2022-11-25 04:52:57,082 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-11-25 04:52:58,138 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-11-25 04:52:58.946  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Nov 25, 2022 4:53:00 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Nov 25, 2022 4:53:00 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Nov 25, 2022 4:53:00 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Nov 25, 2022 4:53:01 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-11-25 04:53:01.682 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-11-25 04:53:01.985  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-11-25 04:53:02.149  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-11-25 04:53:03.026 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-11-25 04:53:03.029 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-11-25 04:53:03.030 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-11-25 04:53:03.035 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-11-25 04:53:03.084 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-11-25 04:53:03.089 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2022-11-25 04:53:03.256 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-11-25 04:53:03.988 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Nov 25, 2022 4:53:04 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-11-25 04:53:05.174  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 9.089 seconds (JVM running for 11.122) Nov 25, 2022 4:53:27 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-11-25 04:53:46.260  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-25 04:53:46.267 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-25 04:53:46.309 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-11-25 04:53:46.313 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-25 04:53:46.333  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-11-25 04:53:46.335  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-25 04:53:46.336  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-25 04:53:46.337 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-25 04:53:46.337 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-25 04:53:46.341 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-25 04:53:46.351 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-25 04:53:46.357 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-25 04:53:46.431 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-25 04:53:46.439 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-25 04:53:46.440 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-25 04:53:46.445 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-25 04:53:47.149  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-25 04:53:47.153  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-25 04:53:47.154 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-25 04:53:47.156 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-25 04:53:47.167  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-25 04:53:47.168  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-25 04:53:47.169 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-25 04:53:47.169 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-25 04:53:47.170 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-25 04:53:47.185 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-25 04:53:47.187 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-25 04:53:47.187 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-25 04:53:47.194 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-25 04:53:47.195 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-25 04:53:47.195 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-25 04:53:47.196 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-25 04:53:47.249 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 69189867383907904824959000264308469106901141513 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 25 04:49:07 UTC 2022 Final Date: Wed Nov 24 04:49:06 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f0:47:d8:47:89:95:7f:5e:75:73:61:c1:95:22:e7:9c:d7:10:87:22],[56:66:d1:a4] modulus: b9351fe81539773a2d914b7b699c64570faea3f55a68a4d7708f395c49a4b2683bf89e141c51c371550158b716bc4446bd1a7066bd96450cd16bbfceb79d14b07e6fd9211f3a84595b8539cf88695532ea598eca04e2ebdfb97ec3df9e93533551323ab27ad99a2fa13d200411c484a14fb3a15fb94814e203805d9d604cdd5f528b26b8897e0fbb8844cb0d92f705baf1ce73ae21d194f8e23c863089d3bbcc1afec830777f1240a619923989acb1b872504ce810a003f26d6e507fa433aae76e026afad2c0250b9c8060d139f1fd50814d08a832d0b953a2df0665011defd4a6c1820112d1bbf612f1d7f4c34069d449932ddaa311da9aa6fbefe0a4dcb3537b9d6f0dc45154cf0ac6218028b4b492b951dc329129c30f6180dabf03ca36c836ea176c3280e5121cce3fc9c7df3a444de5e54b08428140bef6280467b726d0a8630f1603edd1f01ccecaad70475adf0b9ebc92a190e406a066a2852cbc8c2d8e5be64184af0d914801e50d23fbbf3be6fbf15e7f1b84e0d37fe6dd812b9517 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a13b370f754c999bb11a7644da250fd03970ed04 5319e43b09747321abe9bd5eee28fcdf85bec2a9 1c0bc6d6cb2d530718a00f0b2ba9bf758e324c99 d264b9e6b64189b19a99c70d51dc43f2f0993040 4a87c690c65ece0e5974b1c3fb02041019d34ca3 b9d6ac1c45dad2997c7a24e28188494aa99f04bd ddfe87b23dd3c0cbe9b576d3d536553ce4faa2a7 2fa84600229bdcd71a4670734c40536191c0af78 7449b2ca87df117ebeb60a712a82cc11e1506d6d 19876a11afef8f1635666ad86599464662a1068f 6bce60640cc152eb8aead1880a8a129e71482cc6 e6d7e3eba3c630226be02287c910100ff81e9a41 9e1e52e9d6c9ddbe4a919e8205068ee0249daab8 0dd603d39f3d3868b9af4f2b9c5f3bbbd807e562 727c42c2d78eaac9f1659c49bdcb0038687c7241 585346406bbfc9161809f4abb283aa9566a7d992 e18e67161225c223fea9d0ebf18edb118e8db6b1 836b147ae4aed9257a117aecab0e87042c7ff6b5 c0384adc2bde708bf64d67ac28d5fcd80ec5133f 171605d5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [45:9b:9d:1d:8e:20:d1:9c:87:72:ef:15:7c:52:22:3b:6c:ff:07:74],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-25 06:09:55.943  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-25 06:09:55.946 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-25 06:09:55.950 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-25 06:09:55.952 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-25 06:09:55.953  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-25 06:09:55.954  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-25 06:09:55.955  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-25 06:09:55.956 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-25 06:09:55.956 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-25 06:09:55.957 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-25 06:09:55.962 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-25 06:09:55.964 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-25 06:09:55.964 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-25 06:09:55.965 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-25 06:09:56.268  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-25 06:09:56.269  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-25 06:09:56.270 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-25 06:09:56.270 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-25 06:09:56.273  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-25 06:09:56.274  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-25 06:09:56.275 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-25 06:09:56.278 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-25 06:09:56.279 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-25 06:09:56.281 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-25 06:09:56.281 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-25 06:09:56.281 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-25 06:09:56.282 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-25 06:09:56.283 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-25 06:09:56.283 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-25 06:09:56.284 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-25 06:09:56.295 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 69189867383907904824959000264308469106901141513 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 25 04:49:07 UTC 2022 Final Date: Wed Nov 24 04:49:06 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f0:47:d8:47:89:95:7f:5e:75:73:61:c1:95:22:e7:9c:d7:10:87:22],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a13b370f754c999bb11a7644da250fd03970ed04 5319e43b09747321abe9bd5eee28fcdf85bec2a9 1c0bc6d6cb2d530718a00f0b2ba9bf758e324c99 d264b9e6b64189b19a99c70d51dc43f2f0993040 4a87c690c65ece0e5974b1c3fb02041019d34ca3 b9d6ac1c45dad2997c7a24e28188494aa99f04bd ddfe87b23dd3c0cbe9b576d3d536553ce4faa2a7 2fa84600229bdcd71a4670734c40536191c0af78 7449b2ca87df117ebeb60a712a82cc11e1506d6d 19876a11afef8f1635666ad86599464662a1068f 6bce60640cc152eb8aead1880a8a129e71482cc6 e6d7e3eba3c630226be02287c910100ff81e9a41 9e1e52e9d6c9ddbe4a919e8205068ee0249daab8 0dd603d39f3d3868b9af4f2b9c5f3bbbd807e562 727c42c2d78eaac9f1659c49bdcb0038687c7241 585346406bbfc9161809f4abb283aa9566a7d992 e18e67161225c223fea9d0ebf18edb118e8db6b1 836b147ae4aed9257a117aecab0e87042c7ff6b5 c0384adc2bde708bf64d67ac28d5fcd80ec5133f 171605d5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1f:28:73:c9:70:0d:11:39:09:99:b7:94:1e:76:74:ee:ad:25:1a:f3],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-25 06:11:44.052  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-25 06:11:44.055 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-25 06:11:44.059 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-11-25 06:11:44.060 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-25 06:11:44.061  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-11-25 06:11:44.062  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-25 06:11:44.062  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-25 06:11:44.063 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-25 06:11:44.064 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-25 06:11:44.065 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-25 06:11:44.071 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-25 06:11:44.072 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-25 06:11:44.072 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-25 06:11:44.073 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-25 06:11:44.299  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-25 06:11:44.300  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-25 06:11:44.300 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-25 06:11:44.301 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-25 06:11:44.303  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-25 06:11:44.304  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-25 06:11:44.304 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-25 06:11:44.305 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-25 06:11:44.305 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-25 06:11:44.306 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-25 06:11:44.307 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-25 06:11:44.307 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-25 06:11:44.308 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-25 06:11:44.309 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-25 06:11:44.309 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-25 06:11:44.310 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-25 06:11:44.318 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 69189867383907904824959000264308469106901141513 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 25 04:49:07 UTC 2022 Final Date: Wed Nov 24 04:49:06 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f0:47:d8:47:89:95:7f:5e:75:73:61:c1:95:22:e7:9c:d7:10:87:22],[56:66:d1:a4] modulus: b9351fe81539773a2d914b7b699c64570faea3f55a68a4d7708f395c49a4b2683bf89e141c51c371550158b716bc4446bd1a7066bd96450cd16bbfceb79d14b07e6fd9211f3a84595b8539cf88695532ea598eca04e2ebdfb97ec3df9e93533551323ab27ad99a2fa13d200411c484a14fb3a15fb94814e203805d9d604cdd5f528b26b8897e0fbb8844cb0d92f705baf1ce73ae21d194f8e23c863089d3bbcc1afec830777f1240a619923989acb1b872504ce810a003f26d6e507fa433aae76e026afad2c0250b9c8060d139f1fd50814d08a832d0b953a2df0665011defd4a6c1820112d1bbf612f1d7f4c34069d449932ddaa311da9aa6fbefe0a4dcb3537b9d6f0dc45154cf0ac6218028b4b492b951dc329129c30f6180dabf03ca36c836ea176c3280e5121cce3fc9c7df3a444de5e54b08428140bef6280467b726d0a8630f1603edd1f01ccecaad70475adf0b9ebc92a190e406a066a2852cbc8c2d8e5be64184af0d914801e50d23fbbf3be6fbf15e7f1b84e0d37fe6dd812b9517 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a13b370f754c999bb11a7644da250fd03970ed04 5319e43b09747321abe9bd5eee28fcdf85bec2a9 1c0bc6d6cb2d530718a00f0b2ba9bf758e324c99 d264b9e6b64189b19a99c70d51dc43f2f0993040 4a87c690c65ece0e5974b1c3fb02041019d34ca3 b9d6ac1c45dad2997c7a24e28188494aa99f04bd ddfe87b23dd3c0cbe9b576d3d536553ce4faa2a7 2fa84600229bdcd71a4670734c40536191c0af78 7449b2ca87df117ebeb60a712a82cc11e1506d6d 19876a11afef8f1635666ad86599464662a1068f 6bce60640cc152eb8aead1880a8a129e71482cc6 e6d7e3eba3c630226be02287c910100ff81e9a41 9e1e52e9d6c9ddbe4a919e8205068ee0249daab8 0dd603d39f3d3868b9af4f2b9c5f3bbbd807e562 727c42c2d78eaac9f1659c49bdcb0038687c7241 585346406bbfc9161809f4abb283aa9566a7d992 e18e67161225c223fea9d0ebf18edb118e8db6b1 836b147ae4aed9257a117aecab0e87042c7ff6b5 c0384adc2bde708bf64d67ac28d5fcd80ec5133f 171605d5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [61:13:4e:12:54:2a:34:be:0d:3c:07:59:74:e1:25:af:0b:e6:1b:2c],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-25 06:13:34.078  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-25 06:13:34.080 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-25 06:13:34.081 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-11-25 06:13:34.081 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-25 06:13:34.082  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-11-25 06:13:34.083  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-25 06:13:34.083  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-25 06:13:34.083 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-25 06:13:34.084 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-25 06:13:34.084 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-25 06:13:34.088 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-25 06:13:34.089 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-25 06:13:34.089 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-25 06:13:34.089 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-25 06:13:34.308  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-25 06:13:34.309  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-25 06:13:34.309 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-25 06:13:34.309 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-25 06:13:34.311  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-25 06:13:34.312  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-25 06:13:34.312 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-25 06:13:34.313 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-25 06:13:34.313 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-25 06:13:34.313 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-25 06:13:34.314 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-25 06:13:34.314 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-25 06:13:34.315 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-25 06:13:34.315 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-25 06:13:34.316 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-25 06:13:34.316 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-25 06:13:34.320 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 69189867383907904824959000264308469106901141513 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 25 04:49:07 UTC 2022 Final Date: Wed Nov 24 04:49:06 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f0:47:d8:47:89:95:7f:5e:75:73:61:c1:95:22:e7:9c:d7:10:87:22],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a13b370f754c999bb11a7644da250fd03970ed04 5319e43b09747321abe9bd5eee28fcdf85bec2a9 1c0bc6d6cb2d530718a00f0b2ba9bf758e324c99 d264b9e6b64189b19a99c70d51dc43f2f0993040 4a87c690c65ece0e5974b1c3fb02041019d34ca3 b9d6ac1c45dad2997c7a24e28188494aa99f04bd ddfe87b23dd3c0cbe9b576d3d536553ce4faa2a7 2fa84600229bdcd71a4670734c40536191c0af78 7449b2ca87df117ebeb60a712a82cc11e1506d6d 19876a11afef8f1635666ad86599464662a1068f 6bce60640cc152eb8aead1880a8a129e71482cc6 e6d7e3eba3c630226be02287c910100ff81e9a41 9e1e52e9d6c9ddbe4a919e8205068ee0249daab8 0dd603d39f3d3868b9af4f2b9c5f3bbbd807e562 727c42c2d78eaac9f1659c49bdcb0038687c7241 585346406bbfc9161809f4abb283aa9566a7d992 e18e67161225c223fea9d0ebf18edb118e8db6b1 836b147ae4aed9257a117aecab0e87042c7ff6b5 c0384adc2bde708bf64d67ac28d5fcd80ec5133f 171605d5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ba:76:75:c1:25:d1:db:50:81:19:d0:3a:21:03:ab:40:d7:cb:32:fd],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-25 06:16:10.785  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-25 06:16:10.787 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-25 06:16:10.789 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-25 06:16:10.790 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-25 06:16:10.791  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-25 06:16:10.793  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-25 06:16:10.794  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-25 06:16:10.796 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-25 06:16:10.797 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-25 06:16:10.798 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-25 06:16:10.804 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-25 06:16:10.805 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-25 06:16:10.806 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-25 06:16:10.807 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-25 06:16:11.763  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-25 06:16:11.764  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-25 06:16:11.765 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-25 06:16:11.766 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-25 06:16:11.767  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-25 06:16:11.767  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-25 06:16:11.768 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-25 06:16:11.768 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-25 06:16:11.769 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-25 06:16:11.770 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-25 06:16:11.770 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-25 06:16:11.771 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-25 06:16:11.772 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-25 06:16:11.772 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-25 06:16:11.772 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-25 06:16:11.773 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-25 06:16:11.777 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 69189867383907904824959000264308469106901141513 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 25 04:49:07 UTC 2022 Final Date: Wed Nov 24 04:49:06 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f0:47:d8:47:89:95:7f:5e:75:73:61:c1:95:22:e7:9c:d7:10:87:22],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a13b370f754c999bb11a7644da250fd03970ed04 5319e43b09747321abe9bd5eee28fcdf85bec2a9 1c0bc6d6cb2d530718a00f0b2ba9bf758e324c99 d264b9e6b64189b19a99c70d51dc43f2f0993040 4a87c690c65ece0e5974b1c3fb02041019d34ca3 b9d6ac1c45dad2997c7a24e28188494aa99f04bd ddfe87b23dd3c0cbe9b576d3d536553ce4faa2a7 2fa84600229bdcd71a4670734c40536191c0af78 7449b2ca87df117ebeb60a712a82cc11e1506d6d 19876a11afef8f1635666ad86599464662a1068f 6bce60640cc152eb8aead1880a8a129e71482cc6 e6d7e3eba3c630226be02287c910100ff81e9a41 9e1e52e9d6c9ddbe4a919e8205068ee0249daab8 0dd603d39f3d3868b9af4f2b9c5f3bbbd807e562 727c42c2d78eaac9f1659c49bdcb0038687c7241 585346406bbfc9161809f4abb283aa9566a7d992 e18e67161225c223fea9d0ebf18edb118e8db6b1 836b147ae4aed9257a117aecab0e87042c7ff6b5 c0384adc2bde708bf64d67ac28d5fcd80ec5133f 171605d5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [01:79:a4:8f:eb:c5:0c:13:f8:5e:40:5b:f4:93:77:6c:18:33:a5:d7],[56:66:d1:a4] modulus: bb55e9d6ad38ea775100c537cba0aa6822eb105c2262f9ad32f2e256f13c782947dcadb7a3de4d3a969870f15cd541e0b5c8129e977661cba8f2f29c2f4132e4fd71ac09578f7e33c565ad9165bf4bfe8791fab993a9d7bcedfb5ea4529a07c9fd0eb6d62763754bf5dd8ccbe658e51c8b668e424e13977a2cc7ad5d6474f0eb0dcaf27ccf50b48561c6fe2957db51769e57525b9c35394fb807e5939a185566385539d6badf350a4eb2345a436a300a3ba69397b024ee76642485eb1ad015bda1119efbe781f322d1dd57248810705be1c14a35c8b44393fa3fa3f1f0398a69f22292ffcbd10c2547a34ada0626445e469949a642ab8dc0801c64d4d1015923 public exponent: 10001 ] 2022-11-25 06:23:00.520  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-25 06:23:00.523 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-25 06:23:00.525 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-25 06:23:00.526 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-25 06:23:00.527  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-25 06:23:00.527  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-25 06:23:00.528  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-25 06:23:00.528 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-25 06:23:00.529 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-25 06:23:00.529 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-25 06:23:00.535 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-25 06:23:00.536 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-25 06:23:00.536 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-25 06:23:00.537 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-25 06:23:00.722  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-25 06:23:00.723  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-25 06:23:00.724 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-25 06:23:00.725 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-25 06:23:00.727  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-25 06:23:00.727  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-25 06:23:00.728 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-25 06:23:00.728 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-25 06:23:00.729 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-25 06:23:00.730 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-25 06:23:00.731 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-25 06:23:00.731 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-25 06:23:00.733 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-25 06:23:00.733 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-25 06:23:00.734 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-25 06:23:00.735 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-25 06:23:00.740 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 69189867383907904824959000264308469106901141513 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 25 04:49:07 UTC 2022 Final Date: Wed Nov 24 04:49:06 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f0:47:d8:47:89:95:7f:5e:75:73:61:c1:95:22:e7:9c:d7:10:87:22],[56:66:d1:a4] modulus: b9351fe81539773a2d914b7b699c64570faea3f55a68a4d7708f395c49a4b2683bf89e141c51c371550158b716bc4446bd1a7066bd96450cd16bbfceb79d14b07e6fd9211f3a84595b8539cf88695532ea598eca04e2ebdfb97ec3df9e93533551323ab27ad99a2fa13d200411c484a14fb3a15fb94814e203805d9d604cdd5f528b26b8897e0fbb8844cb0d92f705baf1ce73ae21d194f8e23c863089d3bbcc1afec830777f1240a619923989acb1b872504ce810a003f26d6e507fa433aae76e026afad2c0250b9c8060d139f1fd50814d08a832d0b953a2df0665011defd4a6c1820112d1bbf612f1d7f4c34069d449932ddaa311da9aa6fbefe0a4dcb3537b9d6f0dc45154cf0ac6218028b4b492b951dc329129c30f6180dabf03ca36c836ea176c3280e5121cce3fc9c7df3a444de5e54b08428140bef6280467b726d0a8630f1603edd1f01ccecaad70475adf0b9ebc92a190e406a066a2852cbc8c2d8e5be64184af0d914801e50d23fbbf3be6fbf15e7f1b84e0d37fe6dd812b9517 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a13b370f754c999bb11a7644da250fd03970ed04 5319e43b09747321abe9bd5eee28fcdf85bec2a9 1c0bc6d6cb2d530718a00f0b2ba9bf758e324c99 d264b9e6b64189b19a99c70d51dc43f2f0993040 4a87c690c65ece0e5974b1c3fb02041019d34ca3 b9d6ac1c45dad2997c7a24e28188494aa99f04bd ddfe87b23dd3c0cbe9b576d3d536553ce4faa2a7 2fa84600229bdcd71a4670734c40536191c0af78 7449b2ca87df117ebeb60a712a82cc11e1506d6d 19876a11afef8f1635666ad86599464662a1068f 6bce60640cc152eb8aead1880a8a129e71482cc6 e6d7e3eba3c630226be02287c910100ff81e9a41 9e1e52e9d6c9ddbe4a919e8205068ee0249daab8 0dd603d39f3d3868b9af4f2b9c5f3bbbd807e562 727c42c2d78eaac9f1659c49bdcb0038687c7241 585346406bbfc9161809f4abb283aa9566a7d992 e18e67161225c223fea9d0ebf18edb118e8db6b1 836b147ae4aed9257a117aecab0e87042c7ff6b5 c0384adc2bde708bf64d67ac28d5fcd80ec5133f 171605d5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c9:d8:42:56:02:16:da:c6:7f:47:d8:29:50:69:27:37:35:b9:13:03],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-25 06:28:16.641  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-25 06:28:16.650 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-25 06:28:16.653 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-25 06:28:16.654 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-25 06:28:16.655  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-11-25 06:28:16.655  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-25 06:28:16.656  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-25 06:28:16.657 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-25 06:28:16.657 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-25 06:28:16.658 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-25 06:28:16.663 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-25 06:28:16.663 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-25 06:28:16.664 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-25 06:28:16.664 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-25 06:28:16.911  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-25 06:28:16.912  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-25 06:28:16.913 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-25 06:28:16.913 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-25 06:28:16.915  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-25 06:28:16.915  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-25 06:28:16.916 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-25 06:28:16.916 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-25 06:28:16.916 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-25 06:28:16.917 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-25 06:28:16.918 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-25 06:28:16.918 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-25 06:28:16.919 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-25 06:28:16.919 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-25 06:28:16.920 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-25 06:28:16.921 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-25 06:28:16.926 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 69189867383907904824959000264308469106901141513 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 25 04:49:07 UTC 2022 Final Date: Wed Nov 24 04:49:06 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f0:47:d8:47:89:95:7f:5e:75:73:61:c1:95:22:e7:9c:d7:10:87:22],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a13b370f754c999bb11a7644da250fd03970ed04 5319e43b09747321abe9bd5eee28fcdf85bec2a9 1c0bc6d6cb2d530718a00f0b2ba9bf758e324c99 d264b9e6b64189b19a99c70d51dc43f2f0993040 4a87c690c65ece0e5974b1c3fb02041019d34ca3 b9d6ac1c45dad2997c7a24e28188494aa99f04bd ddfe87b23dd3c0cbe9b576d3d536553ce4faa2a7 2fa84600229bdcd71a4670734c40536191c0af78 7449b2ca87df117ebeb60a712a82cc11e1506d6d 19876a11afef8f1635666ad86599464662a1068f 6bce60640cc152eb8aead1880a8a129e71482cc6 e6d7e3eba3c630226be02287c910100ff81e9a41 9e1e52e9d6c9ddbe4a919e8205068ee0249daab8 0dd603d39f3d3868b9af4f2b9c5f3bbbd807e562 727c42c2d78eaac9f1659c49bdcb0038687c7241 585346406bbfc9161809f4abb283aa9566a7d992 e18e67161225c223fea9d0ebf18edb118e8db6b1 836b147ae4aed9257a117aecab0e87042c7ff6b5 c0384adc2bde708bf64d67ac28d5fcd80ec5133f 171605d5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [12:b5:7b:f8:8a:39:47:00:78:45:d6:36:29:34:e7:f6:60:db:e1:1c],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-25 06:34:17.515  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-25 06:34:17.523 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-25 06:34:17.533 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-11-25 06:34:17.537 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-25 06:34:17.537  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-11-25 06:34:17.538  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-25 06:34:17.539  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-25 06:34:17.539 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-25 06:34:17.540 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-25 06:34:17.541 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-25 06:34:17.549 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-25 06:34:17.550 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-25 06:34:17.551 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-25 06:34:17.552 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-25 06:34:17.831  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-25 06:34:17.832  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-25 06:34:17.832 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-25 06:34:17.833 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-25 06:34:17.834  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-25 06:34:17.835  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-25 06:34:17.835 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-25 06:34:17.836 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-25 06:34:17.837 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-25 06:34:17.838 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-25 06:34:17.839 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-25 06:34:17.839 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-25 06:34:17.841 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-25 06:34:17.842 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-25 06:34:17.843 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-25 06:34:17.847 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-25 06:34:17.857 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 69189867383907904824959000264308469106901141513 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 25 04:49:07 UTC 2022 Final Date: Wed Nov 24 04:49:06 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f0:47:d8:47:89:95:7f:5e:75:73:61:c1:95:22:e7:9c:d7:10:87:22],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a13b370f754c999bb11a7644da250fd03970ed04 5319e43b09747321abe9bd5eee28fcdf85bec2a9 1c0bc6d6cb2d530718a00f0b2ba9bf758e324c99 d264b9e6b64189b19a99c70d51dc43f2f0993040 4a87c690c65ece0e5974b1c3fb02041019d34ca3 b9d6ac1c45dad2997c7a24e28188494aa99f04bd ddfe87b23dd3c0cbe9b576d3d536553ce4faa2a7 2fa84600229bdcd71a4670734c40536191c0af78 7449b2ca87df117ebeb60a712a82cc11e1506d6d 19876a11afef8f1635666ad86599464662a1068f 6bce60640cc152eb8aead1880a8a129e71482cc6 e6d7e3eba3c630226be02287c910100ff81e9a41 9e1e52e9d6c9ddbe4a919e8205068ee0249daab8 0dd603d39f3d3868b9af4f2b9c5f3bbbd807e562 727c42c2d78eaac9f1659c49bdcb0038687c7241 585346406bbfc9161809f4abb283aa9566a7d992 e18e67161225c223fea9d0ebf18edb118e8db6b1 836b147ae4aed9257a117aecab0e87042c7ff6b5 c0384adc2bde708bf64d67ac28d5fcd80ec5133f 171605d5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [bc:50:14:af:fc:d3:bd:12:b1:0a:77:a1:4c:9f:e0:dc:74:32:41:6f],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-25 06:40:05.795  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-25 06:40:05.797 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-25 06:40:05.799 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-25 06:40:05.800 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-25 06:40:05.801  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-25 06:40:05.801  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-25 06:40:05.802  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-25 06:40:05.803 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-25 06:40:05.803 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-25 06:40:05.804 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-25 06:40:05.811 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-25 06:40:05.812 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-25 06:40:05.812 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-25 06:40:05.813 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-25 06:40:06.038  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-25 06:40:06.039  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-25 06:40:06.039 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-25 06:40:06.040 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-25 06:40:06.042  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-25 06:40:06.042  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-25 06:40:06.043 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-25 06:40:06.044 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-25 06:40:06.044 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-25 06:40:06.045 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-25 06:40:06.046 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-25 06:40:06.046 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-25 06:40:06.047 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-25 06:40:06.047 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-25 06:40:06.048 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-25 06:40:06.049 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-25 06:40:06.054 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 69189867383907904824959000264308469106901141513 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 25 04:49:07 UTC 2022 Final Date: Wed Nov 24 04:49:06 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f0:47:d8:47:89:95:7f:5e:75:73:61:c1:95:22:e7:9c:d7:10:87:22],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a13b370f754c999bb11a7644da250fd03970ed04 5319e43b09747321abe9bd5eee28fcdf85bec2a9 1c0bc6d6cb2d530718a00f0b2ba9bf758e324c99 d264b9e6b64189b19a99c70d51dc43f2f0993040 4a87c690c65ece0e5974b1c3fb02041019d34ca3 b9d6ac1c45dad2997c7a24e28188494aa99f04bd ddfe87b23dd3c0cbe9b576d3d536553ce4faa2a7 2fa84600229bdcd71a4670734c40536191c0af78 7449b2ca87df117ebeb60a712a82cc11e1506d6d 19876a11afef8f1635666ad86599464662a1068f 6bce60640cc152eb8aead1880a8a129e71482cc6 e6d7e3eba3c630226be02287c910100ff81e9a41 9e1e52e9d6c9ddbe4a919e8205068ee0249daab8 0dd603d39f3d3868b9af4f2b9c5f3bbbd807e562 727c42c2d78eaac9f1659c49bdcb0038687c7241 585346406bbfc9161809f4abb283aa9566a7d992 e18e67161225c223fea9d0ebf18edb118e8db6b1 836b147ae4aed9257a117aecab0e87042c7ff6b5 c0384adc2bde708bf64d67ac28d5fcd80ec5133f 171605d5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [bf:52:b6:f9:bc:4c:7c:55:b9:47:3c:a2:d8:c0:36:56:2e:7c:d0:ce],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-25 06:40:23.160  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-25 06:40:23.162 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-25 06:40:23.163 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-25 06:40:23.164 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-25 06:40:23.164  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-25 06:40:23.165  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-25 06:40:23.166  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-25 06:40:23.166 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-25 06:40:23.166 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-25 06:40:23.167 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-25 06:40:23.171 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-25 06:40:23.172 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-25 06:40:23.172 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-25 06:40:23.172 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-25 06:40:23.376  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-25 06:40:23.376  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-25 06:40:23.377 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-25 06:40:23.377 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-25 06:40:23.379  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-25 06:40:23.380  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-25 06:40:23.380 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-25 06:40:23.380 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-25 06:40:23.381 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-25 06:40:23.382 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-25 06:40:23.382 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-25 06:40:23.382 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-25 06:40:23.383 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-25 06:40:23.383 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-25 06:40:23.384 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-25 06:40:23.384 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-25 06:40:23.387 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 69189867383907904824959000264308469106901141513 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 25 04:49:07 UTC 2022 Final Date: Wed Nov 24 04:49:06 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f0:47:d8:47:89:95:7f:5e:75:73:61:c1:95:22:e7:9c:d7:10:87:22],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a13b370f754c999bb11a7644da250fd03970ed04 5319e43b09747321abe9bd5eee28fcdf85bec2a9 1c0bc6d6cb2d530718a00f0b2ba9bf758e324c99 d264b9e6b64189b19a99c70d51dc43f2f0993040 4a87c690c65ece0e5974b1c3fb02041019d34ca3 b9d6ac1c45dad2997c7a24e28188494aa99f04bd ddfe87b23dd3c0cbe9b576d3d536553ce4faa2a7 2fa84600229bdcd71a4670734c40536191c0af78 7449b2ca87df117ebeb60a712a82cc11e1506d6d 19876a11afef8f1635666ad86599464662a1068f 6bce60640cc152eb8aead1880a8a129e71482cc6 e6d7e3eba3c630226be02287c910100ff81e9a41 9e1e52e9d6c9ddbe4a919e8205068ee0249daab8 0dd603d39f3d3868b9af4f2b9c5f3bbbd807e562 727c42c2d78eaac9f1659c49bdcb0038687c7241 585346406bbfc9161809f4abb283aa9566a7d992 e18e67161225c223fea9d0ebf18edb118e8db6b1 836b147ae4aed9257a117aecab0e87042c7ff6b5 c0384adc2bde708bf64d67ac28d5fcd80ec5133f 171605d5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9f:9e:0b:25:2a:15:ff:8e:7f:ad:92:50:f9:99:19:0b:21:a9:df:b4],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-25 07:01:54.385  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-25 07:01:54.388 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-25 07:01:54.390 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-25 07:01:54.391 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-25 07:01:54.391  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-11-25 07:01:54.392  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-25 07:01:54.392  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-25 07:01:54.395 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-25 07:01:54.395 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-25 07:01:54.396 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-25 07:01:54.401 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-25 07:01:54.402 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-25 07:01:54.402 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-25 07:01:54.403 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-25 07:01:54.733  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-25 07:01:54.735  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-25 07:01:54.735 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-25 07:01:54.735 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-25 07:01:54.736  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-25 07:01:54.737  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-25 07:01:54.737 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-25 07:01:54.737 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-25 07:01:54.738 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-25 07:01:54.739 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-25 07:01:54.739 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-25 07:01:54.739 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-25 07:01:54.740 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-25 07:01:54.740 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-25 07:01:54.740 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-25 07:01:54.741 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-25 07:01:54.745 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 69189867383907904824959000264308469106901141513 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 25 04:49:07 UTC 2022 Final Date: Wed Nov 24 04:49:06 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f0:47:d8:47:89:95:7f:5e:75:73:61:c1:95:22:e7:9c:d7:10:87:22],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a13b370f754c999bb11a7644da250fd03970ed04 5319e43b09747321abe9bd5eee28fcdf85bec2a9 1c0bc6d6cb2d530718a00f0b2ba9bf758e324c99 d264b9e6b64189b19a99c70d51dc43f2f0993040 4a87c690c65ece0e5974b1c3fb02041019d34ca3 b9d6ac1c45dad2997c7a24e28188494aa99f04bd ddfe87b23dd3c0cbe9b576d3d536553ce4faa2a7 2fa84600229bdcd71a4670734c40536191c0af78 7449b2ca87df117ebeb60a712a82cc11e1506d6d 19876a11afef8f1635666ad86599464662a1068f 6bce60640cc152eb8aead1880a8a129e71482cc6 e6d7e3eba3c630226be02287c910100ff81e9a41 9e1e52e9d6c9ddbe4a919e8205068ee0249daab8 0dd603d39f3d3868b9af4f2b9c5f3bbbd807e562 727c42c2d78eaac9f1659c49bdcb0038687c7241 585346406bbfc9161809f4abb283aa9566a7d992 e18e67161225c223fea9d0ebf18edb118e8db6b1 836b147ae4aed9257a117aecab0e87042c7ff6b5 c0384adc2bde708bf64d67ac28d5fcd80ec5133f 171605d5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9d:45:c0:01:c7:fc:b3:01:b1:19:58:7d:65:0a:8c:ed:fc:3e:29:86],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-11-25 07:02:01.520  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-11-25 07:02:01.521 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-11-25 07:02:01.523 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-25 07:02:01.523 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-11-25 07:02:01.524  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-11-25 07:02:01.524  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-11-25 07:02:01.524  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-11-25 07:02:01.525 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-11-25 07:02:01.525 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-11-25 07:02:01.526 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-11-25 07:02:01.530 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-11-25 07:02:01.531 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-25 07:02:01.531 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-11-25 07:02:01.531 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-25 07:02:01.693  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-11-25 07:02:01.693  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-11-25 07:02:01.694 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-11-25 07:02:01.694 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-11-25 07:02:01.696  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-11-25 07:02:01.696  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-11-25 07:02:01.697 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-25 07:02:01.697 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-25 07:02:01.697 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-25 07:02:01.699 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-25 07:02:01.699 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-25 07:02:01.699 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-25 07:02:01.700 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-11-25 07:02:01.701 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-11-25 07:02:01.701 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-11-25 07:02:01.702 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-11-25 07:02:01.705 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 69189867383907904824959000264308469106901141513 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Nov 25 04:49:07 UTC 2022 Final Date: Wed Nov 24 04:49:06 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [f0:47:d8:47:89:95:7f:5e:75:73:61:c1:95:22:e7:9c:d7:10:87:22],[56:66:d1:a4] modulus: b9351fe81539773a2d914b7b699c64570faea3f55a68a4d7708f395c49a4b2683bf89e141c51c371550158b716bc4446bd1a7066bd96450cd16bbfceb79d14b07e6fd9211f3a84595b8539cf88695532ea598eca04e2ebdfb97ec3df9e93533551323ab27ad99a2fa13d200411c484a14fb3a15fb94814e203805d9d604cdd5f528b26b8897e0fbb8844cb0d92f705baf1ce73ae21d194f8e23c863089d3bbcc1afec830777f1240a619923989acb1b872504ce810a003f26d6e507fa433aae76e026afad2c0250b9c8060d139f1fd50814d08a832d0b953a2df0665011defd4a6c1820112d1bbf612f1d7f4c34069d449932ddaa311da9aa6fbefe0a4dcb3537b9d6f0dc45154cf0ac6218028b4b492b951dc329129c30f6180dabf03ca36c836ea176c3280e5121cce3fc9c7df3a444de5e54b08428140bef6280467b726d0a8630f1603edd1f01ccecaad70475adf0b9ebc92a190e406a066a2852cbc8c2d8e5be64184af0d914801e50d23fbbf3be6fbf15e7f1b84e0d37fe6dd812b9517 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: a13b370f754c999bb11a7644da250fd03970ed04 5319e43b09747321abe9bd5eee28fcdf85bec2a9 1c0bc6d6cb2d530718a00f0b2ba9bf758e324c99 d264b9e6b64189b19a99c70d51dc43f2f0993040 4a87c690c65ece0e5974b1c3fb02041019d34ca3 b9d6ac1c45dad2997c7a24e28188494aa99f04bd ddfe87b23dd3c0cbe9b576d3d536553ce4faa2a7 2fa84600229bdcd71a4670734c40536191c0af78 7449b2ca87df117ebeb60a712a82cc11e1506d6d 19876a11afef8f1635666ad86599464662a1068f 6bce60640cc152eb8aead1880a8a129e71482cc6 e6d7e3eba3c630226be02287c910100ff81e9a41 9e1e52e9d6c9ddbe4a919e8205068ee0249daab8 0dd603d39f3d3868b9af4f2b9c5f3bbbd807e562 727c42c2d78eaac9f1659c49bdcb0038687c7241 585346406bbfc9161809f4abb283aa9566a7d992 e18e67161225c223fea9d0ebf18edb118e8db6b1 836b147ae4aed9257a117aecab0e87042c7ff6b5 c0384adc2bde708bf64d67ac28d5fcd80ec5133f 171605d5 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9a:7e:9d:ab:66:7f:08:2f:e5:19:3a:d3:58:21:a6:45:7a:8b:cd:2d],[56:66:d1:a4] modulus: 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 public exponent: 10001 ]