2022-12-06 08:57:28,035 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-12-06 08:57:29,788 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-12-06 08:57:30.559  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Dec 06, 2022 8:57:32 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Dec 06, 2022 8:57:32 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Dec 06, 2022 8:57:32 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Dec 06, 2022 8:57:32 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-12-06 08:57:33.269 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-12-06 08:57:33.565  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-12-06 08:57:33.738  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-12-06 08:57:34.643 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-12-06 08:57:34.647 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-12-06 08:57:34.648 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-12-06 08:57:34.652 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-12-06 08:57:34.699 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-12-06 08:57:34.703 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-12-06 08:57:34.818 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-12-06 08:57:35.580 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Dec 06, 2022 8:57:36 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-12-06 08:57:36.656  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 9.654 seconds (JVM running for 11.957) Dec 06, 2022 8:57:55 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-12-06 08:58:46.007  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-12-06 08:58:46.016 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-12-06 08:58:46.056 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-12-06 08:58:46.059 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-06 08:58:46.083  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-12-06 08:58:46.086  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-12-06 08:58:46.087  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-12-06 08:58:46.088 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-12-06 08:58:46.089 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-06 08:58:46.092 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-12-06 08:58:46.103 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-12-06 08:58:46.107 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-12-06 08:58:46.159 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-12-06 08:58:46.165 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-06 08:58:46.165 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-06 08:58:46.168 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-06 08:58:46.720  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-12-06 08:58:46.723  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-12-06 08:58:46.723 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-12-06 08:58:46.725 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-06 08:58:46.734  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-12-06 08:58:46.735  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-12-06 08:58:46.736 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 08:58:46.736 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-06 08:58:46.737 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-06 08:58:46.751 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 08:58:46.752 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-06 08:58:46.752 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-06 08:58:46.758 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 08:58:46.758 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-06 08:58:46.759 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-06 08:58:46.760 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-06 08:58:46.790 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 645495374686812488944236860936252647578807653111 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Dec 06 08:54:18 UTC 2022 Final Date: Sun Dec 05 08:54:17 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fd:9f:b2:9c:11:08:23:d7:12:95:7c:8b:50:5d:a2:33:ea:2a:95:5a],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6d13800af563b2a5b077dd7d7785f973c0868b27 22d0a843f61624516329606b5fea54643a904613 34455e1c42bc6f14b2cfdb7adadcb3a51ebf149d f45eee0482139c08018ba6f2ae11d4538342ea6e 7b7d2c60b08eef33dfb93363109b87a540dc6e8b 988fb6df0b3984f74251f7430d1b14416dce37b6 9cec25f40ea1f71c602560285a27c6e4ca6b525b 1681b1d95642ed59f6e273bda10c83e826d73ea8 0c7ee584586996c344153183fafd97118f251c7c 1aee248f2ee92fd2ed8b3b1db51d37a32a7dcc73 e9807f5da63013971501bd1a0889f76073e48743 d70bca959dd393a892467199f1ce8b2ceb3c50ac 666c1f8226444a1272ae0e018524f2541c10fa1c dff860d83fa760e792a39fae3021940cf43c7af3 abaadeaf61858cde161419d7b6b867a26a70be8a f331a9b230241805d767393dde5f5cdf488e236e 5f1df7c02f64ad75ecbabbbfeaba682e59209750 40bf8950028cd4ae5fc2844486fee91c750af742 25a8522aa4bbd0d964ce78eb49972e1908740c69 daa1d4f6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7d:68:e1:90:60:18:bd:87:1b:36:fc:21:7b:5e:6b:ce:5a:88:d5:7d],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-06 10:34:53.865  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-12-06 10:34:53.868 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-12-06 10:34:53.871 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-06 10:34:53.872 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-06 10:34:53.873  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-06 10:34:53.874  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-12-06 10:34:53.874  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-12-06 10:34:53.875 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-12-06 10:34:53.875 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-12-06 10:34:53.876 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-12-06 10:34:53.883 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-12-06 10:34:53.884 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-06 10:34:53.885 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-06 10:34:53.885 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-06 10:34:54.123  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-12-06 10:34:54.124  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-12-06 10:34:54.125 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-12-06 10:34:54.125 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-06 10:34:54.129  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-12-06 10:34:54.129  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-12-06 10:34:54.130 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 10:34:54.130 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-06 10:34:54.131 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-06 10:34:54.132 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 10:34:54.133 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-06 10:34:54.134 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-06 10:34:54.135 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 10:34:54.135 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-06 10:34:54.136 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-06 10:34:54.137 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-06 10:34:54.141 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 645495374686812488944236860936252647578807653111 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Dec 06 08:54:18 UTC 2022 Final Date: Sun Dec 05 08:54:17 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fd:9f:b2:9c:11:08:23:d7:12:95:7c:8b:50:5d:a2:33:ea:2a:95:5a],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6d13800af563b2a5b077dd7d7785f973c0868b27 22d0a843f61624516329606b5fea54643a904613 34455e1c42bc6f14b2cfdb7adadcb3a51ebf149d f45eee0482139c08018ba6f2ae11d4538342ea6e 7b7d2c60b08eef33dfb93363109b87a540dc6e8b 988fb6df0b3984f74251f7430d1b14416dce37b6 9cec25f40ea1f71c602560285a27c6e4ca6b525b 1681b1d95642ed59f6e273bda10c83e826d73ea8 0c7ee584586996c344153183fafd97118f251c7c 1aee248f2ee92fd2ed8b3b1db51d37a32a7dcc73 e9807f5da63013971501bd1a0889f76073e48743 d70bca959dd393a892467199f1ce8b2ceb3c50ac 666c1f8226444a1272ae0e018524f2541c10fa1c dff860d83fa760e792a39fae3021940cf43c7af3 abaadeaf61858cde161419d7b6b867a26a70be8a f331a9b230241805d767393dde5f5cdf488e236e 5f1df7c02f64ad75ecbabbbfeaba682e59209750 40bf8950028cd4ae5fc2844486fee91c750af742 25a8522aa4bbd0d964ce78eb49972e1908740c69 daa1d4f6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ed:90:fe:a2:09:ba:ad:b6:0b:8b:fc:cc:10:bd:85:d5:9f:b9:2a:19],[56:66:d1:a4] modulus: c2ed53a0cea65b48fc1ca1f40dd9455eb46e2f801d1a69c4d217e02f3b81b1e9c12b4ca2101abb6b1d655803d3928aafa2a6916ea89f0096c5b8024028487adff8ac35eb9fe9b6b2a11a3380e0529216abc198b3dbb7302e92e5f7463f0aa94a804e33f48a6c0a39f3532af71a62cd241008363490cfeee86b15dbc6eadd5c5dc3ffee91205ff51ba216317c95b49099c0a3bfa0d74f00d36a5884c78f9307cc834db4cba4c8651babc720758c1fa82fe92b1382d280091a23f0ce5297c0bc80e62dc9806391822ca4b5e0e2c3e66b84d7bca038715f0d2adaf554fead1aec42e43c49248b1b206d263042ea603370c459dcfc1c5f8b0c127c0ded03a1c9ea5d public exponent: 10001 ] 2022-12-06 10:36:42.226  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-12-06 10:36:42.227 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-12-06 10:36:42.229 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-12-06 10:36:42.230 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-06 10:36:42.231  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-12-06 10:36:42.232  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-12-06 10:36:42.232  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-12-06 10:36:42.233 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-12-06 10:36:42.234 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-12-06 10:36:42.235 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-12-06 10:36:42.240 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-12-06 10:36:42.240 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-06 10:36:42.240 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-06 10:36:42.241 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-06 10:36:42.393  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-12-06 10:36:42.394  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-12-06 10:36:42.394 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-12-06 10:36:42.394 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-06 10:36:42.397  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-12-06 10:36:42.397  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-12-06 10:36:42.398 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 10:36:42.399 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-06 10:36:42.399 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-06 10:36:42.400 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 10:36:42.400 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-06 10:36:42.401 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-06 10:36:42.401 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 10:36:42.402 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-06 10:36:42.402 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-06 10:36:42.403 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-06 10:36:42.422 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 645495374686812488944236860936252647578807653111 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Dec 06 08:54:18 UTC 2022 Final Date: Sun Dec 05 08:54:17 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fd:9f:b2:9c:11:08:23:d7:12:95:7c:8b:50:5d:a2:33:ea:2a:95:5a],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6d13800af563b2a5b077dd7d7785f973c0868b27 22d0a843f61624516329606b5fea54643a904613 34455e1c42bc6f14b2cfdb7adadcb3a51ebf149d f45eee0482139c08018ba6f2ae11d4538342ea6e 7b7d2c60b08eef33dfb93363109b87a540dc6e8b 988fb6df0b3984f74251f7430d1b14416dce37b6 9cec25f40ea1f71c602560285a27c6e4ca6b525b 1681b1d95642ed59f6e273bda10c83e826d73ea8 0c7ee584586996c344153183fafd97118f251c7c 1aee248f2ee92fd2ed8b3b1db51d37a32a7dcc73 e9807f5da63013971501bd1a0889f76073e48743 d70bca959dd393a892467199f1ce8b2ceb3c50ac 666c1f8226444a1272ae0e018524f2541c10fa1c dff860d83fa760e792a39fae3021940cf43c7af3 abaadeaf61858cde161419d7b6b867a26a70be8a f331a9b230241805d767393dde5f5cdf488e236e 5f1df7c02f64ad75ecbabbbfeaba682e59209750 40bf8950028cd4ae5fc2844486fee91c750af742 25a8522aa4bbd0d964ce78eb49972e1908740c69 daa1d4f6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [5b:91:0f:bb:ff:34:fd:ec:2c:15:61:1b:b6:65:4e:17:f7:d0:bb:20],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-06 10:39:04.643  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-12-06 10:39:04.644 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-12-06 10:39:04.646 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-12-06 10:39:04.646 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-06 10:39:04.647  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-12-06 10:39:04.648  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-12-06 10:39:04.648  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-12-06 10:39:04.648 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-12-06 10:39:04.649 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-12-06 10:39:04.649 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-12-06 10:39:04.653 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-12-06 10:39:04.654 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-06 10:39:04.655 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-06 10:39:04.655 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-06 10:39:04.812  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-12-06 10:39:04.812  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-12-06 10:39:04.813 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-12-06 10:39:04.813 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-06 10:39:04.815  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-12-06 10:39:04.816  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-12-06 10:39:04.817 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 10:39:04.817 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-06 10:39:04.817 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-06 10:39:04.818 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 10:39:04.819 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-06 10:39:04.819 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-06 10:39:04.820 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 10:39:04.820 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-06 10:39:04.821 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-06 10:39:04.822 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-06 10:39:04.825 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 645495374686812488944236860936252647578807653111 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Dec 06 08:54:18 UTC 2022 Final Date: Sun Dec 05 08:54:17 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fd:9f:b2:9c:11:08:23:d7:12:95:7c:8b:50:5d:a2:33:ea:2a:95:5a],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6d13800af563b2a5b077dd7d7785f973c0868b27 22d0a843f61624516329606b5fea54643a904613 34455e1c42bc6f14b2cfdb7adadcb3a51ebf149d f45eee0482139c08018ba6f2ae11d4538342ea6e 7b7d2c60b08eef33dfb93363109b87a540dc6e8b 988fb6df0b3984f74251f7430d1b14416dce37b6 9cec25f40ea1f71c602560285a27c6e4ca6b525b 1681b1d95642ed59f6e273bda10c83e826d73ea8 0c7ee584586996c344153183fafd97118f251c7c 1aee248f2ee92fd2ed8b3b1db51d37a32a7dcc73 e9807f5da63013971501bd1a0889f76073e48743 d70bca959dd393a892467199f1ce8b2ceb3c50ac 666c1f8226444a1272ae0e018524f2541c10fa1c dff860d83fa760e792a39fae3021940cf43c7af3 abaadeaf61858cde161419d7b6b867a26a70be8a f331a9b230241805d767393dde5f5cdf488e236e 5f1df7c02f64ad75ecbabbbfeaba682e59209750 40bf8950028cd4ae5fc2844486fee91c750af742 25a8522aa4bbd0d964ce78eb49972e1908740c69 daa1d4f6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f6:26:56:da:76:7a:af:16:5b:4b:dc:d9:63:c7:8c:67:6f:f8:b2:b7],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-06 10:41:33.433  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-12-06 10:41:33.435 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-12-06 10:41:33.437 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-06 10:41:33.438 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-06 10:41:33.438  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-06 10:41:33.439  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-12-06 10:41:33.440  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-12-06 10:41:33.440 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-12-06 10:41:33.441 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-12-06 10:41:33.441 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-12-06 10:41:33.447 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-12-06 10:41:33.448 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-06 10:41:33.448 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-06 10:41:33.448 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-06 10:41:33.606  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-12-06 10:41:33.607  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-12-06 10:41:33.608 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-12-06 10:41:33.608 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-06 10:41:33.609  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-12-06 10:41:33.610  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-12-06 10:41:33.610 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 10:41:33.610 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-06 10:41:33.611 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-06 10:41:33.611 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 10:41:33.612 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-06 10:41:33.612 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-06 10:41:33.613 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 10:41:33.613 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-06 10:41:33.613 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-06 10:41:33.614 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-06 10:41:33.617 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 645495374686812488944236860936252647578807653111 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Dec 06 08:54:18 UTC 2022 Final Date: Sun Dec 05 08:54:17 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fd:9f:b2:9c:11:08:23:d7:12:95:7c:8b:50:5d:a2:33:ea:2a:95:5a],[56:66:d1:a4] modulus: cb4969c22e25e90607c91391d0d0ef73aaef40cd385a197423aa22f2914659a49b5dc13dee23e5247cff8a15ae589416ced93f116e216010d1e03cae54f1dfed6679935a3a3ac631ea480b05395f4b7fba4217435c5e5ed38412a6bff44127eb3c86b3b2caf4e54621cd9fd2243f19319cca46895fef982c60a234d25785a309cd11c28a9e77f12a6df0d406135847c56a4fe64c5b91f7293be996ea23c77ab39794ceff9b283b5ca1b61691871599f12e9cf9826e2dcb2a0ded0f7ef50e1fe2a04b86072a09ec3fb9720ebc3846bbd4645a7a8e625ad1cccdbf595a7321b99e0dea59f530601e18f59a903692a2602634ee4b7ec256e9ab251f3a2ca19a9013a3cf833ced9dcf4f0daafd50529dd349614fff652eef81b95b7ba9e5aeb31573817fc7c6ded25b7c57c641522af7fcba46f6f7da4c3dee973415d3abf9791d30e9e7c35fefd955dad1c39e6bf19482440c85334247fee96ced2bd79cff9989413ba994de8c86e01658e8bfc35b534f4aa76f3f58e3d15941590c4cacf0acc0d9 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6d13800af563b2a5b077dd7d7785f973c0868b27 22d0a843f61624516329606b5fea54643a904613 34455e1c42bc6f14b2cfdb7adadcb3a51ebf149d f45eee0482139c08018ba6f2ae11d4538342ea6e 7b7d2c60b08eef33dfb93363109b87a540dc6e8b 988fb6df0b3984f74251f7430d1b14416dce37b6 9cec25f40ea1f71c602560285a27c6e4ca6b525b 1681b1d95642ed59f6e273bda10c83e826d73ea8 0c7ee584586996c344153183fafd97118f251c7c 1aee248f2ee92fd2ed8b3b1db51d37a32a7dcc73 e9807f5da63013971501bd1a0889f76073e48743 d70bca959dd393a892467199f1ce8b2ceb3c50ac 666c1f8226444a1272ae0e018524f2541c10fa1c dff860d83fa760e792a39fae3021940cf43c7af3 abaadeaf61858cde161419d7b6b867a26a70be8a f331a9b230241805d767393dde5f5cdf488e236e 5f1df7c02f64ad75ecbabbbfeaba682e59209750 40bf8950028cd4ae5fc2844486fee91c750af742 25a8522aa4bbd0d964ce78eb49972e1908740c69 daa1d4f6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1a:79:8b:0c:af:f5:b6:b1:70:99:55:e9:94:f7:c8:8c:a6:d8:e0:ef],[56:66:d1:a4] modulus: af9bc97d08b29d675641f259ab36feee81ace59ca28128c5dfd06849fe0d9aad1186322d3d9d80571bcb867ce31eaad6907340b97e17992257c98ec10f93529d2e7dbc98288ec157e292bf01b699436d337b65371d133e73af45759104a706185922cb736df1d378244e7dcd4da54a9502533ba94bfde9a7937ab2db3795e8b380d0e610b260e55fa7775052d9cb0a863e63788d98f09886ab49c4141dca8fdd1b813fa206dd17316da90fbecd6bfac18d9ad2232778cd74e8e425c0b79cf18234dd25d29e9680ae59f4ad371fff0aef33dbfd344bdc41cf9b670074084016490683b74b98932f1d8156f1f6d0fde419fc7511b3ad3a02cf635649191b7191f5 public exponent: 10001 ] 2022-12-06 10:49:14.407  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-12-06 10:49:14.410 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-12-06 10:49:14.413 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-06 10:49:14.414 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-06 10:49:14.414  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-06 10:49:14.415  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-12-06 10:49:14.420  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-12-06 10:49:14.420 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-12-06 10:49:14.421 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-12-06 10:49:14.421 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-12-06 10:49:14.427 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-12-06 10:49:14.429 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-06 10:49:14.429 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-06 10:49:14.430 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-06 10:49:14.660  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-12-06 10:49:14.662  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-12-06 10:49:14.662 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-12-06 10:49:14.663 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-06 10:49:14.665  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-12-06 10:49:14.666  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-12-06 10:49:14.666 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 10:49:14.667 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-06 10:49:14.667 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-06 10:49:14.668 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 10:49:14.669 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-06 10:49:14.669 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-06 10:49:14.670 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 10:49:14.670 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-06 10:49:14.670 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-06 10:49:14.671 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-06 10:49:14.675 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 645495374686812488944236860936252647578807653111 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Dec 06 08:54:18 UTC 2022 Final Date: Sun Dec 05 08:54:17 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fd:9f:b2:9c:11:08:23:d7:12:95:7c:8b:50:5d:a2:33:ea:2a:95:5a],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6d13800af563b2a5b077dd7d7785f973c0868b27 22d0a843f61624516329606b5fea54643a904613 34455e1c42bc6f14b2cfdb7adadcb3a51ebf149d f45eee0482139c08018ba6f2ae11d4538342ea6e 7b7d2c60b08eef33dfb93363109b87a540dc6e8b 988fb6df0b3984f74251f7430d1b14416dce37b6 9cec25f40ea1f71c602560285a27c6e4ca6b525b 1681b1d95642ed59f6e273bda10c83e826d73ea8 0c7ee584586996c344153183fafd97118f251c7c 1aee248f2ee92fd2ed8b3b1db51d37a32a7dcc73 e9807f5da63013971501bd1a0889f76073e48743 d70bca959dd393a892467199f1ce8b2ceb3c50ac 666c1f8226444a1272ae0e018524f2541c10fa1c dff860d83fa760e792a39fae3021940cf43c7af3 abaadeaf61858cde161419d7b6b867a26a70be8a f331a9b230241805d767393dde5f5cdf488e236e 5f1df7c02f64ad75ecbabbbfeaba682e59209750 40bf8950028cd4ae5fc2844486fee91c750af742 25a8522aa4bbd0d964ce78eb49972e1908740c69 daa1d4f6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [bf:01:a7:f4:19:23:ea:22:f4:2e:b0:11:98:fb:25:c3:a9:7b:e3:f7],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-06 10:54:49.574  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-12-06 10:54:49.577 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-12-06 10:54:49.580 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-06 10:54:49.581 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-06 10:54:49.581  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-06 10:54:49.582  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-12-06 10:54:49.583  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-12-06 10:54:49.583 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-12-06 10:54:49.584 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-12-06 10:54:49.584 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-12-06 10:54:49.589 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-12-06 10:54:49.590 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-06 10:54:49.590 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-06 10:54:49.590 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-06 10:54:49.752  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-12-06 10:54:49.753  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-12-06 10:54:49.753 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-12-06 10:54:49.753 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-06 10:54:49.755  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-12-06 10:54:49.756  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-12-06 10:54:49.756 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 10:54:49.756 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-06 10:54:49.757 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-06 10:54:49.758 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 10:54:49.758 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-06 10:54:49.759 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-06 10:54:49.760 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 10:54:49.760 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-06 10:54:49.761 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-06 10:54:49.761 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-06 10:54:49.765 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 645495374686812488944236860936252647578807653111 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Dec 06 08:54:18 UTC 2022 Final Date: Sun Dec 05 08:54:17 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fd:9f:b2:9c:11:08:23:d7:12:95:7c:8b:50:5d:a2:33:ea:2a:95:5a],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6d13800af563b2a5b077dd7d7785f973c0868b27 22d0a843f61624516329606b5fea54643a904613 34455e1c42bc6f14b2cfdb7adadcb3a51ebf149d f45eee0482139c08018ba6f2ae11d4538342ea6e 7b7d2c60b08eef33dfb93363109b87a540dc6e8b 988fb6df0b3984f74251f7430d1b14416dce37b6 9cec25f40ea1f71c602560285a27c6e4ca6b525b 1681b1d95642ed59f6e273bda10c83e826d73ea8 0c7ee584586996c344153183fafd97118f251c7c 1aee248f2ee92fd2ed8b3b1db51d37a32a7dcc73 e9807f5da63013971501bd1a0889f76073e48743 d70bca959dd393a892467199f1ce8b2ceb3c50ac 666c1f8226444a1272ae0e018524f2541c10fa1c dff860d83fa760e792a39fae3021940cf43c7af3 abaadeaf61858cde161419d7b6b867a26a70be8a f331a9b230241805d767393dde5f5cdf488e236e 5f1df7c02f64ad75ecbabbbfeaba682e59209750 40bf8950028cd4ae5fc2844486fee91c750af742 25a8522aa4bbd0d964ce78eb49972e1908740c69 daa1d4f6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [76:20:9c:af:f5:4d:97:10:82:7e:b7:3f:aa:5b:92:ab:d0:b0:18:7c],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-06 11:01:30.050  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-12-06 11:01:30.054 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-12-06 11:01:30.057 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-06 11:01:30.060 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-06 11:01:30.060  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-06 11:01:30.061  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-12-06 11:01:30.061  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-12-06 11:01:30.062 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-12-06 11:01:30.062 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-12-06 11:01:30.063 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-12-06 11:01:30.067 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-12-06 11:01:30.068 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-06 11:01:30.068 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-06 11:01:30.069 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-06 11:01:30.256  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-12-06 11:01:30.258  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-12-06 11:01:30.258 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-12-06 11:01:30.258 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-06 11:01:30.260  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-12-06 11:01:30.260  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-12-06 11:01:30.261 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 11:01:30.261 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-06 11:01:30.262 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-06 11:01:30.263 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 11:01:30.263 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-06 11:01:30.263 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-06 11:01:30.264 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 11:01:30.264 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-06 11:01:30.265 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-06 11:01:30.266 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-06 11:01:30.269 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 645495374686812488944236860936252647578807653111 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Dec 06 08:54:18 UTC 2022 Final Date: Sun Dec 05 08:54:17 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fd:9f:b2:9c:11:08:23:d7:12:95:7c:8b:50:5d:a2:33:ea:2a:95:5a],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6d13800af563b2a5b077dd7d7785f973c0868b27 22d0a843f61624516329606b5fea54643a904613 34455e1c42bc6f14b2cfdb7adadcb3a51ebf149d f45eee0482139c08018ba6f2ae11d4538342ea6e 7b7d2c60b08eef33dfb93363109b87a540dc6e8b 988fb6df0b3984f74251f7430d1b14416dce37b6 9cec25f40ea1f71c602560285a27c6e4ca6b525b 1681b1d95642ed59f6e273bda10c83e826d73ea8 0c7ee584586996c344153183fafd97118f251c7c 1aee248f2ee92fd2ed8b3b1db51d37a32a7dcc73 e9807f5da63013971501bd1a0889f76073e48743 d70bca959dd393a892467199f1ce8b2ceb3c50ac 666c1f8226444a1272ae0e018524f2541c10fa1c dff860d83fa760e792a39fae3021940cf43c7af3 abaadeaf61858cde161419d7b6b867a26a70be8a f331a9b230241805d767393dde5f5cdf488e236e 5f1df7c02f64ad75ecbabbbfeaba682e59209750 40bf8950028cd4ae5fc2844486fee91c750af742 25a8522aa4bbd0d964ce78eb49972e1908740c69 daa1d4f6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [16:d3:ff:c6:b9:66:96:fa:64:5b:5d:a7:dd:95:be:c9:73:af:78:16],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-06 11:07:12.858  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-12-06 11:07:12.861 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-12-06 11:07:12.863 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-06 11:07:12.864 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-06 11:07:12.864  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-06 11:07:12.865  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-12-06 11:07:12.865  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-12-06 11:07:12.866 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-12-06 11:07:12.866 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-12-06 11:07:12.867 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-12-06 11:07:12.870 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-12-06 11:07:12.871 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-06 11:07:12.872 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-06 11:07:12.872 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-06 11:07:12.994  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-12-06 11:07:12.995  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-12-06 11:07:12.995 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-12-06 11:07:12.996 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-06 11:07:12.997  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-12-06 11:07:12.997  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-12-06 11:07:12.998 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 11:07:12.998 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-06 11:07:12.998 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-06 11:07:12.999 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 11:07:12.999 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-06 11:07:13.000 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-06 11:07:13.000 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 11:07:13.001 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-06 11:07:13.001 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-06 11:07:13.002 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-06 11:07:13.005 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 645495374686812488944236860936252647578807653111 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Dec 06 08:54:18 UTC 2022 Final Date: Sun Dec 05 08:54:17 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fd:9f:b2:9c:11:08:23:d7:12:95:7c:8b:50:5d:a2:33:ea:2a:95:5a],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6d13800af563b2a5b077dd7d7785f973c0868b27 22d0a843f61624516329606b5fea54643a904613 34455e1c42bc6f14b2cfdb7adadcb3a51ebf149d f45eee0482139c08018ba6f2ae11d4538342ea6e 7b7d2c60b08eef33dfb93363109b87a540dc6e8b 988fb6df0b3984f74251f7430d1b14416dce37b6 9cec25f40ea1f71c602560285a27c6e4ca6b525b 1681b1d95642ed59f6e273bda10c83e826d73ea8 0c7ee584586996c344153183fafd97118f251c7c 1aee248f2ee92fd2ed8b3b1db51d37a32a7dcc73 e9807f5da63013971501bd1a0889f76073e48743 d70bca959dd393a892467199f1ce8b2ceb3c50ac 666c1f8226444a1272ae0e018524f2541c10fa1c dff860d83fa760e792a39fae3021940cf43c7af3 abaadeaf61858cde161419d7b6b867a26a70be8a f331a9b230241805d767393dde5f5cdf488e236e 5f1df7c02f64ad75ecbabbbfeaba682e59209750 40bf8950028cd4ae5fc2844486fee91c750af742 25a8522aa4bbd0d964ce78eb49972e1908740c69 daa1d4f6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ef:65:ae:30:7e:7e:a4:29:6b:ec:39:dc:f3:94:c0:d4:2d:41:3f:6d],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-06 11:14:21.506  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-12-06 11:14:21.509 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-12-06 11:14:21.511 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-12-06 11:14:21.512 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-06 11:14:21.512  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-12-06 11:14:21.513  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-12-06 11:14:21.513  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-12-06 11:14:21.514 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-12-06 11:14:21.514 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-12-06 11:14:21.515 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-12-06 11:14:21.519 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-12-06 11:14:21.520 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-06 11:14:21.521 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-06 11:14:21.521 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-06 11:14:21.801  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-12-06 11:14:21.802  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-12-06 11:14:21.802 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-12-06 11:14:21.802 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-06 11:14:21.803  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-12-06 11:14:21.804  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-12-06 11:14:21.804 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 11:14:21.805 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-06 11:14:21.805 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-06 11:14:21.806 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 11:14:21.806 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-06 11:14:21.806 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-06 11:14:21.807 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 11:14:21.807 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-06 11:14:21.807 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-06 11:14:21.808 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-06 11:14:21.812 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 645495374686812488944236860936252647578807653111 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Dec 06 08:54:18 UTC 2022 Final Date: Sun Dec 05 08:54:17 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fd:9f:b2:9c:11:08:23:d7:12:95:7c:8b:50:5d:a2:33:ea:2a:95:5a],[56:66:d1:a4] modulus: cb4969c22e25e90607c91391d0d0ef73aaef40cd385a197423aa22f2914659a49b5dc13dee23e5247cff8a15ae589416ced93f116e216010d1e03cae54f1dfed6679935a3a3ac631ea480b05395f4b7fba4217435c5e5ed38412a6bff44127eb3c86b3b2caf4e54621cd9fd2243f19319cca46895fef982c60a234d25785a309cd11c28a9e77f12a6df0d406135847c56a4fe64c5b91f7293be996ea23c77ab39794ceff9b283b5ca1b61691871599f12e9cf9826e2dcb2a0ded0f7ef50e1fe2a04b86072a09ec3fb9720ebc3846bbd4645a7a8e625ad1cccdbf595a7321b99e0dea59f530601e18f59a903692a2602634ee4b7ec256e9ab251f3a2ca19a9013a3cf833ced9dcf4f0daafd50529dd349614fff652eef81b95b7ba9e5aeb31573817fc7c6ded25b7c57c641522af7fcba46f6f7da4c3dee973415d3abf9791d30e9e7c35fefd955dad1c39e6bf19482440c85334247fee96ced2bd79cff9989413ba994de8c86e01658e8bfc35b534f4aa76f3f58e3d15941590c4cacf0acc0d9 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6d13800af563b2a5b077dd7d7785f973c0868b27 22d0a843f61624516329606b5fea54643a904613 34455e1c42bc6f14b2cfdb7adadcb3a51ebf149d f45eee0482139c08018ba6f2ae11d4538342ea6e 7b7d2c60b08eef33dfb93363109b87a540dc6e8b 988fb6df0b3984f74251f7430d1b14416dce37b6 9cec25f40ea1f71c602560285a27c6e4ca6b525b 1681b1d95642ed59f6e273bda10c83e826d73ea8 0c7ee584586996c344153183fafd97118f251c7c 1aee248f2ee92fd2ed8b3b1db51d37a32a7dcc73 e9807f5da63013971501bd1a0889f76073e48743 d70bca959dd393a892467199f1ce8b2ceb3c50ac 666c1f8226444a1272ae0e018524f2541c10fa1c dff860d83fa760e792a39fae3021940cf43c7af3 abaadeaf61858cde161419d7b6b867a26a70be8a f331a9b230241805d767393dde5f5cdf488e236e 5f1df7c02f64ad75ecbabbbfeaba682e59209750 40bf8950028cd4ae5fc2844486fee91c750af742 25a8522aa4bbd0d964ce78eb49972e1908740c69 daa1d4f6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [92:e1:78:12:25:9b:53:b4:06:6f:90:7b:89:43:2d:2c:6a:c6:61:fa],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-06 11:21:20.761  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-12-06 11:21:20.763 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-12-06 11:21:20.765 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-12-06 11:21:20.766 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-06 11:21:20.767  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-12-06 11:21:20.767  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-12-06 11:21:20.768  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-12-06 11:21:20.768 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-12-06 11:21:20.768 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-12-06 11:21:20.769 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-12-06 11:21:20.773 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-12-06 11:21:20.773 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-06 11:21:20.774 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-06 11:21:20.774 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-06 11:21:20.970  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-12-06 11:21:20.971  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-12-06 11:21:20.971 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-12-06 11:21:20.971 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-06 11:21:20.973  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-12-06 11:21:20.973  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-12-06 11:21:20.973 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 11:21:20.973 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-06 11:21:20.974 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-06 11:21:20.974 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 11:21:20.975 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-06 11:21:20.975 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-06 11:21:20.975 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 11:21:20.976 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-06 11:21:20.976 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-06 11:21:20.977 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-06 11:21:20.980 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 645495374686812488944236860936252647578807653111 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Dec 06 08:54:18 UTC 2022 Final Date: Sun Dec 05 08:54:17 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fd:9f:b2:9c:11:08:23:d7:12:95:7c:8b:50:5d:a2:33:ea:2a:95:5a],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6d13800af563b2a5b077dd7d7785f973c0868b27 22d0a843f61624516329606b5fea54643a904613 34455e1c42bc6f14b2cfdb7adadcb3a51ebf149d f45eee0482139c08018ba6f2ae11d4538342ea6e 7b7d2c60b08eef33dfb93363109b87a540dc6e8b 988fb6df0b3984f74251f7430d1b14416dce37b6 9cec25f40ea1f71c602560285a27c6e4ca6b525b 1681b1d95642ed59f6e273bda10c83e826d73ea8 0c7ee584586996c344153183fafd97118f251c7c 1aee248f2ee92fd2ed8b3b1db51d37a32a7dcc73 e9807f5da63013971501bd1a0889f76073e48743 d70bca959dd393a892467199f1ce8b2ceb3c50ac 666c1f8226444a1272ae0e018524f2541c10fa1c dff860d83fa760e792a39fae3021940cf43c7af3 abaadeaf61858cde161419d7b6b867a26a70be8a f331a9b230241805d767393dde5f5cdf488e236e 5f1df7c02f64ad75ecbabbbfeaba682e59209750 40bf8950028cd4ae5fc2844486fee91c750af742 25a8522aa4bbd0d964ce78eb49972e1908740c69 daa1d4f6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [bb:57:b6:7b:d2:86:6e:ed:9f:1c:de:bf:2e:d8:8b:90:e5:0b:d8:c5],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-06 11:21:37.627  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-12-06 11:21:37.628 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-12-06 11:21:37.629 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-12-06 11:21:37.630 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-06 11:21:37.633  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-12-06 11:21:37.633  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-12-06 11:21:37.634  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-12-06 11:21:37.634 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-12-06 11:21:37.634 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-12-06 11:21:37.635 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-12-06 11:21:37.638 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-12-06 11:21:37.639 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-06 11:21:37.639 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-06 11:21:37.639 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-06 11:21:37.760  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-12-06 11:21:37.760  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-12-06 11:21:37.761 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-12-06 11:21:37.761 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-06 11:21:37.762  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-12-06 11:21:37.763  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-12-06 11:21:37.763 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 11:21:37.763 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-06 11:21:37.763 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-06 11:21:37.764 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 11:21:37.764 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-06 11:21:37.765 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-06 11:21:37.765 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 11:21:37.766 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-06 11:21:37.766 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-06 11:21:37.767 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-06 11:21:37.770 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 645495374686812488944236860936252647578807653111 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Dec 06 08:54:18 UTC 2022 Final Date: Sun Dec 05 08:54:17 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fd:9f:b2:9c:11:08:23:d7:12:95:7c:8b:50:5d:a2:33:ea:2a:95:5a],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6d13800af563b2a5b077dd7d7785f973c0868b27 22d0a843f61624516329606b5fea54643a904613 34455e1c42bc6f14b2cfdb7adadcb3a51ebf149d f45eee0482139c08018ba6f2ae11d4538342ea6e 7b7d2c60b08eef33dfb93363109b87a540dc6e8b 988fb6df0b3984f74251f7430d1b14416dce37b6 9cec25f40ea1f71c602560285a27c6e4ca6b525b 1681b1d95642ed59f6e273bda10c83e826d73ea8 0c7ee584586996c344153183fafd97118f251c7c 1aee248f2ee92fd2ed8b3b1db51d37a32a7dcc73 e9807f5da63013971501bd1a0889f76073e48743 d70bca959dd393a892467199f1ce8b2ceb3c50ac 666c1f8226444a1272ae0e018524f2541c10fa1c dff860d83fa760e792a39fae3021940cf43c7af3 abaadeaf61858cde161419d7b6b867a26a70be8a f331a9b230241805d767393dde5f5cdf488e236e 5f1df7c02f64ad75ecbabbbfeaba682e59209750 40bf8950028cd4ae5fc2844486fee91c750af742 25a8522aa4bbd0d964ce78eb49972e1908740c69 daa1d4f6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a2:cf:52:1f:f3:88:3f:bb:e9:f2:16:06:2e:f3:2f:72:df:9a:c0:3f],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-06 11:45:48.444  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-12-06 11:45:48.447 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-12-06 11:45:48.449 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-12-06 11:45:48.450 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-06 11:45:48.450  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-12-06 11:45:48.451  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-12-06 11:45:48.451  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-12-06 11:45:48.451 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-12-06 11:45:48.452 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-12-06 11:45:48.452 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-12-06 11:45:48.456 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-12-06 11:45:48.458 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-06 11:45:48.458 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-06 11:45:48.458 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-06 11:45:48.639  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-12-06 11:45:48.640  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-12-06 11:45:48.640 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-12-06 11:45:48.641 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-06 11:45:48.642  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-12-06 11:45:48.642  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-12-06 11:45:48.642 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 11:45:48.643 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-06 11:45:48.643 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-06 11:45:48.644 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 11:45:48.644 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-06 11:45:48.644 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-06 11:45:48.645 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 11:45:48.645 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-06 11:45:48.645 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-06 11:45:48.646 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-06 11:45:48.649 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 645495374686812488944236860936252647578807653111 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Dec 06 08:54:18 UTC 2022 Final Date: Sun Dec 05 08:54:17 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fd:9f:b2:9c:11:08:23:d7:12:95:7c:8b:50:5d:a2:33:ea:2a:95:5a],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6d13800af563b2a5b077dd7d7785f973c0868b27 22d0a843f61624516329606b5fea54643a904613 34455e1c42bc6f14b2cfdb7adadcb3a51ebf149d f45eee0482139c08018ba6f2ae11d4538342ea6e 7b7d2c60b08eef33dfb93363109b87a540dc6e8b 988fb6df0b3984f74251f7430d1b14416dce37b6 9cec25f40ea1f71c602560285a27c6e4ca6b525b 1681b1d95642ed59f6e273bda10c83e826d73ea8 0c7ee584586996c344153183fafd97118f251c7c 1aee248f2ee92fd2ed8b3b1db51d37a32a7dcc73 e9807f5da63013971501bd1a0889f76073e48743 d70bca959dd393a892467199f1ce8b2ceb3c50ac 666c1f8226444a1272ae0e018524f2541c10fa1c dff860d83fa760e792a39fae3021940cf43c7af3 abaadeaf61858cde161419d7b6b867a26a70be8a f331a9b230241805d767393dde5f5cdf488e236e 5f1df7c02f64ad75ecbabbbfeaba682e59209750 40bf8950028cd4ae5fc2844486fee91c750af742 25a8522aa4bbd0d964ce78eb49972e1908740c69 daa1d4f6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8c:f8:0e:31:f9:50:76:cd:c4:7b:3a:7b:24:ba:f9:ed:36:b2:5a:29],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-06 11:45:53.348  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-12-06 11:45:53.349 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-12-06 11:45:53.350 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-12-06 11:45:53.352 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-06 11:45:53.353  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-12-06 11:45:53.354  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-12-06 11:45:53.354  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-12-06 11:45:53.354 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-12-06 11:45:53.355 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-12-06 11:45:53.355 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-12-06 11:45:53.359 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-12-06 11:45:53.359 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-06 11:45:53.359 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-06 11:45:53.360 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-06 11:45:53.467  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-12-06 11:45:53.468  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-12-06 11:45:53.468 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-12-06 11:45:53.468 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-06 11:45:53.470  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-12-06 11:45:53.470  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-12-06 11:45:53.470 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 11:45:53.471 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-06 11:45:53.471 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-06 11:45:53.472 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 11:45:53.472 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-06 11:45:53.472 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-06 11:45:53.473 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-06 11:45:53.473 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-06 11:45:53.474 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-06 11:45:53.474 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-06 11:45:53.477 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 645495374686812488944236860936252647578807653111 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Tue Dec 06 08:54:18 UTC 2022 Final Date: Sun Dec 05 08:54:17 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [fd:9f:b2:9c:11:08:23:d7:12:95:7c:8b:50:5d:a2:33:ea:2a:95:5a],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 6d13800af563b2a5b077dd7d7785f973c0868b27 22d0a843f61624516329606b5fea54643a904613 34455e1c42bc6f14b2cfdb7adadcb3a51ebf149d f45eee0482139c08018ba6f2ae11d4538342ea6e 7b7d2c60b08eef33dfb93363109b87a540dc6e8b 988fb6df0b3984f74251f7430d1b14416dce37b6 9cec25f40ea1f71c602560285a27c6e4ca6b525b 1681b1d95642ed59f6e273bda10c83e826d73ea8 0c7ee584586996c344153183fafd97118f251c7c 1aee248f2ee92fd2ed8b3b1db51d37a32a7dcc73 e9807f5da63013971501bd1a0889f76073e48743 d70bca959dd393a892467199f1ce8b2ceb3c50ac 666c1f8226444a1272ae0e018524f2541c10fa1c dff860d83fa760e792a39fae3021940cf43c7af3 abaadeaf61858cde161419d7b6b867a26a70be8a f331a9b230241805d767393dde5f5cdf488e236e 5f1df7c02f64ad75ecbabbbfeaba682e59209750 40bf8950028cd4ae5fc2844486fee91c750af742 25a8522aa4bbd0d964ce78eb49972e1908740c69 daa1d4f6 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [00:57:d1:a9:88:3f:f2:bb:d6:6e:a4:49:f5:83:10:10:4e:c7:7f:f9],[56:66:d1:a4] modulus: ba2a2b6db843611d81d45384ecf98fe4544a3f48335b8aa4f52e7b0b829daea737806edde04f693e938e2a495f999203118d1be104836ce4773e5de5997d56dadba70f21a8249c40faf2c5c3af1940e48e115c772ccf18586f2e0c0233b05b939060fe2534bb5755d5bd4870ebc316876753601bbe57fc54b6c729c2e1e830fd52cb5c88ac781ecf4b5f0c6bb4de732e2552c1bf3418ee3b97c16b57c0790b6d90d3135f0cfdd05a2c1a45c4c764b59fc3058fce14b1e825dc4cd142f4ac685cf202078e3f02dd4566e314af406b3388d43aeb8d146f19b9930bd4ed11649e866f15ef26d7219d9e7eaa4d1d3f17638230562da97febf4bcff084d6e1d9f1b49 public exponent: 10001 ]