2022-11-14 05:00:00,419 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-11-14 05:00:01,796 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-11-14 05:00:02.511  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Nov 14, 2022 5:00:04 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Nov 14, 2022 5:00:04 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Nov 14, 2022 5:00:04 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Nov 14, 2022 5:00:04 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-11-14 05:00:05.032 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-11-14 05:00:05.305  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-11-14 05:00:05.467  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-11-14 05:00:06.189 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-11-14 05:00:06.191 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-11-14 05:00:06.193 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-11-14 05:00:06.196 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-11-14 05:00:06.233 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-11-14 05:00:06.236 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-11-14 05:00:06.351 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-11-14 05:00:06.894 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Nov 14, 2022 5:00:07 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-11-14 05:00:07.805  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 8.127 seconds (JVM running for 9.848) Nov 14, 2022 5:00:32 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-11-14 05:00:55.703  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-14 05:00:55.713 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-14 05:00:55.756 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-11-14 05:00:55.759 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-14 05:00:55.774  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-11-14 05:00:55.776  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-14 05:00:55.777  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-14 05:00:55.778 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-14 05:00:55.779 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-14 05:00:55.782 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-14 05:00:55.790 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-14 05:00:55.794 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-14 05:00:55.847 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-14 05:00:55.852 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-14 05:00:55.853 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-14 05:00:55.857 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-14 05:00:56.454  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-14 05:00:56.456  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-14 05:00:56.457 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-14 05:00:56.459 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-14 05:00:56.470  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-14 05:00:56.472  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-14 05:00:56.473 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-14 05:00:56.475 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-14 05:00:56.476 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-14 05:00:56.508 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-14 05:00:56.509 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-14 05:00:56.510 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-14 05:00:56.521 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-14 05:00:56.521 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-14 05:00:56.522 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-14 05:00:56.524 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-14 05:00:56.574 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 131998735634343310950543068381972542458459180153 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Nov 14 04:57:31 UTC 2022 Final Date: Sat Nov 13 04:57:30 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d7:22:03:0e:ad:8f:19:80:e8:2b:29:21:c0:be:69:d9:8e:9c:6f:49],[56:66:d1:a4] modulus: bc8615ce403d253c077293291d0aadf0eee4608838ab849b7abc3c1756f0d9ff0f7847f37be18b9ec4c1f6958883f46acc71f4b439ff06735d5b370f05509aa2f466068b59c80943853062b735c170cd945e54c0e05448f1e423fe6fb17ac870181b050e101beff6d3fbfad1f7a480b80a01c04600d201456a74d30c236a0375d8e7693d2f71e196c9aa837876eefd493979c7d5c2e43fe7f7ed6bd9f2356afac5304a42726b770c02de144bb700a087b9231d96652df203b5e5ee1a02d8954f5606c7abba404c53fc782a7b7bddfd015b6cf3a2e68284cd52d9bc28c07efb135f6d1da8fcfb75f4d5ca9a0ff9fc60b726ee805fe3952ba0deeaf16e137f200ecc67180c6524bfdf442ca5965a827041b3a4e0abcb8c6b406606a8e2c155d998c199771db220240ade64729072a0b94de709430edf049c95aba31f24094106c005085201dc41b108b7fb20ee06a24e90f913f1bd0bd312eb1b02df6dbb9ef5eac5962a1897f756750de119a1f5c8d43c1ea436950b2b42e2c928f2ecbc296a3f public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4abd5bfd5c67248c42dcb19133546afb969165a0 9499295fdae84d93c9090e5556f52d790fe9716d fd30bfd22fdfabb5d23cf6f1e3870054b92f8cde 5f99689ce2b64824923a6dd7fd4c7c5b67606184 927ee82a26fc6fc64f503867121d9b7d1a490e98 ab60ae420905504295611a4239919a11f9491f00 873cfc67f3c62cf0366d5b33a6ac62311c1dd097 1ca8c016343e5de2a2cd3f99014156f4613c6f26 150d2255c2665370eb16042fc203cd68309caff8 11a3d619bf06482066417c8f2da6fa6bd8784751 19bfb25285330c0502b87aea067322d3084fcd51 da15d6cdac47f92db955b8ccc4b6c54728900e80 6ca622120f5eea56555c9dd1b16ffb29a35ff7b8 752b983797996f18d46a35cd2d9014cd78d53823 5dc41aed58d4897b14c77e87d2cdda4dbdd01728 1075dd2b6986db9bd7cb81fb404627935cf86bd4 387e8396c3361d332848f7710483446e5e0925e6 ea769915545614725d4edae4af5a3ccbac63dcf1 f04b1cff921e40968194d36719d77b8eab820ffe eeef5a2e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e1:ec:b2:f1:29:d2:19:e1:b2:47:08:e5:f5:ae:1c:74:cc:da:68:28],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-14 06:23:23.556  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-14 06:23:23.560 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-14 06:23:23.563 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-14 06:23:23.564 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-14 06:23:23.565  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-14 06:23:23.566  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-14 06:23:23.566  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-14 06:23:23.567 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-14 06:23:23.567 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-14 06:23:23.568 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-14 06:23:23.573 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-14 06:23:23.574 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-14 06:23:23.574 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-14 06:23:23.575 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-14 06:23:23.810  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-14 06:23:23.811  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-14 06:23:23.811 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-14 06:23:23.811 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-14 06:23:23.815  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-14 06:23:23.815  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-14 06:23:23.816 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-14 06:23:23.816 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-14 06:23:23.817 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-14 06:23:23.818 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-14 06:23:23.818 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-14 06:23:23.819 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-14 06:23:23.820 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-14 06:23:23.820 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-14 06:23:23.821 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-14 06:23:23.821 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-14 06:23:23.826 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 131998735634343310950543068381972542458459180153 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Nov 14 04:57:31 UTC 2022 Final Date: Sat Nov 13 04:57:30 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d7:22:03:0e:ad:8f:19:80:e8:2b:29:21:c0:be:69:d9:8e:9c:6f:49],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4abd5bfd5c67248c42dcb19133546afb969165a0 9499295fdae84d93c9090e5556f52d790fe9716d fd30bfd22fdfabb5d23cf6f1e3870054b92f8cde 5f99689ce2b64824923a6dd7fd4c7c5b67606184 927ee82a26fc6fc64f503867121d9b7d1a490e98 ab60ae420905504295611a4239919a11f9491f00 873cfc67f3c62cf0366d5b33a6ac62311c1dd097 1ca8c016343e5de2a2cd3f99014156f4613c6f26 150d2255c2665370eb16042fc203cd68309caff8 11a3d619bf06482066417c8f2da6fa6bd8784751 19bfb25285330c0502b87aea067322d3084fcd51 da15d6cdac47f92db955b8ccc4b6c54728900e80 6ca622120f5eea56555c9dd1b16ffb29a35ff7b8 752b983797996f18d46a35cd2d9014cd78d53823 5dc41aed58d4897b14c77e87d2cdda4dbdd01728 1075dd2b6986db9bd7cb81fb404627935cf86bd4 387e8396c3361d332848f7710483446e5e0925e6 ea769915545614725d4edae4af5a3ccbac63dcf1 f04b1cff921e40968194d36719d77b8eab820ffe eeef5a2e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f8:91:88:97:8f:7d:df:d9:23:0a:b9:12:c8:bd:66:fa:25:36:c1:5c],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-14 06:25:25.247  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-14 06:25:25.249 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-14 06:25:25.251 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-11-14 06:25:25.252 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-14 06:25:25.253  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-11-14 06:25:25.254  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-14 06:25:25.255  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-14 06:25:25.256 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-14 06:25:25.257 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-14 06:25:25.258 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-14 06:25:25.266 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-14 06:25:25.267 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-14 06:25:25.267 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-14 06:25:25.268 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-14 06:25:25.413  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-14 06:25:25.414  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-14 06:25:25.415 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-14 06:25:25.416 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-14 06:25:25.420  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-14 06:25:25.420  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-14 06:25:25.421 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-14 06:25:25.422 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-14 06:25:25.422 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-14 06:25:25.423 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-14 06:25:25.424 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-14 06:25:25.424 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-14 06:25:25.425 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-14 06:25:25.426 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-14 06:25:25.426 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-14 06:25:25.428 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-14 06:25:25.432 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 131998735634343310950543068381972542458459180153 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Nov 14 04:57:31 UTC 2022 Final Date: Sat Nov 13 04:57:30 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d7:22:03:0e:ad:8f:19:80:e8:2b:29:21:c0:be:69:d9:8e:9c:6f:49],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4abd5bfd5c67248c42dcb19133546afb969165a0 9499295fdae84d93c9090e5556f52d790fe9716d fd30bfd22fdfabb5d23cf6f1e3870054b92f8cde 5f99689ce2b64824923a6dd7fd4c7c5b67606184 927ee82a26fc6fc64f503867121d9b7d1a490e98 ab60ae420905504295611a4239919a11f9491f00 873cfc67f3c62cf0366d5b33a6ac62311c1dd097 1ca8c016343e5de2a2cd3f99014156f4613c6f26 150d2255c2665370eb16042fc203cd68309caff8 11a3d619bf06482066417c8f2da6fa6bd8784751 19bfb25285330c0502b87aea067322d3084fcd51 da15d6cdac47f92db955b8ccc4b6c54728900e80 6ca622120f5eea56555c9dd1b16ffb29a35ff7b8 752b983797996f18d46a35cd2d9014cd78d53823 5dc41aed58d4897b14c77e87d2cdda4dbdd01728 1075dd2b6986db9bd7cb81fb404627935cf86bd4 387e8396c3361d332848f7710483446e5e0925e6 ea769915545614725d4edae4af5a3ccbac63dcf1 f04b1cff921e40968194d36719d77b8eab820ffe eeef5a2e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [70:c3:fb:ff:e5:b0:31:8d:0b:ac:10:20:7b:c2:07:52:ff:a1:f3:26],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-14 06:27:35.343  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-14 06:27:35.346 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-14 06:27:35.349 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-11-14 06:27:35.351 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-14 06:27:35.351  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-11-14 06:27:35.352  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-14 06:27:35.353  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-14 06:27:35.354 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-14 06:27:35.354 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-14 06:27:35.357 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-14 06:27:35.361 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-14 06:27:35.362 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-14 06:27:35.362 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-14 06:27:35.363 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-14 06:27:35.516  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-14 06:27:35.517  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-14 06:27:35.518 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-14 06:27:35.518 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-14 06:27:35.520  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-14 06:27:35.520  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-14 06:27:35.521 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-14 06:27:35.521 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-14 06:27:35.521 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-14 06:27:35.522 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-14 06:27:35.523 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-14 06:27:35.523 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-14 06:27:35.524 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-14 06:27:35.524 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-14 06:27:35.525 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-14 06:27:35.526 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-14 06:27:35.532 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 131998735634343310950543068381972542458459180153 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Nov 14 04:57:31 UTC 2022 Final Date: Sat Nov 13 04:57:30 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d7:22:03:0e:ad:8f:19:80:e8:2b:29:21:c0:be:69:d9:8e:9c:6f:49],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4abd5bfd5c67248c42dcb19133546afb969165a0 9499295fdae84d93c9090e5556f52d790fe9716d fd30bfd22fdfabb5d23cf6f1e3870054b92f8cde 5f99689ce2b64824923a6dd7fd4c7c5b67606184 927ee82a26fc6fc64f503867121d9b7d1a490e98 ab60ae420905504295611a4239919a11f9491f00 873cfc67f3c62cf0366d5b33a6ac62311c1dd097 1ca8c016343e5de2a2cd3f99014156f4613c6f26 150d2255c2665370eb16042fc203cd68309caff8 11a3d619bf06482066417c8f2da6fa6bd8784751 19bfb25285330c0502b87aea067322d3084fcd51 da15d6cdac47f92db955b8ccc4b6c54728900e80 6ca622120f5eea56555c9dd1b16ffb29a35ff7b8 752b983797996f18d46a35cd2d9014cd78d53823 5dc41aed58d4897b14c77e87d2cdda4dbdd01728 1075dd2b6986db9bd7cb81fb404627935cf86bd4 387e8396c3361d332848f7710483446e5e0925e6 ea769915545614725d4edae4af5a3ccbac63dcf1 f04b1cff921e40968194d36719d77b8eab820ffe eeef5a2e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1c:9b:d1:a0:7b:b4:08:80:d7:4a:85:29:85:40:c0:3c:5f:c4:86:0c],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-14 06:29:54.533  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-14 06:29:54.535 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-14 06:29:54.536 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-14 06:29:54.537 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-14 06:29:54.538  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-14 06:29:54.538  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-14 06:29:54.539  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-14 06:29:54.539 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-14 06:29:54.540 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-14 06:29:54.540 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-14 06:29:54.545 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-14 06:29:54.546 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-14 06:29:54.547 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-14 06:29:54.547 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-14 06:29:54.701  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-14 06:29:54.702  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-14 06:29:54.703 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-14 06:29:54.703 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-14 06:29:54.704  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-14 06:29:54.705  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-14 06:29:54.706 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-14 06:29:54.706 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-14 06:29:54.706 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-14 06:29:54.707 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-14 06:29:54.708 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-14 06:29:54.708 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-14 06:29:54.709 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-14 06:29:54.709 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-14 06:29:54.710 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-14 06:29:54.710 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-14 06:29:54.713 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 131998735634343310950543068381972542458459180153 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Nov 14 04:57:31 UTC 2022 Final Date: Sat Nov 13 04:57:30 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d7:22:03:0e:ad:8f:19:80:e8:2b:29:21:c0:be:69:d9:8e:9c:6f:49],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4abd5bfd5c67248c42dcb19133546afb969165a0 9499295fdae84d93c9090e5556f52d790fe9716d fd30bfd22fdfabb5d23cf6f1e3870054b92f8cde 5f99689ce2b64824923a6dd7fd4c7c5b67606184 927ee82a26fc6fc64f503867121d9b7d1a490e98 ab60ae420905504295611a4239919a11f9491f00 873cfc67f3c62cf0366d5b33a6ac62311c1dd097 1ca8c016343e5de2a2cd3f99014156f4613c6f26 150d2255c2665370eb16042fc203cd68309caff8 11a3d619bf06482066417c8f2da6fa6bd8784751 19bfb25285330c0502b87aea067322d3084fcd51 da15d6cdac47f92db955b8ccc4b6c54728900e80 6ca622120f5eea56555c9dd1b16ffb29a35ff7b8 752b983797996f18d46a35cd2d9014cd78d53823 5dc41aed58d4897b14c77e87d2cdda4dbdd01728 1075dd2b6986db9bd7cb81fb404627935cf86bd4 387e8396c3361d332848f7710483446e5e0925e6 ea769915545614725d4edae4af5a3ccbac63dcf1 f04b1cff921e40968194d36719d77b8eab820ffe eeef5a2e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [71:1d:c1:ce:73:b2:af:20:2e:46:3e:ae:89:89:cb:c7:6c:31:95:ea],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-14 06:36:31.976  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-14 06:36:31.979 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-14 06:36:31.981 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-14 06:36:31.982 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-14 06:36:31.983  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-14 06:36:31.983  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-14 06:36:31.984  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-14 06:36:31.984 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-14 06:36:31.985 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-14 06:36:31.985 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-14 06:36:31.991 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-14 06:36:31.992 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-14 06:36:31.992 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-14 06:36:31.992 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-14 06:36:32.180  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-14 06:36:32.181  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-14 06:36:32.181 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-14 06:36:32.182 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-14 06:36:32.183  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-14 06:36:32.183  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-14 06:36:32.184 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-14 06:36:32.184 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-14 06:36:32.185 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-14 06:36:32.189 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-14 06:36:32.192 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-14 06:36:32.192 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-14 06:36:32.198 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-14 06:36:32.199 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-14 06:36:32.199 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-14 06:36:32.200 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-14 06:36:32.204 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 131998735634343310950543068381972542458459180153 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Nov 14 04:57:31 UTC 2022 Final Date: Sat Nov 13 04:57:30 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d7:22:03:0e:ad:8f:19:80:e8:2b:29:21:c0:be:69:d9:8e:9c:6f:49],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4abd5bfd5c67248c42dcb19133546afb969165a0 9499295fdae84d93c9090e5556f52d790fe9716d fd30bfd22fdfabb5d23cf6f1e3870054b92f8cde 5f99689ce2b64824923a6dd7fd4c7c5b67606184 927ee82a26fc6fc64f503867121d9b7d1a490e98 ab60ae420905504295611a4239919a11f9491f00 873cfc67f3c62cf0366d5b33a6ac62311c1dd097 1ca8c016343e5de2a2cd3f99014156f4613c6f26 150d2255c2665370eb16042fc203cd68309caff8 11a3d619bf06482066417c8f2da6fa6bd8784751 19bfb25285330c0502b87aea067322d3084fcd51 da15d6cdac47f92db955b8ccc4b6c54728900e80 6ca622120f5eea56555c9dd1b16ffb29a35ff7b8 752b983797996f18d46a35cd2d9014cd78d53823 5dc41aed58d4897b14c77e87d2cdda4dbdd01728 1075dd2b6986db9bd7cb81fb404627935cf86bd4 387e8396c3361d332848f7710483446e5e0925e6 ea769915545614725d4edae4af5a3ccbac63dcf1 f04b1cff921e40968194d36719d77b8eab820ffe eeef5a2e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [39:b2:1e:2b:3c:57:53:48:60:39:b8:76:99:d5:f0:ba:e5:91:25:37],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-14 06:41:55.947  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-14 06:41:55.951 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-14 06:41:55.955 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-14 06:41:55.958 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-14 06:41:55.960  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-14 06:41:55.961  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-14 06:41:55.961  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-14 06:41:55.962 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-14 06:41:55.963 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-14 06:41:55.963 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-14 06:41:55.968 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-14 06:41:55.973 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-14 06:41:55.974 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-14 06:41:55.974 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-14 06:41:56.133  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-14 06:41:56.134  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-14 06:41:56.134 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-14 06:41:56.135 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-14 06:41:56.136  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-14 06:41:56.136  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-14 06:41:56.137 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-14 06:41:56.137 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-14 06:41:56.138 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-14 06:41:56.139 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-14 06:41:56.139 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-14 06:41:56.139 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-14 06:41:56.140 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-14 06:41:56.141 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-14 06:41:56.141 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-14 06:41:56.142 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-14 06:41:56.145 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 131998735634343310950543068381972542458459180153 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Nov 14 04:57:31 UTC 2022 Final Date: Sat Nov 13 04:57:30 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d7:22:03:0e:ad:8f:19:80:e8:2b:29:21:c0:be:69:d9:8e:9c:6f:49],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4abd5bfd5c67248c42dcb19133546afb969165a0 9499295fdae84d93c9090e5556f52d790fe9716d fd30bfd22fdfabb5d23cf6f1e3870054b92f8cde 5f99689ce2b64824923a6dd7fd4c7c5b67606184 927ee82a26fc6fc64f503867121d9b7d1a490e98 ab60ae420905504295611a4239919a11f9491f00 873cfc67f3c62cf0366d5b33a6ac62311c1dd097 1ca8c016343e5de2a2cd3f99014156f4613c6f26 150d2255c2665370eb16042fc203cd68309caff8 11a3d619bf06482066417c8f2da6fa6bd8784751 19bfb25285330c0502b87aea067322d3084fcd51 da15d6cdac47f92db955b8ccc4b6c54728900e80 6ca622120f5eea56555c9dd1b16ffb29a35ff7b8 752b983797996f18d46a35cd2d9014cd78d53823 5dc41aed58d4897b14c77e87d2cdda4dbdd01728 1075dd2b6986db9bd7cb81fb404627935cf86bd4 387e8396c3361d332848f7710483446e5e0925e6 ea769915545614725d4edae4af5a3ccbac63dcf1 f04b1cff921e40968194d36719d77b8eab820ffe eeef5a2e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d7:4f:2e:73:07:4d:00:79:22:a5:b5:09:fa:ca:6d:5a:41:0e:56:d3],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-14 06:48:30.042  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-14 06:48:30.046 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-14 06:48:30.048 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-11-14 06:48:30.050 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-14 06:48:30.050  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-11-14 06:48:30.051  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-14 06:48:30.052  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-14 06:48:30.052 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-14 06:48:30.053 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-14 06:48:30.053 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-14 06:48:30.058 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-14 06:48:30.059 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-14 06:48:30.059 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-14 06:48:30.060 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-14 06:48:30.206  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-14 06:48:30.207  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-14 06:48:30.207 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-14 06:48:30.208 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-14 06:48:30.209  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-14 06:48:30.210  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-14 06:48:30.210 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-14 06:48:30.211 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-14 06:48:30.211 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-14 06:48:30.212 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-14 06:48:30.213 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-14 06:48:30.213 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-14 06:48:30.214 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-14 06:48:30.214 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-14 06:48:30.215 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-14 06:48:30.216 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-14 06:48:30.219 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 131998735634343310950543068381972542458459180153 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Nov 14 04:57:31 UTC 2022 Final Date: Sat Nov 13 04:57:30 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d7:22:03:0e:ad:8f:19:80:e8:2b:29:21:c0:be:69:d9:8e:9c:6f:49],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4abd5bfd5c67248c42dcb19133546afb969165a0 9499295fdae84d93c9090e5556f52d790fe9716d fd30bfd22fdfabb5d23cf6f1e3870054b92f8cde 5f99689ce2b64824923a6dd7fd4c7c5b67606184 927ee82a26fc6fc64f503867121d9b7d1a490e98 ab60ae420905504295611a4239919a11f9491f00 873cfc67f3c62cf0366d5b33a6ac62311c1dd097 1ca8c016343e5de2a2cd3f99014156f4613c6f26 150d2255c2665370eb16042fc203cd68309caff8 11a3d619bf06482066417c8f2da6fa6bd8784751 19bfb25285330c0502b87aea067322d3084fcd51 da15d6cdac47f92db955b8ccc4b6c54728900e80 6ca622120f5eea56555c9dd1b16ffb29a35ff7b8 752b983797996f18d46a35cd2d9014cd78d53823 5dc41aed58d4897b14c77e87d2cdda4dbdd01728 1075dd2b6986db9bd7cb81fb404627935cf86bd4 387e8396c3361d332848f7710483446e5e0925e6 ea769915545614725d4edae4af5a3ccbac63dcf1 f04b1cff921e40968194d36719d77b8eab820ffe eeef5a2e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7e:43:19:52:d5:a1:15:65:f9:7b:20:d5:b4:64:f0:cc:c8:0a:eb:56],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-14 06:54:45.520  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-14 06:54:45.525 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-14 06:54:45.528 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-14 06:54:45.529 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-14 06:54:45.530  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-14 06:54:45.531  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-14 06:54:45.531  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-14 06:54:45.532 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-14 06:54:45.533 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-14 06:54:45.533 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-14 06:54:45.538 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-14 06:54:45.540 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-14 06:54:45.540 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-14 06:54:45.541 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-14 06:54:45.712  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-14 06:54:45.713  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-14 06:54:45.714 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-14 06:54:45.714 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-14 06:54:45.716  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-14 06:54:45.717  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-14 06:54:45.717 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-14 06:54:45.718 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-14 06:54:45.718 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-14 06:54:45.720 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-14 06:54:45.720 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-14 06:54:45.721 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-14 06:54:45.722 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-14 06:54:45.722 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-14 06:54:45.722 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-14 06:54:45.723 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-14 06:54:45.728 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 131998735634343310950543068381972542458459180153 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Nov 14 04:57:31 UTC 2022 Final Date: Sat Nov 13 04:57:30 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d7:22:03:0e:ad:8f:19:80:e8:2b:29:21:c0:be:69:d9:8e:9c:6f:49],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4abd5bfd5c67248c42dcb19133546afb969165a0 9499295fdae84d93c9090e5556f52d790fe9716d fd30bfd22fdfabb5d23cf6f1e3870054b92f8cde 5f99689ce2b64824923a6dd7fd4c7c5b67606184 927ee82a26fc6fc64f503867121d9b7d1a490e98 ab60ae420905504295611a4239919a11f9491f00 873cfc67f3c62cf0366d5b33a6ac62311c1dd097 1ca8c016343e5de2a2cd3f99014156f4613c6f26 150d2255c2665370eb16042fc203cd68309caff8 11a3d619bf06482066417c8f2da6fa6bd8784751 19bfb25285330c0502b87aea067322d3084fcd51 da15d6cdac47f92db955b8ccc4b6c54728900e80 6ca622120f5eea56555c9dd1b16ffb29a35ff7b8 752b983797996f18d46a35cd2d9014cd78d53823 5dc41aed58d4897b14c77e87d2cdda4dbdd01728 1075dd2b6986db9bd7cb81fb404627935cf86bd4 387e8396c3361d332848f7710483446e5e0925e6 ea769915545614725d4edae4af5a3ccbac63dcf1 f04b1cff921e40968194d36719d77b8eab820ffe eeef5a2e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [36:34:cd:1b:63:bb:a2:52:23:11:bf:bb:7f:b6:9a:d0:83:c1:2c:78],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-14 06:55:02.492  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-14 06:55:02.518 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-14 06:55:02.523 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-14 06:55:02.523 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-14 06:55:02.523  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-14 06:55:02.524  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-14 06:55:02.524  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-14 06:55:02.524 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-14 06:55:02.525 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-14 06:55:02.525 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-14 06:55:02.528 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-14 06:55:02.529 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-14 06:55:02.529 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-14 06:55:02.554 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-14 06:55:02.725  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-14 06:55:02.726  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-14 06:55:02.726 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-14 06:55:02.726 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-14 06:55:02.738  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-14 06:55:02.739  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-14 06:55:02.740 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-14 06:55:02.740 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-14 06:55:02.740 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-14 06:55:02.749 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-14 06:55:02.749 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-14 06:55:02.750 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-14 06:55:02.751 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-14 06:55:02.751 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-14 06:55:02.751 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-14 06:55:02.758 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-14 06:55:02.762 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 131998735634343310950543068381972542458459180153 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Nov 14 04:57:31 UTC 2022 Final Date: Sat Nov 13 04:57:30 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d7:22:03:0e:ad:8f:19:80:e8:2b:29:21:c0:be:69:d9:8e:9c:6f:49],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4abd5bfd5c67248c42dcb19133546afb969165a0 9499295fdae84d93c9090e5556f52d790fe9716d fd30bfd22fdfabb5d23cf6f1e3870054b92f8cde 5f99689ce2b64824923a6dd7fd4c7c5b67606184 927ee82a26fc6fc64f503867121d9b7d1a490e98 ab60ae420905504295611a4239919a11f9491f00 873cfc67f3c62cf0366d5b33a6ac62311c1dd097 1ca8c016343e5de2a2cd3f99014156f4613c6f26 150d2255c2665370eb16042fc203cd68309caff8 11a3d619bf06482066417c8f2da6fa6bd8784751 19bfb25285330c0502b87aea067322d3084fcd51 da15d6cdac47f92db955b8ccc4b6c54728900e80 6ca622120f5eea56555c9dd1b16ffb29a35ff7b8 752b983797996f18d46a35cd2d9014cd78d53823 5dc41aed58d4897b14c77e87d2cdda4dbdd01728 1075dd2b6986db9bd7cb81fb404627935cf86bd4 387e8396c3361d332848f7710483446e5e0925e6 ea769915545614725d4edae4af5a3ccbac63dcf1 f04b1cff921e40968194d36719d77b8eab820ffe eeef5a2e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f4:f9:60:07:a9:da:bf:50:07:9e:75:3e:a7:1a:5f:d1:cd:eb:ad:dd],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-14 07:19:48.775  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-14 07:19:48.779 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-14 07:19:48.781 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-14 07:19:48.782 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-14 07:19:48.783  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-14 07:19:48.783  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-14 07:19:48.784  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-14 07:19:48.785 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-14 07:19:48.785 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-14 07:19:48.785 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-14 07:19:48.790 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-14 07:19:48.791 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-14 07:19:48.791 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-14 07:19:48.792 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-14 07:19:48.939  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-14 07:19:48.939  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-14 07:19:48.940 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-14 07:19:48.940 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-14 07:19:48.941  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-14 07:19:48.942  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-14 07:19:48.942 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-14 07:19:48.943 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-14 07:19:48.943 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-14 07:19:48.944 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-14 07:19:48.944 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-14 07:19:48.944 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-14 07:19:48.945 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-14 07:19:48.946 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-14 07:19:48.946 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-14 07:19:48.947 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-14 07:19:48.951 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 131998735634343310950543068381972542458459180153 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Nov 14 04:57:31 UTC 2022 Final Date: Sat Nov 13 04:57:30 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d7:22:03:0e:ad:8f:19:80:e8:2b:29:21:c0:be:69:d9:8e:9c:6f:49],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4abd5bfd5c67248c42dcb19133546afb969165a0 9499295fdae84d93c9090e5556f52d790fe9716d fd30bfd22fdfabb5d23cf6f1e3870054b92f8cde 5f99689ce2b64824923a6dd7fd4c7c5b67606184 927ee82a26fc6fc64f503867121d9b7d1a490e98 ab60ae420905504295611a4239919a11f9491f00 873cfc67f3c62cf0366d5b33a6ac62311c1dd097 1ca8c016343e5de2a2cd3f99014156f4613c6f26 150d2255c2665370eb16042fc203cd68309caff8 11a3d619bf06482066417c8f2da6fa6bd8784751 19bfb25285330c0502b87aea067322d3084fcd51 da15d6cdac47f92db955b8ccc4b6c54728900e80 6ca622120f5eea56555c9dd1b16ffb29a35ff7b8 752b983797996f18d46a35cd2d9014cd78d53823 5dc41aed58d4897b14c77e87d2cdda4dbdd01728 1075dd2b6986db9bd7cb81fb404627935cf86bd4 387e8396c3361d332848f7710483446e5e0925e6 ea769915545614725d4edae4af5a3ccbac63dcf1 f04b1cff921e40968194d36719d77b8eab820ffe eeef5a2e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8b:a4:c9:55:ef:99:08:25:09:9b:af:48:f7:ae:98:32:98:a2:b8:70],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-14 07:19:54.576  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-14 07:19:54.577 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-14 07:19:54.578 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-14 07:19:54.579 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-14 07:19:54.580  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-14 07:19:54.580  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-14 07:19:54.580  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-14 07:19:54.581 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-14 07:19:54.581 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-14 07:19:54.581 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-14 07:19:54.590 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-14 07:19:54.591 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-14 07:19:54.591 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-14 07:19:54.592 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-14 07:19:54.692  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-14 07:19:54.693  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-14 07:19:54.693 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-14 07:19:54.694 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-14 07:19:54.695  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-14 07:19:54.695  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-14 07:19:54.696 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-14 07:19:54.696 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-14 07:19:54.696 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-14 07:19:54.697 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-14 07:19:54.697 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-14 07:19:54.697 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-14 07:19:54.698 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-14 07:19:54.698 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-14 07:19:54.698 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-14 07:19:54.699 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-14 07:19:54.706 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 131998735634343310950543068381972542458459180153 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Mon Nov 14 04:57:31 UTC 2022 Final Date: Sat Nov 13 04:57:30 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d7:22:03:0e:ad:8f:19:80:e8:2b:29:21:c0:be:69:d9:8e:9c:6f:49],[56:66:d1:a4] modulus: bc8615ce403d253c077293291d0aadf0eee4608838ab849b7abc3c1756f0d9ff0f7847f37be18b9ec4c1f6958883f46acc71f4b439ff06735d5b370f05509aa2f466068b59c80943853062b735c170cd945e54c0e05448f1e423fe6fb17ac870181b050e101beff6d3fbfad1f7a480b80a01c04600d201456a74d30c236a0375d8e7693d2f71e196c9aa837876eefd493979c7d5c2e43fe7f7ed6bd9f2356afac5304a42726b770c02de144bb700a087b9231d96652df203b5e5ee1a02d8954f5606c7abba404c53fc782a7b7bddfd015b6cf3a2e68284cd52d9bc28c07efb135f6d1da8fcfb75f4d5ca9a0ff9fc60b726ee805fe3952ba0deeaf16e137f200ecc67180c6524bfdf442ca5965a827041b3a4e0abcb8c6b406606a8e2c155d998c199771db220240ade64729072a0b94de709430edf049c95aba31f24094106c005085201dc41b108b7fb20ee06a24e90f913f1bd0bd312eb1b02df6dbb9ef5eac5962a1897f756750de119a1f5c8d43c1ea436950b2b42e2c928f2ecbc296a3f public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 4abd5bfd5c67248c42dcb19133546afb969165a0 9499295fdae84d93c9090e5556f52d790fe9716d fd30bfd22fdfabb5d23cf6f1e3870054b92f8cde 5f99689ce2b64824923a6dd7fd4c7c5b67606184 927ee82a26fc6fc64f503867121d9b7d1a490e98 ab60ae420905504295611a4239919a11f9491f00 873cfc67f3c62cf0366d5b33a6ac62311c1dd097 1ca8c016343e5de2a2cd3f99014156f4613c6f26 150d2255c2665370eb16042fc203cd68309caff8 11a3d619bf06482066417c8f2da6fa6bd8784751 19bfb25285330c0502b87aea067322d3084fcd51 da15d6cdac47f92db955b8ccc4b6c54728900e80 6ca622120f5eea56555c9dd1b16ffb29a35ff7b8 752b983797996f18d46a35cd2d9014cd78d53823 5dc41aed58d4897b14c77e87d2cdda4dbdd01728 1075dd2b6986db9bd7cb81fb404627935cf86bd4 387e8396c3361d332848f7710483446e5e0925e6 ea769915545614725d4edae4af5a3ccbac63dcf1 f04b1cff921e40968194d36719d77b8eab820ffe eeef5a2e Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8b:4a:1a:52:02:11:7f:92:ff:b5:bd:d7:60:b2:01:95:62:96:e8:92],[56:66:d1:a4] modulus: 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 public exponent: 10001 ]