2022-12-31 05:10:36,578 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-12-31 05:10:37,521 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-12-31 05:10:38.145  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Dec 31, 2022 5:10:39 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Dec 31, 2022 5:10:39 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Dec 31, 2022 5:10:39 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Dec 31, 2022 5:10:40 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-12-31 05:10:40.525 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-12-31 05:10:40.790  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-12-31 05:10:40.941  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-12-31 05:10:41.621 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-12-31 05:10:41.623 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2022-12-31 05:10:41.624 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-12-31 05:10:41.628 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-12-31 05:10:41.663 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-12-31 05:10:41.666 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-12-31 05:10:41.775 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-12-31 05:10:42.344 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Dec 31, 2022 5:10:42 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-12-31 05:10:43.185  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 7.452 seconds (JVM running for 10.861) Dec 31, 2022 5:11:08 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-12-31 05:11:35.685  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-12-31 05:11:35.694 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-12-31 05:11:35.737 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-12-31 05:11:35.743 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-31 05:11:35.758  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-12-31 05:11:35.760  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-12-31 05:11:35.761  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-12-31 05:11:35.763 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-12-31 05:11:35.763 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-31 05:11:35.767 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-12-31 05:11:35.777 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-12-31 05:11:35.781 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-12-31 05:11:35.838 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-12-31 05:11:35.845 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-31 05:11:35.845 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-31 05:11:35.849 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-31 05:11:36.792  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-12-31 05:11:36.795  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-12-31 05:11:36.796 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-12-31 05:11:36.797 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-31 05:11:36.807  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-12-31 05:11:36.807  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-12-31 05:11:36.808 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-31 05:11:36.808 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-31 05:11:36.809 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-31 05:11:36.828 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-31 05:11:36.829 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-31 05:11:36.829 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-31 05:11:36.835 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-31 05:11:36.835 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-31 05:11:36.836 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-31 05:11:36.837 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-31 05:11:36.869 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 724087533821643754888546544499066089387517088836 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Dec 31 05:02:00 UTC 2022 Final Date: Thu Dec 30 05:01:59 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ac:c9:8c:6e:2b:4d:9a:69:1d:d5:22:55:c2:78:ce:a8:40:de:08:0d],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1df37b807ed694b5bd070f70e974eff3c7d93870 31248dabfe97304328917ec45a71e9897820c487 966bbcce479103418e8fba2ecea22bc8fcfac1b3 2a0571fe9c77c86975fa236c1cea1334522b5578 7b671686c6254995027e3187e3e83859c1300314 23568ccd514062caaec5c3752f1366c0e53c5e12 5161554be791297df34a5efe4829b8f43744a004 d081fe50eed3217309f7c37dd7747bc506395f16 2cd45a7230fb81d6cf0612c0952f78362a345866 54584133bfec2750032eec01925b3d85a8ff46b6 86854df3ee7f42ca3067fcc75a0336e1945cf9aa bcf0a1fe9d941c068ce30a67ecbadf1e8b60085a 55a70b20a3b383802d2ef85f38ce1744c8fdd056 9f9cd2870f049d5eea864746f214a22780a20eee 206b0bf28dd23f03f4122f4515b491395fa6f237 a41e7ca02e3663ace42f5c1c21bde0ce3e188596 27b6476a343363ae0e2793d45c2606a5ca5519ef ed86e0b4148438475015f0b42acbc1d3cc8ffa9f 240c9229b352a9eb0ff3a3bc17099dd0f74985a8 5d8a4a96 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d6:44:a7:ce:f3:b9:26:97:95:61:2c:46:ed:b7:06:e3:64:8e:51:e1],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-31 06:50:22.717  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-12-31 06:50:22.722 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-12-31 06:50:22.726 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-31 06:50:22.728 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-31 06:50:22.728  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-31 06:50:22.729  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-12-31 06:50:22.730  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-12-31 06:50:22.730 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-12-31 06:50:22.731 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-12-31 06:50:22.732 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-12-31 06:50:22.744 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-12-31 06:50:22.746 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-31 06:50:22.747 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-31 06:50:22.747 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-31 06:50:23.111  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-12-31 06:50:23.112  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-12-31 06:50:23.112 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-12-31 06:50:23.112 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-31 06:50:23.115  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-12-31 06:50:23.116  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-12-31 06:50:23.116 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-31 06:50:23.117 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-31 06:50:23.117 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-31 06:50:23.119 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-31 06:50:23.119 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-31 06:50:23.119 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-31 06:50:23.120 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-31 06:50:23.121 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-31 06:50:23.121 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-31 06:50:23.122 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-31 06:50:23.127 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 724087533821643754888546544499066089387517088836 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Dec 31 05:02:00 UTC 2022 Final Date: Thu Dec 30 05:01:59 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ac:c9:8c:6e:2b:4d:9a:69:1d:d5:22:55:c2:78:ce:a8:40:de:08:0d],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1df37b807ed694b5bd070f70e974eff3c7d93870 31248dabfe97304328917ec45a71e9897820c487 966bbcce479103418e8fba2ecea22bc8fcfac1b3 2a0571fe9c77c86975fa236c1cea1334522b5578 7b671686c6254995027e3187e3e83859c1300314 23568ccd514062caaec5c3752f1366c0e53c5e12 5161554be791297df34a5efe4829b8f43744a004 d081fe50eed3217309f7c37dd7747bc506395f16 2cd45a7230fb81d6cf0612c0952f78362a345866 54584133bfec2750032eec01925b3d85a8ff46b6 86854df3ee7f42ca3067fcc75a0336e1945cf9aa bcf0a1fe9d941c068ce30a67ecbadf1e8b60085a 55a70b20a3b383802d2ef85f38ce1744c8fdd056 9f9cd2870f049d5eea864746f214a22780a20eee 206b0bf28dd23f03f4122f4515b491395fa6f237 a41e7ca02e3663ace42f5c1c21bde0ce3e188596 27b6476a343363ae0e2793d45c2606a5ca5519ef ed86e0b4148438475015f0b42acbc1d3cc8ffa9f 240c9229b352a9eb0ff3a3bc17099dd0f74985a8 5d8a4a96 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f3:7a:cb:53:e2:1d:75:d3:04:58:76:b6:4a:38:60:24:12:41:01:c4],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-31 06:52:25.861  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-12-31 06:52:25.862 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-12-31 06:52:25.864 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-12-31 06:52:25.865 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-31 06:52:25.866  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-12-31 06:52:25.867  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-12-31 06:52:25.867  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-12-31 06:52:25.868 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-12-31 06:52:25.868 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-12-31 06:52:25.869 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-12-31 06:52:25.875 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-12-31 06:52:25.875 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-31 06:52:25.876 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-31 06:52:25.876 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-31 06:52:26.042  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-12-31 06:52:26.043  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-12-31 06:52:26.043 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-12-31 06:52:26.044 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-31 06:52:26.047  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-12-31 06:52:26.047  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-12-31 06:52:26.048 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-31 06:52:26.049 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-31 06:52:26.049 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-31 06:52:26.050 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-31 06:52:26.051 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-31 06:52:26.052 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-31 06:52:26.053 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-31 06:52:26.055 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-31 06:52:26.055 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-31 06:52:26.058 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-31 06:52:26.065 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 724087533821643754888546544499066089387517088836 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Dec 31 05:02:00 UTC 2022 Final Date: Thu Dec 30 05:01:59 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ac:c9:8c:6e:2b:4d:9a:69:1d:d5:22:55:c2:78:ce:a8:40:de:08:0d],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1df37b807ed694b5bd070f70e974eff3c7d93870 31248dabfe97304328917ec45a71e9897820c487 966bbcce479103418e8fba2ecea22bc8fcfac1b3 2a0571fe9c77c86975fa236c1cea1334522b5578 7b671686c6254995027e3187e3e83859c1300314 23568ccd514062caaec5c3752f1366c0e53c5e12 5161554be791297df34a5efe4829b8f43744a004 d081fe50eed3217309f7c37dd7747bc506395f16 2cd45a7230fb81d6cf0612c0952f78362a345866 54584133bfec2750032eec01925b3d85a8ff46b6 86854df3ee7f42ca3067fcc75a0336e1945cf9aa bcf0a1fe9d941c068ce30a67ecbadf1e8b60085a 55a70b20a3b383802d2ef85f38ce1744c8fdd056 9f9cd2870f049d5eea864746f214a22780a20eee 206b0bf28dd23f03f4122f4515b491395fa6f237 a41e7ca02e3663ace42f5c1c21bde0ce3e188596 27b6476a343363ae0e2793d45c2606a5ca5519ef ed86e0b4148438475015f0b42acbc1d3cc8ffa9f 240c9229b352a9eb0ff3a3bc17099dd0f74985a8 5d8a4a96 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d6:87:ca:59:5b:ee:c1:ac:9b:00:88:38:5e:6c:b6:f1:5c:52:30:0e],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-31 06:54:26.819  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-12-31 06:54:26.821 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-12-31 06:54:26.822 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-12-31 06:54:26.823 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-31 06:54:26.824  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-12-31 06:54:26.825  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-12-31 06:54:26.825  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-12-31 06:54:26.826 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-12-31 06:54:26.827 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-12-31 06:54:26.828 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-12-31 06:54:26.835 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-12-31 06:54:26.835 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-31 06:54:26.836 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-31 06:54:26.836 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-31 06:54:27.123  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-12-31 06:54:27.123  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-12-31 06:54:27.124 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-12-31 06:54:27.124 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-31 06:54:27.126  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-12-31 06:54:27.126  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-12-31 06:54:27.127 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-31 06:54:27.127 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-31 06:54:27.127 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-31 06:54:27.128 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-31 06:54:27.128 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-31 06:54:27.128 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-31 06:54:27.129 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-31 06:54:27.129 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-31 06:54:27.130 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-31 06:54:27.130 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-31 06:54:27.138 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 724087533821643754888546544499066089387517088836 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Dec 31 05:02:00 UTC 2022 Final Date: Thu Dec 30 05:01:59 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ac:c9:8c:6e:2b:4d:9a:69:1d:d5:22:55:c2:78:ce:a8:40:de:08:0d],[56:66:d1:a4] modulus: e64edb56f7daf56c2284c094aca8922de41d15ac8b9469403728b674597f4fdfbc235985b8cb0efe88650510da8544bc43e77ef6ff952c2de72e1c3a8df2f7a845933ff4268c09439ae9ec6806a5c146becdde6a69a768250c10aa96eba1f5b0f9819f0846d78599ef031ab83e107139f60d7aacc96bd87f8f1f3443b2152a77e7994f4d47a173efce38e1d4c2db8da528e9913fe420de7c6239620764fdb37d36877a9ccb584b08749298f315e9a9b6d0f4e2efe4bdebfaefd2a4925fd2b80d9b2808355531596496168acefc511208d4b88ae5c0569c1e65b00bdf0c0281cd51f919b61b280a6d0fa56399fe1499a6b431788debd036e8162e9725452c1765156e280ee131cc7978657f0edaded7945cd3f40543effb5adc3728e58dc3e83230794b18f094d1bcf91c68f4c700f1ef764820ac11c1dfc7bbb5343282414781801e321e7b7703c1da18d9077f08e1b31cd000778293147f82783738f0a08e0efa1ce749f0756268d29a12d50d9ab112e780f5b9f620816ed3f01f064d8f1279 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1df37b807ed694b5bd070f70e974eff3c7d93870 31248dabfe97304328917ec45a71e9897820c487 966bbcce479103418e8fba2ecea22bc8fcfac1b3 2a0571fe9c77c86975fa236c1cea1334522b5578 7b671686c6254995027e3187e3e83859c1300314 23568ccd514062caaec5c3752f1366c0e53c5e12 5161554be791297df34a5efe4829b8f43744a004 d081fe50eed3217309f7c37dd7747bc506395f16 2cd45a7230fb81d6cf0612c0952f78362a345866 54584133bfec2750032eec01925b3d85a8ff46b6 86854df3ee7f42ca3067fcc75a0336e1945cf9aa bcf0a1fe9d941c068ce30a67ecbadf1e8b60085a 55a70b20a3b383802d2ef85f38ce1744c8fdd056 9f9cd2870f049d5eea864746f214a22780a20eee 206b0bf28dd23f03f4122f4515b491395fa6f237 a41e7ca02e3663ace42f5c1c21bde0ce3e188596 27b6476a343363ae0e2793d45c2606a5ca5519ef ed86e0b4148438475015f0b42acbc1d3cc8ffa9f 240c9229b352a9eb0ff3a3bc17099dd0f74985a8 5d8a4a96 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [75:1d:5b:08:d4:a9:88:e6:27:a2:24:c4:c1:9d:e0:ba:4e:f0:5c:88],[56:66:d1:a4] modulus: b9714558bbd359a4f92fcf6434a2c098e8c39c2909e64aa31a3032be5f7df1f33f742698e7ad93cec357cbda1d4fa4a471f8162f0a6b8e9973f6c7e991d7644eca4e1e29e581d6631b12a184a500487dace623ca87651b06034986157e06d898d4387d4e434b24e10b38d6a28edf2a8db3d4a33dc1663c1d5f59309714c1d1dd1913b2d1bc16fc595399c1bdec76424c0252cec30470efbd0689412b8fd7a44e84f1996e34b2fba3e22e78266b6d06e39535cc2b191201123a43f55f3ad171c11e226104288cc087cd2afe057ef17af48247ead33a3250670a30e528c78b9088e99d31d67e0412e4c2aabe867bde067366717684f645705022a049043268dcaf public exponent: 10001 ] 2022-12-31 06:57:38.668  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-12-31 06:57:38.671 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-12-31 06:57:38.674 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-31 06:57:38.675 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-31 06:57:38.676  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-31 06:57:38.677  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-12-31 06:57:38.677  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-12-31 06:57:38.678 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-12-31 06:57:38.679 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-12-31 06:57:38.679 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-12-31 06:57:38.684 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-12-31 06:57:38.685 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-31 06:57:38.686 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-31 06:57:38.686 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-31 06:57:39.064  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-12-31 06:57:39.065  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-12-31 06:57:39.065 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-12-31 06:57:39.066 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-31 06:57:39.068  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-12-31 06:57:39.068  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-12-31 06:57:39.069 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-31 06:57:39.069 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-31 06:57:39.069 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-31 06:57:39.071 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-31 06:57:39.071 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-31 06:57:39.071 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-31 06:57:39.072 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-31 06:57:39.073 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-31 06:57:39.073 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-31 06:57:39.074 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-31 06:57:39.077 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 724087533821643754888546544499066089387517088836 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Dec 31 05:02:00 UTC 2022 Final Date: Thu Dec 30 05:01:59 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ac:c9:8c:6e:2b:4d:9a:69:1d:d5:22:55:c2:78:ce:a8:40:de:08:0d],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1df37b807ed694b5bd070f70e974eff3c7d93870 31248dabfe97304328917ec45a71e9897820c487 966bbcce479103418e8fba2ecea22bc8fcfac1b3 2a0571fe9c77c86975fa236c1cea1334522b5578 7b671686c6254995027e3187e3e83859c1300314 23568ccd514062caaec5c3752f1366c0e53c5e12 5161554be791297df34a5efe4829b8f43744a004 d081fe50eed3217309f7c37dd7747bc506395f16 2cd45a7230fb81d6cf0612c0952f78362a345866 54584133bfec2750032eec01925b3d85a8ff46b6 86854df3ee7f42ca3067fcc75a0336e1945cf9aa bcf0a1fe9d941c068ce30a67ecbadf1e8b60085a 55a70b20a3b383802d2ef85f38ce1744c8fdd056 9f9cd2870f049d5eea864746f214a22780a20eee 206b0bf28dd23f03f4122f4515b491395fa6f237 a41e7ca02e3663ace42f5c1c21bde0ce3e188596 27b6476a343363ae0e2793d45c2606a5ca5519ef ed86e0b4148438475015f0b42acbc1d3cc8ffa9f 240c9229b352a9eb0ff3a3bc17099dd0f74985a8 5d8a4a96 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [57:dd:87:43:5a:6a:37:5b:8b:a5:e7:b2:b0:9c:9a:b9:f2:6a:33:f8],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-31 07:05:24.614  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-12-31 07:05:24.617 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-12-31 07:05:24.631 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-31 07:05:24.632 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-31 07:05:24.633  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-31 07:05:24.633  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-12-31 07:05:24.634  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-12-31 07:05:24.634 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-12-31 07:05:24.635 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-12-31 07:05:24.636 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-12-31 07:05:24.641 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-12-31 07:05:24.642 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-31 07:05:24.642 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-31 07:05:24.642 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-31 07:05:24.852  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-12-31 07:05:24.853  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-12-31 07:05:24.853 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-12-31 07:05:24.853 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-31 07:05:24.856  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-12-31 07:05:24.857  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-12-31 07:05:24.858 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-31 07:05:24.858 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-31 07:05:24.864 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-31 07:05:24.864 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-31 07:05:24.865 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-31 07:05:24.865 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-31 07:05:24.866 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-31 07:05:24.866 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-31 07:05:24.866 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-31 07:05:24.867 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-31 07:05:24.871 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 724087533821643754888546544499066089387517088836 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Dec 31 05:02:00 UTC 2022 Final Date: Thu Dec 30 05:01:59 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ac:c9:8c:6e:2b:4d:9a:69:1d:d5:22:55:c2:78:ce:a8:40:de:08:0d],[56:66:d1:a4] modulus: e64edb56f7daf56c2284c094aca8922de41d15ac8b9469403728b674597f4fdfbc235985b8cb0efe88650510da8544bc43e77ef6ff952c2de72e1c3a8df2f7a845933ff4268c09439ae9ec6806a5c146becdde6a69a768250c10aa96eba1f5b0f9819f0846d78599ef031ab83e107139f60d7aacc96bd87f8f1f3443b2152a77e7994f4d47a173efce38e1d4c2db8da528e9913fe420de7c6239620764fdb37d36877a9ccb584b08749298f315e9a9b6d0f4e2efe4bdebfaefd2a4925fd2b80d9b2808355531596496168acefc511208d4b88ae5c0569c1e65b00bdf0c0281cd51f919b61b280a6d0fa56399fe1499a6b431788debd036e8162e9725452c1765156e280ee131cc7978657f0edaded7945cd3f40543effb5adc3728e58dc3e83230794b18f094d1bcf91c68f4c700f1ef764820ac11c1dfc7bbb5343282414781801e321e7b7703c1da18d9077f08e1b31cd000778293147f82783738f0a08e0efa1ce749f0756268d29a12d50d9ab112e780f5b9f620816ed3f01f064d8f1279 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1df37b807ed694b5bd070f70e974eff3c7d93870 31248dabfe97304328917ec45a71e9897820c487 966bbcce479103418e8fba2ecea22bc8fcfac1b3 2a0571fe9c77c86975fa236c1cea1334522b5578 7b671686c6254995027e3187e3e83859c1300314 23568ccd514062caaec5c3752f1366c0e53c5e12 5161554be791297df34a5efe4829b8f43744a004 d081fe50eed3217309f7c37dd7747bc506395f16 2cd45a7230fb81d6cf0612c0952f78362a345866 54584133bfec2750032eec01925b3d85a8ff46b6 86854df3ee7f42ca3067fcc75a0336e1945cf9aa bcf0a1fe9d941c068ce30a67ecbadf1e8b60085a 55a70b20a3b383802d2ef85f38ce1744c8fdd056 9f9cd2870f049d5eea864746f214a22780a20eee 206b0bf28dd23f03f4122f4515b491395fa6f237 a41e7ca02e3663ace42f5c1c21bde0ce3e188596 27b6476a343363ae0e2793d45c2606a5ca5519ef ed86e0b4148438475015f0b42acbc1d3cc8ffa9f 240c9229b352a9eb0ff3a3bc17099dd0f74985a8 5d8a4a96 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [19:bb:3a:d7:9d:59:bf:e6:61:f9:c9:b1:d9:8a:86:97:66:2f:5b:cf],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-31 07:11:24.276  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-12-31 07:11:24.279 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-12-31 07:11:24.282 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-31 07:11:24.283 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-31 07:11:24.283  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-12-31 07:11:24.284  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-12-31 07:11:24.284  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-12-31 07:11:24.285 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-12-31 07:11:24.285 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-12-31 07:11:24.286 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-12-31 07:11:24.290 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-12-31 07:11:24.291 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-31 07:11:24.291 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-31 07:11:24.292 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-31 07:11:24.467  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-12-31 07:11:24.467  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-12-31 07:11:24.468 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-12-31 07:11:24.468 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-31 07:11:24.469  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-12-31 07:11:24.470  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-12-31 07:11:24.470 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-31 07:11:24.471 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-31 07:11:24.471 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-31 07:11:24.472 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-31 07:11:24.472 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-31 07:11:24.473 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-31 07:11:24.474 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-31 07:11:24.474 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-31 07:11:24.475 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-31 07:11:24.475 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-31 07:11:24.479 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 724087533821643754888546544499066089387517088836 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Dec 31 05:02:00 UTC 2022 Final Date: Thu Dec 30 05:01:59 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ac:c9:8c:6e:2b:4d:9a:69:1d:d5:22:55:c2:78:ce:a8:40:de:08:0d],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1df37b807ed694b5bd070f70e974eff3c7d93870 31248dabfe97304328917ec45a71e9897820c487 966bbcce479103418e8fba2ecea22bc8fcfac1b3 2a0571fe9c77c86975fa236c1cea1334522b5578 7b671686c6254995027e3187e3e83859c1300314 23568ccd514062caaec5c3752f1366c0e53c5e12 5161554be791297df34a5efe4829b8f43744a004 d081fe50eed3217309f7c37dd7747bc506395f16 2cd45a7230fb81d6cf0612c0952f78362a345866 54584133bfec2750032eec01925b3d85a8ff46b6 86854df3ee7f42ca3067fcc75a0336e1945cf9aa bcf0a1fe9d941c068ce30a67ecbadf1e8b60085a 55a70b20a3b383802d2ef85f38ce1744c8fdd056 9f9cd2870f049d5eea864746f214a22780a20eee 206b0bf28dd23f03f4122f4515b491395fa6f237 a41e7ca02e3663ace42f5c1c21bde0ce3e188596 27b6476a343363ae0e2793d45c2606a5ca5519ef ed86e0b4148438475015f0b42acbc1d3cc8ffa9f 240c9229b352a9eb0ff3a3bc17099dd0f74985a8 5d8a4a96 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ed:7d:8e:19:8f:88:e7:31:8b:a1:3f:ce:42:3a:c1:25:67:64:05:75],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-31 07:18:14.411  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-12-31 07:18:14.414 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-12-31 07:18:14.419 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-12-31 07:18:14.420 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-31 07:18:14.421  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-12-31 07:18:14.421  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-12-31 07:18:14.422  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-12-31 07:18:14.422 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-12-31 07:18:14.423 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-12-31 07:18:14.424 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-12-31 07:18:14.428 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-12-31 07:18:14.430 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-31 07:18:14.430 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-31 07:18:14.430 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-31 07:18:14.636  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-12-31 07:18:14.638  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-12-31 07:18:14.639 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-12-31 07:18:14.639 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-31 07:18:14.641  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-12-31 07:18:14.642  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-12-31 07:18:14.644 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-31 07:18:14.644 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-31 07:18:14.645 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-31 07:18:14.647 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-31 07:18:14.648 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-31 07:18:14.648 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-31 07:18:14.649 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-31 07:18:14.650 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-31 07:18:14.651 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-31 07:18:14.656 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-31 07:18:14.662 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 724087533821643754888546544499066089387517088836 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Dec 31 05:02:00 UTC 2022 Final Date: Thu Dec 30 05:01:59 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ac:c9:8c:6e:2b:4d:9a:69:1d:d5:22:55:c2:78:ce:a8:40:de:08:0d],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1df37b807ed694b5bd070f70e974eff3c7d93870 31248dabfe97304328917ec45a71e9897820c487 966bbcce479103418e8fba2ecea22bc8fcfac1b3 2a0571fe9c77c86975fa236c1cea1334522b5578 7b671686c6254995027e3187e3e83859c1300314 23568ccd514062caaec5c3752f1366c0e53c5e12 5161554be791297df34a5efe4829b8f43744a004 d081fe50eed3217309f7c37dd7747bc506395f16 2cd45a7230fb81d6cf0612c0952f78362a345866 54584133bfec2750032eec01925b3d85a8ff46b6 86854df3ee7f42ca3067fcc75a0336e1945cf9aa bcf0a1fe9d941c068ce30a67ecbadf1e8b60085a 55a70b20a3b383802d2ef85f38ce1744c8fdd056 9f9cd2870f049d5eea864746f214a22780a20eee 206b0bf28dd23f03f4122f4515b491395fa6f237 a41e7ca02e3663ace42f5c1c21bde0ce3e188596 27b6476a343363ae0e2793d45c2606a5ca5519ef ed86e0b4148438475015f0b42acbc1d3cc8ffa9f 240c9229b352a9eb0ff3a3bc17099dd0f74985a8 5d8a4a96 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7e:a7:26:f0:e5:ad:58:cd:f9:2b:71:b7:a5:94:b0:63:3b:30:af:32],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-31 07:23:58.865  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-12-31 07:23:58.867 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-12-31 07:23:58.869 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-12-31 07:23:58.870 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-31 07:23:58.871  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-12-31 07:23:58.873  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-12-31 07:23:58.874  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-12-31 07:23:58.874 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-12-31 07:23:58.875 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-12-31 07:23:58.875 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-12-31 07:23:58.879 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-12-31 07:23:58.880 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-31 07:23:58.880 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-31 07:23:58.880 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-31 07:23:59.175  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-12-31 07:23:59.176  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-12-31 07:23:59.177 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-12-31 07:23:59.177 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-31 07:23:59.179  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-12-31 07:23:59.179  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-12-31 07:23:59.182 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-31 07:23:59.182 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-31 07:23:59.183 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-31 07:23:59.185 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-31 07:23:59.185 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-31 07:23:59.185 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-31 07:23:59.186 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-31 07:23:59.186 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-31 07:23:59.187 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-31 07:23:59.188 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-31 07:23:59.199 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 724087533821643754888546544499066089387517088836 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Dec 31 05:02:00 UTC 2022 Final Date: Thu Dec 30 05:01:59 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ac:c9:8c:6e:2b:4d:9a:69:1d:d5:22:55:c2:78:ce:a8:40:de:08:0d],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1df37b807ed694b5bd070f70e974eff3c7d93870 31248dabfe97304328917ec45a71e9897820c487 966bbcce479103418e8fba2ecea22bc8fcfac1b3 2a0571fe9c77c86975fa236c1cea1334522b5578 7b671686c6254995027e3187e3e83859c1300314 23568ccd514062caaec5c3752f1366c0e53c5e12 5161554be791297df34a5efe4829b8f43744a004 d081fe50eed3217309f7c37dd7747bc506395f16 2cd45a7230fb81d6cf0612c0952f78362a345866 54584133bfec2750032eec01925b3d85a8ff46b6 86854df3ee7f42ca3067fcc75a0336e1945cf9aa bcf0a1fe9d941c068ce30a67ecbadf1e8b60085a 55a70b20a3b383802d2ef85f38ce1744c8fdd056 9f9cd2870f049d5eea864746f214a22780a20eee 206b0bf28dd23f03f4122f4515b491395fa6f237 a41e7ca02e3663ace42f5c1c21bde0ce3e188596 27b6476a343363ae0e2793d45c2606a5ca5519ef ed86e0b4148438475015f0b42acbc1d3cc8ffa9f 240c9229b352a9eb0ff3a3bc17099dd0f74985a8 5d8a4a96 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [0c:de:eb:e5:13:18:ba:3c:65:00:ae:d5:83:85:0e:81:cc:42:df:e7],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-31 07:24:18.132  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-12-31 07:24:18.133 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-12-31 07:24:18.134 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-12-31 07:24:18.134 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-31 07:24:18.134  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-12-31 07:24:18.135  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-12-31 07:24:18.135  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-12-31 07:24:18.136 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-12-31 07:24:18.138 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-12-31 07:24:18.138 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-12-31 07:24:18.143 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-12-31 07:24:18.143 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-31 07:24:18.144 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-31 07:24:18.144 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-31 07:24:18.343  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-12-31 07:24:18.343  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-12-31 07:24:18.344 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-12-31 07:24:18.344 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-31 07:24:18.346  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-12-31 07:24:18.350  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-12-31 07:24:18.351 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-31 07:24:18.352 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-31 07:24:18.353 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-31 07:24:18.356 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-31 07:24:18.356 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-31 07:24:18.356 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-31 07:24:18.357 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-31 07:24:18.358 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-31 07:24:18.358 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-31 07:24:18.358 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-31 07:24:18.361 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 724087533821643754888546544499066089387517088836 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Dec 31 05:02:00 UTC 2022 Final Date: Thu Dec 30 05:01:59 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ac:c9:8c:6e:2b:4d:9a:69:1d:d5:22:55:c2:78:ce:a8:40:de:08:0d],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1df37b807ed694b5bd070f70e974eff3c7d93870 31248dabfe97304328917ec45a71e9897820c487 966bbcce479103418e8fba2ecea22bc8fcfac1b3 2a0571fe9c77c86975fa236c1cea1334522b5578 7b671686c6254995027e3187e3e83859c1300314 23568ccd514062caaec5c3752f1366c0e53c5e12 5161554be791297df34a5efe4829b8f43744a004 d081fe50eed3217309f7c37dd7747bc506395f16 2cd45a7230fb81d6cf0612c0952f78362a345866 54584133bfec2750032eec01925b3d85a8ff46b6 86854df3ee7f42ca3067fcc75a0336e1945cf9aa bcf0a1fe9d941c068ce30a67ecbadf1e8b60085a 55a70b20a3b383802d2ef85f38ce1744c8fdd056 9f9cd2870f049d5eea864746f214a22780a20eee 206b0bf28dd23f03f4122f4515b491395fa6f237 a41e7ca02e3663ace42f5c1c21bde0ce3e188596 27b6476a343363ae0e2793d45c2606a5ca5519ef ed86e0b4148438475015f0b42acbc1d3cc8ffa9f 240c9229b352a9eb0ff3a3bc17099dd0f74985a8 5d8a4a96 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b0:75:f7:a8:00:83:a3:8f:a9:99:61:dc:37:9c:cf:c7:25:bf:d6:b2],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2022-12-31 07:50:01.013  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-12-31 07:50:01.017 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-12-31 07:50:01.021 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-12-31 07:50:01.024 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-31 07:50:01.024  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-12-31 07:50:01.025  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-12-31 07:50:01.025  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-12-31 07:50:01.026 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-12-31 07:50:01.027 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-12-31 07:50:01.028 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-12-31 07:50:01.035 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-12-31 07:50:01.037 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-31 07:50:01.037 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-31 07:50:01.037 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-31 07:50:01.255  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-12-31 07:50:01.263  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-12-31 07:50:01.264 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-12-31 07:50:01.264 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-31 07:50:01.265  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-12-31 07:50:01.266  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-12-31 07:50:01.266 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-31 07:50:01.266 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-31 07:50:01.267 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-31 07:50:01.268 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-31 07:50:01.268 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-31 07:50:01.268 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-31 07:50:01.269 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-31 07:50:01.269 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-31 07:50:01.269 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-31 07:50:01.270 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-31 07:50:01.274 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 724087533821643754888546544499066089387517088836 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Dec 31 05:02:00 UTC 2022 Final Date: Thu Dec 30 05:01:59 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ac:c9:8c:6e:2b:4d:9a:69:1d:d5:22:55:c2:78:ce:a8:40:de:08:0d],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1df37b807ed694b5bd070f70e974eff3c7d93870 31248dabfe97304328917ec45a71e9897820c487 966bbcce479103418e8fba2ecea22bc8fcfac1b3 2a0571fe9c77c86975fa236c1cea1334522b5578 7b671686c6254995027e3187e3e83859c1300314 23568ccd514062caaec5c3752f1366c0e53c5e12 5161554be791297df34a5efe4829b8f43744a004 d081fe50eed3217309f7c37dd7747bc506395f16 2cd45a7230fb81d6cf0612c0952f78362a345866 54584133bfec2750032eec01925b3d85a8ff46b6 86854df3ee7f42ca3067fcc75a0336e1945cf9aa bcf0a1fe9d941c068ce30a67ecbadf1e8b60085a 55a70b20a3b383802d2ef85f38ce1744c8fdd056 9f9cd2870f049d5eea864746f214a22780a20eee 206b0bf28dd23f03f4122f4515b491395fa6f237 a41e7ca02e3663ace42f5c1c21bde0ce3e188596 27b6476a343363ae0e2793d45c2606a5ca5519ef ed86e0b4148438475015f0b42acbc1d3cc8ffa9f 240c9229b352a9eb0ff3a3bc17099dd0f74985a8 5d8a4a96 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9c:f5:4f:46:f8:cb:8a:d1:5c:8e:ef:e0:4b:40:fd:c9:09:ff:e3:16],[56:66:d1:a4] modulus: b9a14ae3e6405cce4cadc5045370ae72413edff408cbf11bc0a9c6b84dea831f535870d17ffc36b94b40c0021e87d895a2f2b7e6f71b747b25edfc7769f00efdfd6381612c7db1330260f9d7e50d2850bbbe82eaf4be17251c7b2dc90982f7c8f29a74dc0c4e27d55eb4fa4aa1e02daa3b40225f44f69f884572252e36f16a6978abfc540b51821be2c3c725d1fdaea66612a26710e61029055db7fd15857606cee6221075ad174c9bf9e39541a78572826bad18f031089dd832aabf3db4957a4f1d2ad7ab92170114908b7ff33b2d1ec4bfeb136df60d80e4ccab818b442237646d6b426e70e4a295ce353bcb26d4840ab65688c275e22d4f29bbb670bf42cd public exponent: 10001 ] 2022-12-31 07:50:06.102  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-12-31 07:50:06.103 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-12-31 07:50:06.104 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-12-31 07:50:06.105 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-12-31 07:50:06.105  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-12-31 07:50:06.105  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-12-31 07:50:06.106  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-12-31 07:50:06.106 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-12-31 07:50:06.106 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-12-31 07:50:06.107 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-12-31 07:50:06.110 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-12-31 07:50:06.111 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-31 07:50:06.111 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-12-31 07:50:06.111 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-31 07:50:06.243  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-12-31 07:50:06.243  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-12-31 07:50:06.243 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-12-31 07:50:06.244 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-12-31 07:50:06.245  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-12-31 07:50:06.245  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-12-31 07:50:06.246 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-31 07:50:06.246 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-31 07:50:06.246 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-31 07:50:06.247 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-31 07:50:06.247 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-31 07:50:06.247 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-31 07:50:06.248 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-12-31 07:50:06.248 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-12-31 07:50:06.249 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-12-31 07:50:06.249 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-12-31 07:50:06.252 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 724087533821643754888546544499066089387517088836 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Dec 31 05:02:00 UTC 2022 Final Date: Thu Dec 30 05:01:59 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ac:c9:8c:6e:2b:4d:9a:69:1d:d5:22:55:c2:78:ce:a8:40:de:08:0d],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1df37b807ed694b5bd070f70e974eff3c7d93870 31248dabfe97304328917ec45a71e9897820c487 966bbcce479103418e8fba2ecea22bc8fcfac1b3 2a0571fe9c77c86975fa236c1cea1334522b5578 7b671686c6254995027e3187e3e83859c1300314 23568ccd514062caaec5c3752f1366c0e53c5e12 5161554be791297df34a5efe4829b8f43744a004 d081fe50eed3217309f7c37dd7747bc506395f16 2cd45a7230fb81d6cf0612c0952f78362a345866 54584133bfec2750032eec01925b3d85a8ff46b6 86854df3ee7f42ca3067fcc75a0336e1945cf9aa bcf0a1fe9d941c068ce30a67ecbadf1e8b60085a 55a70b20a3b383802d2ef85f38ce1744c8fdd056 9f9cd2870f049d5eea864746f214a22780a20eee 206b0bf28dd23f03f4122f4515b491395fa6f237 a41e7ca02e3663ace42f5c1c21bde0ce3e188596 27b6476a343363ae0e2793d45c2606a5ca5519ef ed86e0b4148438475015f0b42acbc1d3cc8ffa9f 240c9229b352a9eb0ff3a3bc17099dd0f74985a8 5d8a4a96 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b0:84:6f:f5:15:37:1f:9c:2e:22:a6:9f:9b:c2:16:6a:4b:43:27:24],[56:66:d1:a4] modulus: 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 public exponent: 10001 ]