2023-01-06 05:09:02,741 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2023-01-06 05:09:04,366 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2023-01-06 05:09:05.580  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Jan 06, 2023 5:09:08 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jan 06, 2023 5:09:08 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jan 06, 2023 5:09:08 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jan 06, 2023 5:09:09 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2023-01-06 05:09:09.959 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2023-01-06 05:09:10.472  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2023-01-06 05:09:10.781  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2023-01-06 05:09:12.000 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2023-01-06 05:09:12.011 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2023-01-06 05:09:12.014 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2023-01-06 05:09:12.020 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2023-01-06 05:09:12.116 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2023-01-06 05:09:12.123 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2023-01-06 05:09:12.310 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2023-01-06 05:09:13.950 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jan 06, 2023 5:09:15 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2023-01-06 05:09:15.453  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 14.422 seconds (JVM running for 17.788) Jan 06, 2023 5:09:28 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2023-01-06 05:10:03.653  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-06 05:10:03.664 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-06 05:10:03.720 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2023-01-06 05:10:03.724 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-06 05:10:03.741  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2023-01-06 05:10:03.744  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-06 05:10:03.747  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-06 05:10:03.749 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-06 05:10:03.750 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-06 05:10:03.756 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-06 05:10:03.767 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-06 05:10:03.772 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-06 05:10:03.842 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-06 05:10:03.854 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-06 05:10:03.856 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-06 05:10:03.862 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-06 05:10:04.759  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-06 05:10:04.762  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-06 05:10:04.763 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-06 05:10:04.766 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-06 05:10:04.783  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-06 05:10:04.785  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-06 05:10:04.786 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-06 05:10:04.787 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-06 05:10:04.788 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-06 05:10:04.812 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-06 05:10:04.813 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-06 05:10:04.813 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-06 05:10:04.824 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-06 05:10:04.825 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-06 05:10:04.825 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-06 05:10:04.828 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-06 05:10:04.878 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 597020822072076100104217578101015232277915350333 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 06 05:06:09 UTC 2023 Final Date: Wed Jan 05 05:06:08 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d5:56:d3:96:09:6f:2c:3e:cd:8a:af:48:fa:25:33:30:8e:6a:87:88],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8a428f3c8b5cca58e91eeb63e757217255ff9a18 5bcb4cd4746598d98ffb7a11a2f29c3796519fb9 1b7c0efabda3ded2e74cfee579730bc53d722be2 a138942437fc601b71ed568acbe2aa860caf6378 ea380214bb6acbdb0798abb4ad0f181fd4ae05f7 4e2bc495b2cf656610bc3970f9dc6341c1d0464b 34704421d3d683f1b517f493bd58e2e3684beccf 164dec2772679226e68bb3ea329986bb827d36ba a72cb2c4179d3fb2e2873f404b369280f1642206 84b45acba14f59fbfdd2ed74de1e1899aa453f08 579d37c39cac5e719f7284d4c6f9c4d7aa22e72d e205c3ebbf7245f69102b3b3dacef2988c7c2d40 d24b286c0f21c9a0ab7ac2696ea08bf79526d8c0 ad1dda51a3ad3233d829fa5d881e5318c2707f0c fd689637dcd52535939af4cd1d9bff0ab6a1e038 6566ad35141ca0c5efd7c7763f71b493e19d60c6 cd42a81295ad359b71c4b271e1f1b7cc96c87c36 475a49193b370fbac69aca9f1d461f48f5952942 d34de65bb5848bda05f1e65bcb9b5db63c23e8bd 61742d8f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [50:04:63:b1:24:e3:83:38:39:b3:e7:43:c7:41:0a:76:4f:32:18:35],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-06 06:55:07.050  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-06 06:55:07.054 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-06 06:55:07.056 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-06 06:55:07.058 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-06 06:55:07.059  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-06 06:55:07.060  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-06 06:55:07.060  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-06 06:55:07.061 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-06 06:55:07.061 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-06 06:55:07.062 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-06 06:55:07.067 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-06 06:55:07.069 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-06 06:55:07.069 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-06 06:55:07.069 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-06 06:55:07.279  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-06 06:55:07.281  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-06 06:55:07.282 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-06 06:55:07.282 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-06 06:55:07.286  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-06 06:55:07.287  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-06 06:55:07.288 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-06 06:55:07.288 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-06 06:55:07.289 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-06 06:55:07.291 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-06 06:55:07.292 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-06 06:55:07.292 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-06 06:55:07.293 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-06 06:55:07.293 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-06 06:55:07.294 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-06 06:55:07.295 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-06 06:55:07.300 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 597020822072076100104217578101015232277915350333 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 06 05:06:09 UTC 2023 Final Date: Wed Jan 05 05:06:08 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d5:56:d3:96:09:6f:2c:3e:cd:8a:af:48:fa:25:33:30:8e:6a:87:88],[56:66:d1:a4] modulus: db045395981cb7af7d60e367546c52a8858db1cd6ad9b7b1817e92f1911bb98f1614364e165fad4577a027d87a8cb58972a6c25f4826b910b85c85f36ec4280ae2de91ebd01aaf58db2571426ceaf76ddda145d13836a106a7b5ef0a016542dac518930ae49a5d8daa0fdb7c1826afd2a246b88993b5ab3cedd9c564fcb254c90a73e53d5d65fad796088aec256523100912ea4b830958b8881d03eb793a25c7fd8b7f0f4497d9412d9143908ba47c419c573e35bfbfc3453d92e9e6e9c6cc9fe90e376d690ab0f2d94e632055e1706626b318120cab4cd04909e33107d48fdbf431d698a36d5c1e8a7cf833c11705869cc9f0edebb252842a3f392a6aada4882db6b031e842069fdace2d359578befc23d10aae63143c431ba199a6f954018aed602de7bbdb0cc452b79f082afa78947a1d125bb8678d149698ef627ba53de00cedd8b9adbb7aef6135fab1cc2bf3f695b548b20d8bf091f1b8f4d39bd7858fbb7227224be20e91f65065e9fda4213724acbee25ae4237ceb70d871da279817 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8a428f3c8b5cca58e91eeb63e757217255ff9a18 5bcb4cd4746598d98ffb7a11a2f29c3796519fb9 1b7c0efabda3ded2e74cfee579730bc53d722be2 a138942437fc601b71ed568acbe2aa860caf6378 ea380214bb6acbdb0798abb4ad0f181fd4ae05f7 4e2bc495b2cf656610bc3970f9dc6341c1d0464b 34704421d3d683f1b517f493bd58e2e3684beccf 164dec2772679226e68bb3ea329986bb827d36ba a72cb2c4179d3fb2e2873f404b369280f1642206 84b45acba14f59fbfdd2ed74de1e1899aa453f08 579d37c39cac5e719f7284d4c6f9c4d7aa22e72d e205c3ebbf7245f69102b3b3dacef2988c7c2d40 d24b286c0f21c9a0ab7ac2696ea08bf79526d8c0 ad1dda51a3ad3233d829fa5d881e5318c2707f0c fd689637dcd52535939af4cd1d9bff0ab6a1e038 6566ad35141ca0c5efd7c7763f71b493e19d60c6 cd42a81295ad359b71c4b271e1f1b7cc96c87c36 475a49193b370fbac69aca9f1d461f48f5952942 d34de65bb5848bda05f1e65bcb9b5db63c23e8bd 61742d8f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [12:69:87:f2:b2:7f:e2:b4:6f:ca:bb:84:e8:94:a8:18:60:6f:94:e2],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-06 06:56:48.173  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-06 06:56:48.177 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-06 06:56:48.179 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2023-01-06 06:56:48.180 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-06 06:56:48.182  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2023-01-06 06:56:48.183  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-06 06:56:48.184  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-06 06:56:48.185 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-06 06:56:48.186 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-06 06:56:48.187 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-06 06:56:48.196 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-06 06:56:48.197 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-06 06:56:48.198 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-06 06:56:48.198 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-06 06:56:48.378  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-06 06:56:48.380  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-06 06:56:48.380 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-06 06:56:48.381 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-06 06:56:48.385  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-06 06:56:48.386  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-06 06:56:48.386 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-06 06:56:48.387 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-06 06:56:48.387 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-06 06:56:48.390 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-06 06:56:48.391 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-06 06:56:48.392 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-06 06:56:48.394 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-06 06:56:48.395 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-06 06:56:48.395 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-06 06:56:48.397 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-06 06:56:48.404 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 597020822072076100104217578101015232277915350333 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 06 05:06:09 UTC 2023 Final Date: Wed Jan 05 05:06:08 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d5:56:d3:96:09:6f:2c:3e:cd:8a:af:48:fa:25:33:30:8e:6a:87:88],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8a428f3c8b5cca58e91eeb63e757217255ff9a18 5bcb4cd4746598d98ffb7a11a2f29c3796519fb9 1b7c0efabda3ded2e74cfee579730bc53d722be2 a138942437fc601b71ed568acbe2aa860caf6378 ea380214bb6acbdb0798abb4ad0f181fd4ae05f7 4e2bc495b2cf656610bc3970f9dc6341c1d0464b 34704421d3d683f1b517f493bd58e2e3684beccf 164dec2772679226e68bb3ea329986bb827d36ba a72cb2c4179d3fb2e2873f404b369280f1642206 84b45acba14f59fbfdd2ed74de1e1899aa453f08 579d37c39cac5e719f7284d4c6f9c4d7aa22e72d e205c3ebbf7245f69102b3b3dacef2988c7c2d40 d24b286c0f21c9a0ab7ac2696ea08bf79526d8c0 ad1dda51a3ad3233d829fa5d881e5318c2707f0c fd689637dcd52535939af4cd1d9bff0ab6a1e038 6566ad35141ca0c5efd7c7763f71b493e19d60c6 cd42a81295ad359b71c4b271e1f1b7cc96c87c36 475a49193b370fbac69aca9f1d461f48f5952942 d34de65bb5848bda05f1e65bcb9b5db63c23e8bd 61742d8f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f8:c4:2a:2d:91:be:e3:81:c2:14:b8:a8:b9:fd:93:99:8f:41:f8:a4],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-06 06:58:46.744  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-06 06:58:46.746 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-06 06:58:46.749 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2023-01-06 06:58:46.751 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-06 06:58:46.751  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2023-01-06 06:58:46.753  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-06 06:58:46.753  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-06 06:58:46.754 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-06 06:58:46.754 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-06 06:58:46.755 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-06 06:58:46.760 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-06 06:58:46.761 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-06 06:58:46.762 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-06 06:58:46.763 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-06 06:58:46.949  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-06 06:58:46.950  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-06 06:58:46.951 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-06 06:58:46.951 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-06 06:58:46.956  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-06 06:58:46.957  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-06 06:58:46.957 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-06 06:58:46.958 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-06 06:58:46.958 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-06 06:58:46.959 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-06 06:58:46.960 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-06 06:58:46.960 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-06 06:58:46.962 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-06 06:58:46.962 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-06 06:58:46.964 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-06 06:58:46.966 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-06 06:58:46.975 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 597020822072076100104217578101015232277915350333 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 06 05:06:09 UTC 2023 Final Date: Wed Jan 05 05:06:08 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d5:56:d3:96:09:6f:2c:3e:cd:8a:af:48:fa:25:33:30:8e:6a:87:88],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8a428f3c8b5cca58e91eeb63e757217255ff9a18 5bcb4cd4746598d98ffb7a11a2f29c3796519fb9 1b7c0efabda3ded2e74cfee579730bc53d722be2 a138942437fc601b71ed568acbe2aa860caf6378 ea380214bb6acbdb0798abb4ad0f181fd4ae05f7 4e2bc495b2cf656610bc3970f9dc6341c1d0464b 34704421d3d683f1b517f493bd58e2e3684beccf 164dec2772679226e68bb3ea329986bb827d36ba a72cb2c4179d3fb2e2873f404b369280f1642206 84b45acba14f59fbfdd2ed74de1e1899aa453f08 579d37c39cac5e719f7284d4c6f9c4d7aa22e72d e205c3ebbf7245f69102b3b3dacef2988c7c2d40 d24b286c0f21c9a0ab7ac2696ea08bf79526d8c0 ad1dda51a3ad3233d829fa5d881e5318c2707f0c fd689637dcd52535939af4cd1d9bff0ab6a1e038 6566ad35141ca0c5efd7c7763f71b493e19d60c6 cd42a81295ad359b71c4b271e1f1b7cc96c87c36 475a49193b370fbac69aca9f1d461f48f5952942 d34de65bb5848bda05f1e65bcb9b5db63c23e8bd 61742d8f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b7:54:c9:e2:11:eb:e6:5c:b8:43:27:54:08:ce:5a:f8:68:ed:16:7d],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-06 07:02:03.918  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-06 07:02:03.922 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-06 07:02:03.924 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-06 07:02:03.936 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-06 07:02:03.937  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-06 07:02:03.938  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-06 07:02:03.940  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-06 07:02:03.940 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-06 07:02:03.941 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-06 07:02:03.942 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-06 07:02:03.950 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-06 07:02:03.952 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-06 07:02:03.953 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-06 07:02:03.955 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-06 07:02:04.195  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-06 07:02:04.197  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-06 07:02:04.197 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-06 07:02:04.199 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-06 07:02:04.201  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-06 07:02:04.203  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-06 07:02:04.206 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-06 07:02:04.207 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-06 07:02:04.207 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-06 07:02:04.208 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-06 07:02:04.209 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-06 07:02:04.213 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-06 07:02:04.216 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-06 07:02:04.218 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-06 07:02:04.218 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-06 07:02:04.221 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-06 07:02:04.227 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 597020822072076100104217578101015232277915350333 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 06 05:06:09 UTC 2023 Final Date: Wed Jan 05 05:06:08 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d5:56:d3:96:09:6f:2c:3e:cd:8a:af:48:fa:25:33:30:8e:6a:87:88],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8a428f3c8b5cca58e91eeb63e757217255ff9a18 5bcb4cd4746598d98ffb7a11a2f29c3796519fb9 1b7c0efabda3ded2e74cfee579730bc53d722be2 a138942437fc601b71ed568acbe2aa860caf6378 ea380214bb6acbdb0798abb4ad0f181fd4ae05f7 4e2bc495b2cf656610bc3970f9dc6341c1d0464b 34704421d3d683f1b517f493bd58e2e3684beccf 164dec2772679226e68bb3ea329986bb827d36ba a72cb2c4179d3fb2e2873f404b369280f1642206 84b45acba14f59fbfdd2ed74de1e1899aa453f08 579d37c39cac5e719f7284d4c6f9c4d7aa22e72d e205c3ebbf7245f69102b3b3dacef2988c7c2d40 d24b286c0f21c9a0ab7ac2696ea08bf79526d8c0 ad1dda51a3ad3233d829fa5d881e5318c2707f0c fd689637dcd52535939af4cd1d9bff0ab6a1e038 6566ad35141ca0c5efd7c7763f71b493e19d60c6 cd42a81295ad359b71c4b271e1f1b7cc96c87c36 475a49193b370fbac69aca9f1d461f48f5952942 d34de65bb5848bda05f1e65bcb9b5db63c23e8bd 61742d8f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [6b:ee:8f:32:44:4d:5d:5b:49:5e:4b:7a:11:08:d3:86:0f:c0:ad:45],[56:66:d1:a4] modulus: d1603094197e5c98562b4cd173b47a526414b404bb6224ebc4c84eaabf9e3316d1871605392ffb37a4ff6917613f42e5f547851ecf788bb4e3a94d9054701cb3106aa39f0bd86a187349882da55473e6d9e2ebce5bf56bafad4c2665b6399ea4f8781fa570548db53f515454055b19cd54c5c5efa2eb81293bb58cd7abebc4ec298e614b604548e8b2689c107ebda2c80ac6522721134f31177616a233f7d0f6b1220ccada1b3dffe42b51ef280af9037414dead696ed2a5803c67df98c5d54b75309abeb964b1f863ff3c0ea2c4aa26cb4bf2a36eb6b65893a954421c1dbdd757f00f842ab4789a0af54a335eea1cb0e64cd7f88ae42553e49c2edafa6dec73 public exponent: 10001 ] 2023-01-06 07:09:06.307  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-06 07:09:06.309 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-06 07:09:06.316 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-06 07:09:06.319 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-06 07:09:06.321  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-06 07:09:06.322  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-06 07:09:06.322  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-06 07:09:06.323 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-06 07:09:06.323 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-06 07:09:06.324 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-06 07:09:06.334 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-06 07:09:06.336 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-06 07:09:06.336 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-06 07:09:06.337 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-06 07:09:06.497  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-06 07:09:06.499  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-06 07:09:06.500 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-06 07:09:06.501 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-06 07:09:06.502  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-06 07:09:06.503  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-06 07:09:06.503 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-06 07:09:06.503 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-06 07:09:06.504 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-06 07:09:06.505 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-06 07:09:06.505 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-06 07:09:06.506 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-06 07:09:06.506 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-06 07:09:06.507 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-06 07:09:06.507 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-06 07:09:06.508 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-06 07:09:06.511 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 597020822072076100104217578101015232277915350333 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 06 05:06:09 UTC 2023 Final Date: Wed Jan 05 05:06:08 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d5:56:d3:96:09:6f:2c:3e:cd:8a:af:48:fa:25:33:30:8e:6a:87:88],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8a428f3c8b5cca58e91eeb63e757217255ff9a18 5bcb4cd4746598d98ffb7a11a2f29c3796519fb9 1b7c0efabda3ded2e74cfee579730bc53d722be2 a138942437fc601b71ed568acbe2aa860caf6378 ea380214bb6acbdb0798abb4ad0f181fd4ae05f7 4e2bc495b2cf656610bc3970f9dc6341c1d0464b 34704421d3d683f1b517f493bd58e2e3684beccf 164dec2772679226e68bb3ea329986bb827d36ba a72cb2c4179d3fb2e2873f404b369280f1642206 84b45acba14f59fbfdd2ed74de1e1899aa453f08 579d37c39cac5e719f7284d4c6f9c4d7aa22e72d e205c3ebbf7245f69102b3b3dacef2988c7c2d40 d24b286c0f21c9a0ab7ac2696ea08bf79526d8c0 ad1dda51a3ad3233d829fa5d881e5318c2707f0c fd689637dcd52535939af4cd1d9bff0ab6a1e038 6566ad35141ca0c5efd7c7763f71b493e19d60c6 cd42a81295ad359b71c4b271e1f1b7cc96c87c36 475a49193b370fbac69aca9f1d461f48f5952942 d34de65bb5848bda05f1e65bcb9b5db63c23e8bd 61742d8f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [66:c1:a9:98:bb:e2:05:c9:4f:df:a2:68:37:5e:6e:e5:3d:4d:0a:4d],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-06 07:14:46.404  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-06 07:14:46.416 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-06 07:14:46.422 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-06 07:14:46.425 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-06 07:14:46.428  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-06 07:14:46.428  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-06 07:14:46.429  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-06 07:14:46.429 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-06 07:14:46.430 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-06 07:14:46.430 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-06 07:14:46.435 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-06 07:14:46.442 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-06 07:14:46.443 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-06 07:14:46.443 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-06 07:14:46.694  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-06 07:14:46.694  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-06 07:14:46.695 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-06 07:14:46.695 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-06 07:14:46.701  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-06 07:14:46.702  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-06 07:14:46.703 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-06 07:14:46.703 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-06 07:14:46.703 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-06 07:14:46.704 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-06 07:14:46.705 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-06 07:14:46.705 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-06 07:14:46.706 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-06 07:14:46.709 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-06 07:14:46.710 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-06 07:14:46.712 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-06 07:14:46.717 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 597020822072076100104217578101015232277915350333 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 06 05:06:09 UTC 2023 Final Date: Wed Jan 05 05:06:08 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d5:56:d3:96:09:6f:2c:3e:cd:8a:af:48:fa:25:33:30:8e:6a:87:88],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8a428f3c8b5cca58e91eeb63e757217255ff9a18 5bcb4cd4746598d98ffb7a11a2f29c3796519fb9 1b7c0efabda3ded2e74cfee579730bc53d722be2 a138942437fc601b71ed568acbe2aa860caf6378 ea380214bb6acbdb0798abb4ad0f181fd4ae05f7 4e2bc495b2cf656610bc3970f9dc6341c1d0464b 34704421d3d683f1b517f493bd58e2e3684beccf 164dec2772679226e68bb3ea329986bb827d36ba a72cb2c4179d3fb2e2873f404b369280f1642206 84b45acba14f59fbfdd2ed74de1e1899aa453f08 579d37c39cac5e719f7284d4c6f9c4d7aa22e72d e205c3ebbf7245f69102b3b3dacef2988c7c2d40 d24b286c0f21c9a0ab7ac2696ea08bf79526d8c0 ad1dda51a3ad3233d829fa5d881e5318c2707f0c fd689637dcd52535939af4cd1d9bff0ab6a1e038 6566ad35141ca0c5efd7c7763f71b493e19d60c6 cd42a81295ad359b71c4b271e1f1b7cc96c87c36 475a49193b370fbac69aca9f1d461f48f5952942 d34de65bb5848bda05f1e65bcb9b5db63c23e8bd 61742d8f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a5:79:b4:3a:30:9c:d6:a5:7a:97:e4:e4:1a:6d:d8:af:67:4e:69:4e],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-06 07:21:44.511  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-06 07:21:44.513 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-06 07:21:44.515 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2023-01-06 07:21:44.516 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-06 07:21:44.516  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2023-01-06 07:21:44.517  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-06 07:21:44.517  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-06 07:21:44.518 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-06 07:21:44.518 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-06 07:21:44.518 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-06 07:21:44.523 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-06 07:21:44.524 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-06 07:21:44.524 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-06 07:21:44.524 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-06 07:21:44.751  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-06 07:21:44.752  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-06 07:21:44.753 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-06 07:21:44.753 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-06 07:21:44.754  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-06 07:21:44.755  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-06 07:21:44.756 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-06 07:21:44.756 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-06 07:21:44.756 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-06 07:21:44.757 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-06 07:21:44.758 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-06 07:21:44.758 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-06 07:21:44.759 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-06 07:21:44.759 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-06 07:21:44.760 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-06 07:21:44.761 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-06 07:21:44.764 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 597020822072076100104217578101015232277915350333 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 06 05:06:09 UTC 2023 Final Date: Wed Jan 05 05:06:08 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d5:56:d3:96:09:6f:2c:3e:cd:8a:af:48:fa:25:33:30:8e:6a:87:88],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8a428f3c8b5cca58e91eeb63e757217255ff9a18 5bcb4cd4746598d98ffb7a11a2f29c3796519fb9 1b7c0efabda3ded2e74cfee579730bc53d722be2 a138942437fc601b71ed568acbe2aa860caf6378 ea380214bb6acbdb0798abb4ad0f181fd4ae05f7 4e2bc495b2cf656610bc3970f9dc6341c1d0464b 34704421d3d683f1b517f493bd58e2e3684beccf 164dec2772679226e68bb3ea329986bb827d36ba a72cb2c4179d3fb2e2873f404b369280f1642206 84b45acba14f59fbfdd2ed74de1e1899aa453f08 579d37c39cac5e719f7284d4c6f9c4d7aa22e72d e205c3ebbf7245f69102b3b3dacef2988c7c2d40 d24b286c0f21c9a0ab7ac2696ea08bf79526d8c0 ad1dda51a3ad3233d829fa5d881e5318c2707f0c fd689637dcd52535939af4cd1d9bff0ab6a1e038 6566ad35141ca0c5efd7c7763f71b493e19d60c6 cd42a81295ad359b71c4b271e1f1b7cc96c87c36 475a49193b370fbac69aca9f1d461f48f5952942 d34de65bb5848bda05f1e65bcb9b5db63c23e8bd 61742d8f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [18:e4:bb:6f:59:62:97:ce:a2:27:ea:f0:08:4d:8e:05:66:cf:f4:cb],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-06 07:28:29.354  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-06 07:28:29.355 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-06 07:28:29.356 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-06 07:28:29.357 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-06 07:28:29.357  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-06 07:28:29.358  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-06 07:28:29.359  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-06 07:28:29.359 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-06 07:28:29.360 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-06 07:28:29.360 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-06 07:28:29.365 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-06 07:28:29.365 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-06 07:28:29.366 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-06 07:28:29.366 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-06 07:28:29.539  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-06 07:28:29.540  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-06 07:28:29.540 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-06 07:28:29.541 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-06 07:28:29.542  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-06 07:28:29.543  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-06 07:28:29.543 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-06 07:28:29.543 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-06 07:28:29.544 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-06 07:28:29.544 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-06 07:28:29.545 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-06 07:28:29.545 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-06 07:28:29.546 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-06 07:28:29.546 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-06 07:28:29.546 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-06 07:28:29.548 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-06 07:28:29.551 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 597020822072076100104217578101015232277915350333 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 06 05:06:09 UTC 2023 Final Date: Wed Jan 05 05:06:08 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d5:56:d3:96:09:6f:2c:3e:cd:8a:af:48:fa:25:33:30:8e:6a:87:88],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8a428f3c8b5cca58e91eeb63e757217255ff9a18 5bcb4cd4746598d98ffb7a11a2f29c3796519fb9 1b7c0efabda3ded2e74cfee579730bc53d722be2 a138942437fc601b71ed568acbe2aa860caf6378 ea380214bb6acbdb0798abb4ad0f181fd4ae05f7 4e2bc495b2cf656610bc3970f9dc6341c1d0464b 34704421d3d683f1b517f493bd58e2e3684beccf 164dec2772679226e68bb3ea329986bb827d36ba a72cb2c4179d3fb2e2873f404b369280f1642206 84b45acba14f59fbfdd2ed74de1e1899aa453f08 579d37c39cac5e719f7284d4c6f9c4d7aa22e72d e205c3ebbf7245f69102b3b3dacef2988c7c2d40 d24b286c0f21c9a0ab7ac2696ea08bf79526d8c0 ad1dda51a3ad3233d829fa5d881e5318c2707f0c fd689637dcd52535939af4cd1d9bff0ab6a1e038 6566ad35141ca0c5efd7c7763f71b493e19d60c6 cd42a81295ad359b71c4b271e1f1b7cc96c87c36 475a49193b370fbac69aca9f1d461f48f5952942 d34de65bb5848bda05f1e65bcb9b5db63c23e8bd 61742d8f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [72:eb:16:f6:59:0c:6a:ba:6e:f3:3d:fb:ec:95:a6:16:1a:bd:01:78],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-06 07:28:50.358  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-06 07:28:50.360 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-06 07:28:50.376 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-06 07:28:50.378 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-06 07:28:50.378  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-06 07:28:50.379  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-06 07:28:50.380  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-06 07:28:50.380 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-06 07:28:50.381 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-06 07:28:50.381 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-06 07:28:50.386 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-06 07:28:50.388 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-06 07:28:50.388 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-06 07:28:50.388 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-06 07:28:50.562  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-06 07:28:50.563  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-06 07:28:50.563 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-06 07:28:50.572 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-06 07:28:50.573  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-06 07:28:50.574  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-06 07:28:50.574 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-06 07:28:50.575 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-06 07:28:50.575 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-06 07:28:50.576 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-06 07:28:50.576 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-06 07:28:50.577 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-06 07:28:50.577 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-06 07:28:50.578 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-06 07:28:50.578 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-06 07:28:50.579 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-06 07:28:50.581 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 597020822072076100104217578101015232277915350333 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 06 05:06:09 UTC 2023 Final Date: Wed Jan 05 05:06:08 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d5:56:d3:96:09:6f:2c:3e:cd:8a:af:48:fa:25:33:30:8e:6a:87:88],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8a428f3c8b5cca58e91eeb63e757217255ff9a18 5bcb4cd4746598d98ffb7a11a2f29c3796519fb9 1b7c0efabda3ded2e74cfee579730bc53d722be2 a138942437fc601b71ed568acbe2aa860caf6378 ea380214bb6acbdb0798abb4ad0f181fd4ae05f7 4e2bc495b2cf656610bc3970f9dc6341c1d0464b 34704421d3d683f1b517f493bd58e2e3684beccf 164dec2772679226e68bb3ea329986bb827d36ba a72cb2c4179d3fb2e2873f404b369280f1642206 84b45acba14f59fbfdd2ed74de1e1899aa453f08 579d37c39cac5e719f7284d4c6f9c4d7aa22e72d e205c3ebbf7245f69102b3b3dacef2988c7c2d40 d24b286c0f21c9a0ab7ac2696ea08bf79526d8c0 ad1dda51a3ad3233d829fa5d881e5318c2707f0c fd689637dcd52535939af4cd1d9bff0ab6a1e038 6566ad35141ca0c5efd7c7763f71b493e19d60c6 cd42a81295ad359b71c4b271e1f1b7cc96c87c36 475a49193b370fbac69aca9f1d461f48f5952942 d34de65bb5848bda05f1e65bcb9b5db63c23e8bd 61742d8f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [31:41:10:1c:2d:3d:50:74:a5:69:92:01:71:16:2d:8c:d3:01:bf:54],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-06 07:54:52.474  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-06 07:54:52.478 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-06 07:54:52.482 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-06 07:54:52.484 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-06 07:54:52.484  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-06 07:54:52.485  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-06 07:54:52.486  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-06 07:54:52.486 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-06 07:54:52.487 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-06 07:54:52.488 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-06 07:54:52.495 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-06 07:54:52.496 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-06 07:54:52.496 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-06 07:54:52.497 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-06 07:54:52.682  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-06 07:54:52.683  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-06 07:54:52.683 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-06 07:54:52.684 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-06 07:54:52.693  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-06 07:54:52.694  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-06 07:54:52.699 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-06 07:54:52.699 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-06 07:54:52.700 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-06 07:54:52.703 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-06 07:54:52.704 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-06 07:54:52.704 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-06 07:54:52.705 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-06 07:54:52.705 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-06 07:54:52.705 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-06 07:54:52.715 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-06 07:54:52.726 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 597020822072076100104217578101015232277915350333 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 06 05:06:09 UTC 2023 Final Date: Wed Jan 05 05:06:08 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d5:56:d3:96:09:6f:2c:3e:cd:8a:af:48:fa:25:33:30:8e:6a:87:88],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8a428f3c8b5cca58e91eeb63e757217255ff9a18 5bcb4cd4746598d98ffb7a11a2f29c3796519fb9 1b7c0efabda3ded2e74cfee579730bc53d722be2 a138942437fc601b71ed568acbe2aa860caf6378 ea380214bb6acbdb0798abb4ad0f181fd4ae05f7 4e2bc495b2cf656610bc3970f9dc6341c1d0464b 34704421d3d683f1b517f493bd58e2e3684beccf 164dec2772679226e68bb3ea329986bb827d36ba a72cb2c4179d3fb2e2873f404b369280f1642206 84b45acba14f59fbfdd2ed74de1e1899aa453f08 579d37c39cac5e719f7284d4c6f9c4d7aa22e72d e205c3ebbf7245f69102b3b3dacef2988c7c2d40 d24b286c0f21c9a0ab7ac2696ea08bf79526d8c0 ad1dda51a3ad3233d829fa5d881e5318c2707f0c fd689637dcd52535939af4cd1d9bff0ab6a1e038 6566ad35141ca0c5efd7c7763f71b493e19d60c6 cd42a81295ad359b71c4b271e1f1b7cc96c87c36 475a49193b370fbac69aca9f1d461f48f5952942 d34de65bb5848bda05f1e65bcb9b5db63c23e8bd 61742d8f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9e:5e:c2:6c:bd:54:61:ec:4e:a2:3a:86:37:c9:46:d2:8c:eb:96:0f],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-06 07:54:57.444  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-06 07:54:57.445 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-06 07:54:57.448 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-06 07:54:57.449 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-06 07:54:57.449  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-06 07:54:57.450  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-06 07:54:57.450  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-06 07:54:57.450 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-06 07:54:57.450 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-06 07:54:57.455 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-06 07:54:57.464 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-06 07:54:57.465 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-06 07:54:57.465 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-06 07:54:57.466 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-06 07:54:57.585  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-06 07:54:57.586  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-06 07:54:57.586 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-06 07:54:57.587 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-06 07:54:57.588  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-06 07:54:57.589  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-06 07:54:57.589 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-06 07:54:57.589 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-06 07:54:57.589 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-06 07:54:57.590 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-06 07:54:57.592 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-06 07:54:57.592 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-06 07:54:57.594 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-06 07:54:57.597 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-06 07:54:57.605 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-06 07:54:57.606 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-06 07:54:57.614 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 597020822072076100104217578101015232277915350333 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 06 05:06:09 UTC 2023 Final Date: Wed Jan 05 05:06:08 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [d5:56:d3:96:09:6f:2c:3e:cd:8a:af:48:fa:25:33:30:8e:6a:87:88],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 8a428f3c8b5cca58e91eeb63e757217255ff9a18 5bcb4cd4746598d98ffb7a11a2f29c3796519fb9 1b7c0efabda3ded2e74cfee579730bc53d722be2 a138942437fc601b71ed568acbe2aa860caf6378 ea380214bb6acbdb0798abb4ad0f181fd4ae05f7 4e2bc495b2cf656610bc3970f9dc6341c1d0464b 34704421d3d683f1b517f493bd58e2e3684beccf 164dec2772679226e68bb3ea329986bb827d36ba a72cb2c4179d3fb2e2873f404b369280f1642206 84b45acba14f59fbfdd2ed74de1e1899aa453f08 579d37c39cac5e719f7284d4c6f9c4d7aa22e72d e205c3ebbf7245f69102b3b3dacef2988c7c2d40 d24b286c0f21c9a0ab7ac2696ea08bf79526d8c0 ad1dda51a3ad3233d829fa5d881e5318c2707f0c fd689637dcd52535939af4cd1d9bff0ab6a1e038 6566ad35141ca0c5efd7c7763f71b493e19d60c6 cd42a81295ad359b71c4b271e1f1b7cc96c87c36 475a49193b370fbac69aca9f1d461f48f5952942 d34de65bb5848bda05f1e65bcb9b5db63c23e8bd 61742d8f Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2b:c8:5c:af:b0:a5:c0:b9:17:e7:12:fb:45:0a:b9:51:76:b7:68:46],[56:66:d1:a4] modulus: a080a67e2b6ef127478da811d7f7a2daa0b894e9e73febe4d3dfb442af1c9da24a887327c723446af5c7ae11e3102fbfc84e197a3bdc804d506f6fba341d55bf031b42763f250aa0654f16071b82366610541ea426af736e8b21b26808f77e1dcbb19dd2f91da555096d8913425b7a8ea14cc5b497d6f2c1f3732567c9014dd76c8555e2c864d486450d62e0b8d1b5a24ae759ca0030339ee940aeaecd42748287f9b2787b01d826d92d8cf210a0057102ac8d3df0ca208acb373ab74c71f7b3c38c54a2abcfcd7f9d058c9e447b4baecd8dc1d1ad579c2282029e96a968818c7b02ec6b4b39fa279ab6619dbf19635f2dab8c10fb04bc16d7036b8597f43293 public exponent: 10001 ]