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-11 06:27:49.919 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-11 06:27:49.920 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-11 06:27:49.924 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 66508811459583591192954014939501822665891397286 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 11 05:02:22 UTC 2022 Final Date: Wed Nov 10 05:02:21 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [87:38:8d:f6:63:21:89:d5:97:3c:ea:71:12:18:16:1d:5d:c5:75:02],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 608d916d7c763c69c88665b47318a34f0cef6605 312cfcf41c103c8f041fca325dfcc2793a36e67f 60392113184659c86d8fc9b4cbcab7ee1f4b5e69 9dc6c63a50072100ff10536b3d8e0b3fa5ac2196 d9ad7f7e45976dc1b586c2d12c71ea95ccc758da 8bfc906643861783462d9bb53fce36bbbb480085 1c4b9eca3a8146c51ccb53abfe67775a325507ce a76af3419086c38aba007e0aabd235eb35300ac1 b7882c0c4bc4a3d7f97aa9b087c2fcdc3a628710 c0adeca9cc78b03b5ec77b63fc824f13a6b3cf19 41c279a640b9e8edc9d5056df13a87149a05e4b0 a9a9e487ef79597cc3a9985f98d51b78dd87c854 5b092f81c66d7c4e3320f6932125b9286856e8a2 72f99cc64bc6d034468538ec920539efecbb1cac 21a791f9fe819edc6f80cfb1c34711161e0354e8 109a7002be88d5e6bd13dd9f903502dcdde50d6a 34f0aa3a1b9e7cd696f26060fa923dd8f16ee908 3183ea9ab8e8617762273558bd46a70221cb1f41 db7471eb455ebf458726884c343eb12a6af5cab2 67ccde40 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ed:0d:4f:0d:c6:6c:50:b2:76:c6:36:12:99:76:b9:4d:bb:e6:db:4a],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-11 06:30:19.188  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-11 06:30:19.189 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-11 06:30:19.191 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-11 06:30:19.191 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-11 06:30:19.192  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-11 06:30:19.192  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-11 06:30:19.193  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-11 06:30:19.193 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-11 06:30:19.193 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-11 06:30:19.194 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-11 06:30:19.199 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-11 06:30:19.199 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-11 06:30:19.200 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-11 06:30:19.200 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-11 06:30:19.526  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-11 06:30:19.527  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-11 06:30:19.528 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-11 06:30:19.528 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-11 06:30:19.530  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-11 06:30:19.531  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-11 06:30:19.531 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-11 06:30:19.532 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-11 06:30:19.532 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-11 06:30:19.533 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-11 06:30:19.533 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-11 06:30:19.533 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-11 06:30:19.534 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-11 06:30:19.534 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-11 06:30:19.535 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-11 06:30:19.535 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-11 06:30:19.538 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 66508811459583591192954014939501822665891397286 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 11 05:02:22 UTC 2022 Final Date: Wed Nov 10 05:02:21 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [87:38:8d:f6:63:21:89:d5:97:3c:ea:71:12:18:16:1d:5d:c5:75:02],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 608d916d7c763c69c88665b47318a34f0cef6605 312cfcf41c103c8f041fca325dfcc2793a36e67f 60392113184659c86d8fc9b4cbcab7ee1f4b5e69 9dc6c63a50072100ff10536b3d8e0b3fa5ac2196 d9ad7f7e45976dc1b586c2d12c71ea95ccc758da 8bfc906643861783462d9bb53fce36bbbb480085 1c4b9eca3a8146c51ccb53abfe67775a325507ce a76af3419086c38aba007e0aabd235eb35300ac1 b7882c0c4bc4a3d7f97aa9b087c2fcdc3a628710 c0adeca9cc78b03b5ec77b63fc824f13a6b3cf19 41c279a640b9e8edc9d5056df13a87149a05e4b0 a9a9e487ef79597cc3a9985f98d51b78dd87c854 5b092f81c66d7c4e3320f6932125b9286856e8a2 72f99cc64bc6d034468538ec920539efecbb1cac 21a791f9fe819edc6f80cfb1c34711161e0354e8 109a7002be88d5e6bd13dd9f903502dcdde50d6a 34f0aa3a1b9e7cd696f26060fa923dd8f16ee908 3183ea9ab8e8617762273558bd46a70221cb1f41 db7471eb455ebf458726884c343eb12a6af5cab2 67ccde40 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [cc:62:b7:96:97:8e:48:24:cb:35:b0:3e:b5:55:27:55:b2:91:30:86],[56:66:d1:a4] modulus: d2151aaee031013100398ad8ae7035a3086d910c3e06c8a671515680132099f525261cf5e54e60f88f900bed78270701bd50b35886dfd2f589c2cc2920d18b0ca3eb5acf1d4b5e2ce13e14a2c88b604ac030bd4658cdca6a9c3b2873bc8b2f3d4b7e2ec5afd8d077c144c7ba49b1818f90b0acc2bd20c72ffb875d177132b846d7d86bb1fdb4231064845c9ade44083a28762b6ca7e4bf61b91cb38baaaba1b5fefc9faa1c8d8d013ab8e4d36d87abe4a6c56fae87b1f0ddeee01d4d119bee52d0b4149e9dc7dd083f7bf9a35d0ef27dbeb5a63dfe89e5893ddf793769c7f532876d2db09318513e210cbe2f92e47b17fa82a2578f8a6bca7bc3593f6604865b public exponent: 10001 ] 2022-11-11 06:36:51.021  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-11 06:36:51.024 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-11 06:36:51.027 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-11 06:36:51.028 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-11 06:36:51.029  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-11 06:36:51.029  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-11 06:36:51.030  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-11 06:36:51.030 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-11 06:36:51.031 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-11 06:36:51.032 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-11 06:36:51.037 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-11 06:36:51.038 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-11 06:36:51.039 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-11 06:36:51.039 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-11 06:36:51.285  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-11 06:36:51.286  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-11 06:36:51.286 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-11 06:36:51.287 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-11 06:36:51.288  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-11 06:36:51.288  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-11 06:36:51.289 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-11 06:36:51.289 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-11 06:36:51.289 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-11 06:36:51.290 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-11 06:36:51.290 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-11 06:36:51.291 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-11 06:36:51.291 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-11 06:36:51.292 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-11 06:36:51.292 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-11 06:36:51.293 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-11 06:36:51.297 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 66508811459583591192954014939501822665891397286 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 11 05:02:22 UTC 2022 Final Date: Wed Nov 10 05:02:21 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [87:38:8d:f6:63:21:89:d5:97:3c:ea:71:12:18:16:1d:5d:c5:75:02],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 608d916d7c763c69c88665b47318a34f0cef6605 312cfcf41c103c8f041fca325dfcc2793a36e67f 60392113184659c86d8fc9b4cbcab7ee1f4b5e69 9dc6c63a50072100ff10536b3d8e0b3fa5ac2196 d9ad7f7e45976dc1b586c2d12c71ea95ccc758da 8bfc906643861783462d9bb53fce36bbbb480085 1c4b9eca3a8146c51ccb53abfe67775a325507ce a76af3419086c38aba007e0aabd235eb35300ac1 b7882c0c4bc4a3d7f97aa9b087c2fcdc3a628710 c0adeca9cc78b03b5ec77b63fc824f13a6b3cf19 41c279a640b9e8edc9d5056df13a87149a05e4b0 a9a9e487ef79597cc3a9985f98d51b78dd87c854 5b092f81c66d7c4e3320f6932125b9286856e8a2 72f99cc64bc6d034468538ec920539efecbb1cac 21a791f9fe819edc6f80cfb1c34711161e0354e8 109a7002be88d5e6bd13dd9f903502dcdde50d6a 34f0aa3a1b9e7cd696f26060fa923dd8f16ee908 3183ea9ab8e8617762273558bd46a70221cb1f41 db7471eb455ebf458726884c343eb12a6af5cab2 67ccde40 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5f:30:3c:0c:41:21:fe:e0:53:05:46:04:7e:c7:f7:d5:0e:1c:29:d0],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-11 06:41:44.352  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-11 06:41:44.353 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-11 06:41:44.355 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-11 06:41:44.355 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-11 06:41:44.356  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-11 06:41:44.356  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-11 06:41:44.357  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-11 06:41:44.357 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-11 06:41:44.357 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-11 06:41:44.358 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-11 06:41:44.362 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-11 06:41:44.362 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-11 06:41:44.362 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-11 06:41:44.363 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-11 06:41:44.509  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-11 06:41:44.510  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-11 06:41:44.510 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-11 06:41:44.510 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-11 06:41:44.511  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-11 06:41:44.512  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-11 06:41:44.512 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-11 06:41:44.513 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-11 06:41:44.513 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-11 06:41:44.514 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-11 06:41:44.514 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-11 06:41:44.514 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-11 06:41:44.515 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-11 06:41:44.515 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-11 06:41:44.516 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-11 06:41:44.516 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-11 06:41:44.519 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 66508811459583591192954014939501822665891397286 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 11 05:02:22 UTC 2022 Final Date: Wed Nov 10 05:02:21 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [87:38:8d:f6:63:21:89:d5:97:3c:ea:71:12:18:16:1d:5d:c5:75:02],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 608d916d7c763c69c88665b47318a34f0cef6605 312cfcf41c103c8f041fca325dfcc2793a36e67f 60392113184659c86d8fc9b4cbcab7ee1f4b5e69 9dc6c63a50072100ff10536b3d8e0b3fa5ac2196 d9ad7f7e45976dc1b586c2d12c71ea95ccc758da 8bfc906643861783462d9bb53fce36bbbb480085 1c4b9eca3a8146c51ccb53abfe67775a325507ce a76af3419086c38aba007e0aabd235eb35300ac1 b7882c0c4bc4a3d7f97aa9b087c2fcdc3a628710 c0adeca9cc78b03b5ec77b63fc824f13a6b3cf19 41c279a640b9e8edc9d5056df13a87149a05e4b0 a9a9e487ef79597cc3a9985f98d51b78dd87c854 5b092f81c66d7c4e3320f6932125b9286856e8a2 72f99cc64bc6d034468538ec920539efecbb1cac 21a791f9fe819edc6f80cfb1c34711161e0354e8 109a7002be88d5e6bd13dd9f903502dcdde50d6a 34f0aa3a1b9e7cd696f26060fa923dd8f16ee908 3183ea9ab8e8617762273558bd46a70221cb1f41 db7471eb455ebf458726884c343eb12a6af5cab2 67ccde40 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b9:f4:bf:7c:f8:43:c4:e2:58:db:33:49:f5:96:72:41:a4:23:7e:db],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-11 06:48:11.778  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-11 06:48:11.781 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-11 06:48:11.783 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-11-11 06:48:11.784 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-11 06:48:11.784  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-11-11 06:48:11.785  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-11 06:48:11.785  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-11 06:48:11.786 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-11 06:48:11.786 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-11 06:48:11.787 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-11 06:48:11.791 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-11 06:48:11.792 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-11 06:48:11.793 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-11 06:48:11.793 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-11 06:48:12.024  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-11 06:48:12.025  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-11 06:48:12.025 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-11 06:48:12.025 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-11 06:48:12.027  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-11 06:48:12.027  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-11 06:48:12.027 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-11 06:48:12.028 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-11 06:48:12.028 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-11 06:48:12.029 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-11 06:48:12.029 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-11 06:48:12.029 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-11 06:48:12.030 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-11 06:48:12.030 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-11 06:48:12.030 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-11 06:48:12.031 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-11 06:48:12.034 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 66508811459583591192954014939501822665891397286 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 11 05:02:22 UTC 2022 Final Date: Wed Nov 10 05:02:21 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [87:38:8d:f6:63:21:89:d5:97:3c:ea:71:12:18:16:1d:5d:c5:75:02],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 608d916d7c763c69c88665b47318a34f0cef6605 312cfcf41c103c8f041fca325dfcc2793a36e67f 60392113184659c86d8fc9b4cbcab7ee1f4b5e69 9dc6c63a50072100ff10536b3d8e0b3fa5ac2196 d9ad7f7e45976dc1b586c2d12c71ea95ccc758da 8bfc906643861783462d9bb53fce36bbbb480085 1c4b9eca3a8146c51ccb53abfe67775a325507ce a76af3419086c38aba007e0aabd235eb35300ac1 b7882c0c4bc4a3d7f97aa9b087c2fcdc3a628710 c0adeca9cc78b03b5ec77b63fc824f13a6b3cf19 41c279a640b9e8edc9d5056df13a87149a05e4b0 a9a9e487ef79597cc3a9985f98d51b78dd87c854 5b092f81c66d7c4e3320f6932125b9286856e8a2 72f99cc64bc6d034468538ec920539efecbb1cac 21a791f9fe819edc6f80cfb1c34711161e0354e8 109a7002be88d5e6bd13dd9f903502dcdde50d6a 34f0aa3a1b9e7cd696f26060fa923dd8f16ee908 3183ea9ab8e8617762273558bd46a70221cb1f41 db7471eb455ebf458726884c343eb12a6af5cab2 67ccde40 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [dc:f6:e8:4d:48:f4:74:9c:78:33:73:af:a5:44:db:c1:89:fc:f3:8e],[56:66:d1:a4] modulus: b1efd5b6984fddf7146e729df2e1d36d058bd934751f0c5e220f6c708f68bc3796d8570e825bec1432f455447ca76fb51c2e2520ada61290105ba1a217082c3d7219095d0f9438dee7914ba5ff62d10c25b273cfff51ecde3f9777155a4958257f738deea2bc72426af56091e2585fc28ad9e6613033069132aa53352450b86edd57646c62a0cb69698d263966aa2c3ac64ac3eaf407a9316167f2578127320ce94dba6a87dcdb86705af41ef3a9b77615491c57ad6aeac15b9e64136d2131bcc2a590f6024b123c2042be53995fd077a63ccebe9e2f6e7e604e80eca3e290cec80bf649620f243fce7c2ef760fbd16fad8c82d2490950856426315c18bfe973 public exponent: 10001 ] 2022-11-11 06:53:57.001  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-11 06:53:57.002 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-11 06:53:57.004 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-11 06:53:57.005 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-11 06:53:57.005  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-11 06:53:57.006  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-11 06:53:57.006  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-11 06:53:57.007 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-11 06:53:57.007 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-11 06:53:57.008 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-11 06:53:57.012 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-11 06:53:57.012 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-11 06:53:57.013 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-11 06:53:57.013 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-11 06:53:57.269  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-11 06:53:57.270  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-11 06:53:57.270 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-11 06:53:57.271 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-11 06:53:57.273  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-11 06:53:57.274  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-11 06:53:57.274 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-11 06:53:57.275 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-11 06:53:57.275 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-11 06:53:57.276 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-11 06:53:57.277 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-11 06:53:57.277 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-11 06:53:57.279 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-11 06:53:57.279 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-11 06:53:57.280 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-11 06:53:57.281 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-11 06:53:57.285 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 66508811459583591192954014939501822665891397286 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 11 05:02:22 UTC 2022 Final Date: Wed Nov 10 05:02:21 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [87:38:8d:f6:63:21:89:d5:97:3c:ea:71:12:18:16:1d:5d:c5:75:02],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 608d916d7c763c69c88665b47318a34f0cef6605 312cfcf41c103c8f041fca325dfcc2793a36e67f 60392113184659c86d8fc9b4cbcab7ee1f4b5e69 9dc6c63a50072100ff10536b3d8e0b3fa5ac2196 d9ad7f7e45976dc1b586c2d12c71ea95ccc758da 8bfc906643861783462d9bb53fce36bbbb480085 1c4b9eca3a8146c51ccb53abfe67775a325507ce a76af3419086c38aba007e0aabd235eb35300ac1 b7882c0c4bc4a3d7f97aa9b087c2fcdc3a628710 c0adeca9cc78b03b5ec77b63fc824f13a6b3cf19 41c279a640b9e8edc9d5056df13a87149a05e4b0 a9a9e487ef79597cc3a9985f98d51b78dd87c854 5b092f81c66d7c4e3320f6932125b9286856e8a2 72f99cc64bc6d034468538ec920539efecbb1cac 21a791f9fe819edc6f80cfb1c34711161e0354e8 109a7002be88d5e6bd13dd9f903502dcdde50d6a 34f0aa3a1b9e7cd696f26060fa923dd8f16ee908 3183ea9ab8e8617762273558bd46a70221cb1f41 db7471eb455ebf458726884c343eb12a6af5cab2 67ccde40 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b3:0e:78:b0:3f:e7:9e:27:39:1b:50:4c:40:6e:83:63:5d:63:53:b8],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-11 06:54:14.586  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-11 06:54:14.588 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-11 06:54:14.589 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-11 06:54:14.590 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-11 06:54:14.590  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-11 06:54:14.590  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-11 06:54:14.591  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-11 06:54:14.591 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-11 06:54:14.592 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-11 06:54:14.592 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-11 06:54:14.596 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-11 06:54:14.597 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-11 06:54:14.597 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-11 06:54:14.597 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-11 06:54:14.722  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-11 06:54:14.722  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-11 06:54:14.723 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-11 06:54:14.723 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-11 06:54:14.724  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-11 06:54:14.724  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-11 06:54:14.725 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-11 06:54:14.725 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-11 06:54:14.725 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-11 06:54:14.726 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-11 06:54:14.726 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-11 06:54:14.726 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-11 06:54:14.727 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-11 06:54:14.727 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-11 06:54:14.727 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-11 06:54:14.728 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-11 06:54:14.730 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 66508811459583591192954014939501822665891397286 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 11 05:02:22 UTC 2022 Final Date: Wed Nov 10 05:02:21 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [87:38:8d:f6:63:21:89:d5:97:3c:ea:71:12:18:16:1d:5d:c5:75:02],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 608d916d7c763c69c88665b47318a34f0cef6605 312cfcf41c103c8f041fca325dfcc2793a36e67f 60392113184659c86d8fc9b4cbcab7ee1f4b5e69 9dc6c63a50072100ff10536b3d8e0b3fa5ac2196 d9ad7f7e45976dc1b586c2d12c71ea95ccc758da 8bfc906643861783462d9bb53fce36bbbb480085 1c4b9eca3a8146c51ccb53abfe67775a325507ce a76af3419086c38aba007e0aabd235eb35300ac1 b7882c0c4bc4a3d7f97aa9b087c2fcdc3a628710 c0adeca9cc78b03b5ec77b63fc824f13a6b3cf19 41c279a640b9e8edc9d5056df13a87149a05e4b0 a9a9e487ef79597cc3a9985f98d51b78dd87c854 5b092f81c66d7c4e3320f6932125b9286856e8a2 72f99cc64bc6d034468538ec920539efecbb1cac 21a791f9fe819edc6f80cfb1c34711161e0354e8 109a7002be88d5e6bd13dd9f903502dcdde50d6a 34f0aa3a1b9e7cd696f26060fa923dd8f16ee908 3183ea9ab8e8617762273558bd46a70221cb1f41 db7471eb455ebf458726884c343eb12a6af5cab2 67ccde40 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f3:49:8d:89:d3:23:58:07:3e:90:6c:44:a5:21:0f:b8:9c:42:59:eb],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-11 07:17:49.552  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-11 07:17:49.556 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-11 07:17:49.558 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-11 07:17:49.560 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-11 07:17:49.561  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-11 07:17:49.561  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-11 07:17:49.562  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-11 07:17:49.562 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-11 07:17:49.563 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-11 07:17:49.563 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-11 07:17:49.569 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-11 07:17:49.570 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-11 07:17:49.570 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-11 07:17:49.570 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-11 07:17:49.752  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-11 07:17:49.753  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-11 07:17:49.753 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-11 07:17:49.753 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-11 07:17:49.755  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-11 07:17:49.755  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-11 07:17:49.756 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-11 07:17:49.756 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-11 07:17:49.756 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-11 07:17:49.757 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-11 07:17:49.757 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-11 07:17:49.757 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-11 07:17:49.758 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-11 07:17:49.758 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-11 07:17:49.759 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-11 07:17:49.760 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-11 07:17:49.763 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 66508811459583591192954014939501822665891397286 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 11 05:02:22 UTC 2022 Final Date: Wed Nov 10 05:02:21 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [87:38:8d:f6:63:21:89:d5:97:3c:ea:71:12:18:16:1d:5d:c5:75:02],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 608d916d7c763c69c88665b47318a34f0cef6605 312cfcf41c103c8f041fca325dfcc2793a36e67f 60392113184659c86d8fc9b4cbcab7ee1f4b5e69 9dc6c63a50072100ff10536b3d8e0b3fa5ac2196 d9ad7f7e45976dc1b586c2d12c71ea95ccc758da 8bfc906643861783462d9bb53fce36bbbb480085 1c4b9eca3a8146c51ccb53abfe67775a325507ce a76af3419086c38aba007e0aabd235eb35300ac1 b7882c0c4bc4a3d7f97aa9b087c2fcdc3a628710 c0adeca9cc78b03b5ec77b63fc824f13a6b3cf19 41c279a640b9e8edc9d5056df13a87149a05e4b0 a9a9e487ef79597cc3a9985f98d51b78dd87c854 5b092f81c66d7c4e3320f6932125b9286856e8a2 72f99cc64bc6d034468538ec920539efecbb1cac 21a791f9fe819edc6f80cfb1c34711161e0354e8 109a7002be88d5e6bd13dd9f903502dcdde50d6a 34f0aa3a1b9e7cd696f26060fa923dd8f16ee908 3183ea9ab8e8617762273558bd46a70221cb1f41 db7471eb455ebf458726884c343eb12a6af5cab2 67ccde40 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d2:83:f7:70:f0:98:63:03:61:bb:b8:d5:df:4d:82:bf:73:9f:24:74],[56:66:d1:a4] modulus: bfc737919e61a716336f8adb22fc807173020e22d13f83e3d49a536f1bc7af79bbd74b835c1eab7fd6e3a5e35b3d3ee5bef77806a1e8e67f8ef08021f0e772ea4986c26295d52268329538b7b84e0b784dcd5761c14694ec39c01e25d2ce86b75bf485d94c67ef4112354966b3b5286774894b5745d2bba530759761e2ae40bacd6a2ba3b56c71141c01e532f6870e72cbec01401abc9fe40bb908bfdf39cc4796136be014795abb5a5da8440ced3f456d46e5b7f99332c2bf576ad38779f225ed260e81602d70f376fe290b4213518a63381f3f0a81065124ae10068be310e7bd73873da3d64b6a780bea5f4c9e8687a85754d9df6d984284f44ae41a0efcd3 public exponent: 10001 ] 2022-11-11 07:17:54.802  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-11 07:17:54.804 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-11 07:17:54.806 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-11 07:17:54.806 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-11 07:17:54.807  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-11 07:17:54.808  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-11 07:17:54.808  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-11 07:17:54.809 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-11 07:17:54.810 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-11 07:17:54.810 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-11 07:17:54.815 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-11 07:17:54.816 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-11 07:17:54.816 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-11 07:17:54.817 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-11 07:17:54.942  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-11 07:17:54.943  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-11 07:17:54.943 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-11 07:17:54.944 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-11 07:17:54.945  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-11 07:17:54.946  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-11 07:17:54.947 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-11 07:17:54.947 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-11 07:17:54.948 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-11 07:17:54.949 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-11 07:17:54.949 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-11 07:17:54.949 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-11 07:17:54.950 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-11 07:17:54.951 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-11 07:17:54.951 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-11 07:17:54.952 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-11 07:17:54.956 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 66508811459583591192954014939501822665891397286 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 11 05:02:22 UTC 2022 Final Date: Wed Nov 10 05:02:21 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [87:38:8d:f6:63:21:89:d5:97:3c:ea:71:12:18:16:1d:5d:c5:75:02],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 608d916d7c763c69c88665b47318a34f0cef6605 312cfcf41c103c8f041fca325dfcc2793a36e67f 60392113184659c86d8fc9b4cbcab7ee1f4b5e69 9dc6c63a50072100ff10536b3d8e0b3fa5ac2196 d9ad7f7e45976dc1b586c2d12c71ea95ccc758da 8bfc906643861783462d9bb53fce36bbbb480085 1c4b9eca3a8146c51ccb53abfe67775a325507ce a76af3419086c38aba007e0aabd235eb35300ac1 b7882c0c4bc4a3d7f97aa9b087c2fcdc3a628710 c0adeca9cc78b03b5ec77b63fc824f13a6b3cf19 41c279a640b9e8edc9d5056df13a87149a05e4b0 a9a9e487ef79597cc3a9985f98d51b78dd87c854 5b092f81c66d7c4e3320f6932125b9286856e8a2 72f99cc64bc6d034468538ec920539efecbb1cac 21a791f9fe819edc6f80cfb1c34711161e0354e8 109a7002be88d5e6bd13dd9f903502dcdde50d6a 34f0aa3a1b9e7cd696f26060fa923dd8f16ee908 3183ea9ab8e8617762273558bd46a70221cb1f41 db7471eb455ebf458726884c343eb12a6af5cab2 67ccde40 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ed:f1:3e:05:99:dc:ad:7a:65:f8:b5:ca:5f:ec:19:17:73:6c:ed:71],[56:66:d1:a4] modulus: b581be2aa703bb298e18938a7ae4a0ab5dab40b6079f884e46c88038e9d61ce1f8aac0077656806b4637e59292347ff116454be9eb7288f8534973d01496e0c21d36a344abbef76d8c1226dcd0add577f6a96939cd958da0a0a533b05c133804c615d59c792c04317ae2feabe2d520a2fbf49007428da840c788e120abd13e5494b8a57c95165eb2816f183d72e1321ef018343cb8e38f500c110476cd2ef43851f578d977c563182a481828e6f995bf0155a428a50eee8d1a89465ef1eafd1a3923419553eea7413a9702ca75318454424dcdd2553d06822aadd608436e08cc4a04119b95d9ac8f28352f989b3696cb76006b5bedd1d674b2f083471c6be9ab public exponent: 10001 ]