2023-01-18 05:00:01,026 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2023-01-18 05:00:03,066 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2023-01-18 05:00:04.450  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Jan 18, 2023 5:00:08 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jan 18, 2023 5:00:08 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jan 18, 2023 5:00:08 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jan 18, 2023 5:00:08 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2023-01-18 05:00:09.381 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2023-01-18 05:00:09.851  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2023-01-18 05:00:10.174  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2023-01-18 05:00:12.003 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2023-01-18 05:00:12.008 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2023-01-18 05:00:12.014 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2023-01-18 05:00:12.024 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2023-01-18 05:00:12.087 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2023-01-18 05:00:12.096 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2023-01-18 05:00:12.312 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2023-01-18 05:00:13.615 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jan 18, 2023 5:00:15 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2023-01-18 05:00:15.658  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 16.371 seconds (JVM running for 19.141) Jan 18, 2023 5:00:34 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2023-01-18 05:00:49.023  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-18 05:00:49.038 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-18 05:00:49.108 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2023-01-18 05:00:49.114 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-18 05:00:49.148  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2023-01-18 05:00:49.151  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-18 05:00:49.153  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-18 05:00:49.155 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-18 05:00:49.156 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-18 05:00:49.162 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-18 05:00:49.175 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-18 05:00:49.181 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-18 05:00:49.295 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-18 05:00:49.301 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-18 05:00:49.305 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-18 05:00:49.315 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-18 05:00:50.304  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-18 05:00:50.308  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-18 05:00:50.309 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-18 05:00:50.312 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-18 05:00:50.344  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-18 05:00:50.345  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-18 05:00:50.346 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 05:00:50.347 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-18 05:00:50.347 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-18 05:00:50.373 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 05:00:50.384 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-18 05:00:50.384 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-18 05:00:50.394 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 05:00:50.395 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-18 05:00:50.395 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-18 05:00:50.397 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-18 05:00:50.453 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 31851559814539754315733953952512460585595732365 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jan 18 04:56:47 UTC 2023 Final Date: Mon Jan 17 04:56:46 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ae:12:4f:31:0a:ac:81:a0:25:13:cf:3d:42:de:6b:4a:61:09:7c:33],[56:66:d1:a4] modulus: b129fa36d1eeaf76152fe3c1705dafb73c4c6d0c32eb8fc001c12abae5a5250afe8fbd3ead5a19eed2d950678f051d6933e6198b5af608a7514f176e3ad9c42c996e9642825f86e29a7d47c34c303235451ed2f283ab3d168fa2cda705583ff0f232c8107db896afd630bb71e030c065fb20ae69d4f1cdbb0ae7e11dc034c71299633d0e13d90b847ba0fb8b013de48f0ce5a17c5dcb1904413930fefc645139fb0f7808b271c6a16cb8bcb0fe40f9586cc83faf9a1e554ce46917e167f0d777b22dd220ac32651f794423117bbdccb6ee6b93b840236259be9d05c720445b7743d518ec0cc451125f9e765276426627e9607fc1a0ebb357163852adabf2a8446d88ad8a982d36aa0717057b6955a6dfe56049b0e4c7fa98b9cd4f8abcf8a76fcd75d5bb10e859a7aca7d78ec62d5d8d7cdffb21828bea8f0c6ffd7803181b2d7c93dfe50521f140f60bbddc59ef3158add833327afebaa41e7ba805d8ac0305d5de6af7e97242d0cf62ebd9484c101e47ac838945d74522be458d8136d5123d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 58e9e471c152cdae8254c31523ef68f4cae656ba dbd3bb40d719326e7817b71febfb2772956f8bfd 449bfae055e68958c0a1da88bb58192c2e4e093c 0be5ab52ca4d4e2f59d6d0a384b0aae749fc0505 eec3a46a9c64cf1ead10acb3ad3f360259a0ca7a 29530f2c551f73d2090737046d6df7314c44161e 74fca06344d47e2b802770de36878e524f0a2947 5c82a145921b7e9090923c80175e29db630e0bd5 832e8c70714d20c74f8ac604e4cdbc6bef1f5ae2 2658391b5d27deffe0b61869a480dcf5b16171c5 3c8f6a3f9e6cc26bd12e44805c6d03fc49f90811 1e5230a9fad5ffc52e864b2737f9e56f83aed4b6 707c90c5ff907ff96b68192c772803684e448a56 1c33ef88bf169f22a72270a15f790bafd8c25539 e6632704280a0db114e58219cd215e039cb28fd9 f11f4af964bd3a9773a221456a78af4a3f5c290f d547ef5b71be3deadbdbf43100a96ab6cc0cd3e7 b04d4536e90e504dd1c335ad2b558ae59424007d f9236399e57647662a7a26e8e26ad4a5f0ba82cd c741add8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b0:8b:c6:fa:57:38:85:35:c1:4f:8f:53:99:82:4e:37:c6:23:76:8a],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-18 06:35:47.796  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-18 06:35:47.802 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-18 06:35:47.807 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-18 06:35:47.809 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-18 06:35:47.811  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-18 06:35:47.817  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-18 06:35:47.819  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-18 06:35:47.820 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-18 06:35:47.821 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-18 06:35:47.822 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-18 06:35:47.829 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-18 06:35:47.830 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-18 06:35:47.831 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-18 06:35:47.832 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-18 06:35:48.048  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-18 06:35:48.049  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-18 06:35:48.050 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-18 06:35:48.051 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-18 06:35:48.056  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-18 06:35:48.057  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-18 06:35:48.060 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 06:35:48.061 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-18 06:35:48.063 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-18 06:35:48.066 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 06:35:48.066 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-18 06:35:48.067 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-18 06:35:48.069 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 06:35:48.069 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-18 06:35:48.070 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-18 06:35:48.072 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-18 06:35:48.081 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 31851559814539754315733953952512460585595732365 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jan 18 04:56:47 UTC 2023 Final Date: Mon Jan 17 04:56:46 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ae:12:4f:31:0a:ac:81:a0:25:13:cf:3d:42:de:6b:4a:61:09:7c:33],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 58e9e471c152cdae8254c31523ef68f4cae656ba dbd3bb40d719326e7817b71febfb2772956f8bfd 449bfae055e68958c0a1da88bb58192c2e4e093c 0be5ab52ca4d4e2f59d6d0a384b0aae749fc0505 eec3a46a9c64cf1ead10acb3ad3f360259a0ca7a 29530f2c551f73d2090737046d6df7314c44161e 74fca06344d47e2b802770de36878e524f0a2947 5c82a145921b7e9090923c80175e29db630e0bd5 832e8c70714d20c74f8ac604e4cdbc6bef1f5ae2 2658391b5d27deffe0b61869a480dcf5b16171c5 3c8f6a3f9e6cc26bd12e44805c6d03fc49f90811 1e5230a9fad5ffc52e864b2737f9e56f83aed4b6 707c90c5ff907ff96b68192c772803684e448a56 1c33ef88bf169f22a72270a15f790bafd8c25539 e6632704280a0db114e58219cd215e039cb28fd9 f11f4af964bd3a9773a221456a78af4a3f5c290f d547ef5b71be3deadbdbf43100a96ab6cc0cd3e7 b04d4536e90e504dd1c335ad2b558ae59424007d f9236399e57647662a7a26e8e26ad4a5f0ba82cd c741add8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [cf:3f:98:21:58:b6:7b:3e:d1:e2:4b:3a:54:ab:36:d2:d6:92:1c:b5],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-18 06:37:35.539  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-18 06:37:35.540 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-18 06:37:35.542 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2023-01-18 06:37:35.544 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-18 06:37:35.544  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2023-01-18 06:37:35.545  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-18 06:37:35.545  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-18 06:37:35.546 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-18 06:37:35.546 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-18 06:37:35.547 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-18 06:37:35.556 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-18 06:37:35.557 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-18 06:37:35.558 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-18 06:37:35.559 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-18 06:37:35.817  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-18 06:37:35.819  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-18 06:37:35.819 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-18 06:37:35.819 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-18 06:37:35.845  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-18 06:37:35.847  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-18 06:37:35.847 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 06:37:35.848 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-18 06:37:35.852 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-18 06:37:35.854 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 06:37:35.855 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-18 06:37:35.856 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-18 06:37:35.858 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 06:37:35.859 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-18 06:37:35.859 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-18 06:37:35.862 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-18 06:37:35.870 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 31851559814539754315733953952512460585595732365 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jan 18 04:56:47 UTC 2023 Final Date: Mon Jan 17 04:56:46 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ae:12:4f:31:0a:ac:81:a0:25:13:cf:3d:42:de:6b:4a:61:09:7c:33],[56:66:d1:a4] modulus: b129fa36d1eeaf76152fe3c1705dafb73c4c6d0c32eb8fc001c12abae5a5250afe8fbd3ead5a19eed2d950678f051d6933e6198b5af608a7514f176e3ad9c42c996e9642825f86e29a7d47c34c303235451ed2f283ab3d168fa2cda705583ff0f232c8107db896afd630bb71e030c065fb20ae69d4f1cdbb0ae7e11dc034c71299633d0e13d90b847ba0fb8b013de48f0ce5a17c5dcb1904413930fefc645139fb0f7808b271c6a16cb8bcb0fe40f9586cc83faf9a1e554ce46917e167f0d777b22dd220ac32651f794423117bbdccb6ee6b93b840236259be9d05c720445b7743d518ec0cc451125f9e765276426627e9607fc1a0ebb357163852adabf2a8446d88ad8a982d36aa0717057b6955a6dfe56049b0e4c7fa98b9cd4f8abcf8a76fcd75d5bb10e859a7aca7d78ec62d5d8d7cdffb21828bea8f0c6ffd7803181b2d7c93dfe50521f140f60bbddc59ef3158add833327afebaa41e7ba805d8ac0305d5de6af7e97242d0cf62ebd9484c101e47ac838945d74522be458d8136d5123d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 58e9e471c152cdae8254c31523ef68f4cae656ba dbd3bb40d719326e7817b71febfb2772956f8bfd 449bfae055e68958c0a1da88bb58192c2e4e093c 0be5ab52ca4d4e2f59d6d0a384b0aae749fc0505 eec3a46a9c64cf1ead10acb3ad3f360259a0ca7a 29530f2c551f73d2090737046d6df7314c44161e 74fca06344d47e2b802770de36878e524f0a2947 5c82a145921b7e9090923c80175e29db630e0bd5 832e8c70714d20c74f8ac604e4cdbc6bef1f5ae2 2658391b5d27deffe0b61869a480dcf5b16171c5 3c8f6a3f9e6cc26bd12e44805c6d03fc49f90811 1e5230a9fad5ffc52e864b2737f9e56f83aed4b6 707c90c5ff907ff96b68192c772803684e448a56 1c33ef88bf169f22a72270a15f790bafd8c25539 e6632704280a0db114e58219cd215e039cb28fd9 f11f4af964bd3a9773a221456a78af4a3f5c290f d547ef5b71be3deadbdbf43100a96ab6cc0cd3e7 b04d4536e90e504dd1c335ad2b558ae59424007d f9236399e57647662a7a26e8e26ad4a5f0ba82cd c741add8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d5:76:c5:64:b9:c3:58:6e:35:bc:56:94:c3:aa:9a:6c:96:0a:df:27],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-18 06:39:33.548  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-18 06:39:33.550 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-18 06:39:33.553 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2023-01-18 06:39:33.554 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-18 06:39:33.555  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2023-01-18 06:39:33.556  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-18 06:39:33.557  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-18 06:39:33.557 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-18 06:39:33.558 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-18 06:39:33.561 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-18 06:39:33.569 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-18 06:39:33.570 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-18 06:39:33.571 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-18 06:39:33.571 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-18 06:39:33.699  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-18 06:39:33.700  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-18 06:39:33.701 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-18 06:39:33.701 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-18 06:39:33.703  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-18 06:39:33.703  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-18 06:39:33.704 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 06:39:33.704 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-18 06:39:33.706 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-18 06:39:33.707 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 06:39:33.707 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-18 06:39:33.709 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-18 06:39:33.710 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 06:39:33.711 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-18 06:39:33.711 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-18 06:39:33.715 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-18 06:39:33.720 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 31851559814539754315733953952512460585595732365 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jan 18 04:56:47 UTC 2023 Final Date: Mon Jan 17 04:56:46 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ae:12:4f:31:0a:ac:81:a0:25:13:cf:3d:42:de:6b:4a:61:09:7c:33],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 58e9e471c152cdae8254c31523ef68f4cae656ba dbd3bb40d719326e7817b71febfb2772956f8bfd 449bfae055e68958c0a1da88bb58192c2e4e093c 0be5ab52ca4d4e2f59d6d0a384b0aae749fc0505 eec3a46a9c64cf1ead10acb3ad3f360259a0ca7a 29530f2c551f73d2090737046d6df7314c44161e 74fca06344d47e2b802770de36878e524f0a2947 5c82a145921b7e9090923c80175e29db630e0bd5 832e8c70714d20c74f8ac604e4cdbc6bef1f5ae2 2658391b5d27deffe0b61869a480dcf5b16171c5 3c8f6a3f9e6cc26bd12e44805c6d03fc49f90811 1e5230a9fad5ffc52e864b2737f9e56f83aed4b6 707c90c5ff907ff96b68192c772803684e448a56 1c33ef88bf169f22a72270a15f790bafd8c25539 e6632704280a0db114e58219cd215e039cb28fd9 f11f4af964bd3a9773a221456a78af4a3f5c290f d547ef5b71be3deadbdbf43100a96ab6cc0cd3e7 b04d4536e90e504dd1c335ad2b558ae59424007d f9236399e57647662a7a26e8e26ad4a5f0ba82cd c741add8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [bf:44:59:33:25:29:81:30:65:4f:7a:5c:50:cf:18:92:d7:a7:32:72],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-18 06:43:05.782  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-18 06:43:05.785 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-18 06:43:05.788 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-18 06:43:05.789 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-18 06:43:05.790  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-18 06:43:05.791  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-18 06:43:05.792  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-18 06:43:05.793 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-18 06:43:05.794 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-18 06:43:05.794 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-18 06:43:05.800 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-18 06:43:05.802 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-18 06:43:05.802 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-18 06:43:05.803 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-18 06:43:05.990  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-18 06:43:05.991  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-18 06:43:05.992 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-18 06:43:05.992 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-18 06:43:05.995  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-18 06:43:05.996  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-18 06:43:05.996 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 06:43:05.997 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-18 06:43:05.997 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-18 06:43:05.998 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 06:43:05.998 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-18 06:43:05.999 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-18 06:43:05.999 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 06:43:06.000 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-18 06:43:06.000 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-18 06:43:06.001 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-18 06:43:06.004 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 31851559814539754315733953952512460585595732365 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jan 18 04:56:47 UTC 2023 Final Date: Mon Jan 17 04:56:46 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ae:12:4f:31:0a:ac:81:a0:25:13:cf:3d:42:de:6b:4a:61:09:7c:33],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 58e9e471c152cdae8254c31523ef68f4cae656ba dbd3bb40d719326e7817b71febfb2772956f8bfd 449bfae055e68958c0a1da88bb58192c2e4e093c 0be5ab52ca4d4e2f59d6d0a384b0aae749fc0505 eec3a46a9c64cf1ead10acb3ad3f360259a0ca7a 29530f2c551f73d2090737046d6df7314c44161e 74fca06344d47e2b802770de36878e524f0a2947 5c82a145921b7e9090923c80175e29db630e0bd5 832e8c70714d20c74f8ac604e4cdbc6bef1f5ae2 2658391b5d27deffe0b61869a480dcf5b16171c5 3c8f6a3f9e6cc26bd12e44805c6d03fc49f90811 1e5230a9fad5ffc52e864b2737f9e56f83aed4b6 707c90c5ff907ff96b68192c772803684e448a56 1c33ef88bf169f22a72270a15f790bafd8c25539 e6632704280a0db114e58219cd215e039cb28fd9 f11f4af964bd3a9773a221456a78af4a3f5c290f d547ef5b71be3deadbdbf43100a96ab6cc0cd3e7 b04d4536e90e504dd1c335ad2b558ae59424007d f9236399e57647662a7a26e8e26ad4a5f0ba82cd c741add8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f9:39:5a:36:3b:60:34:91:b6:88:f8:2f:a4:a7:7b:99:0a:56:a7:27],[56:66:d1:a4] modulus: bb24453af3ce157a8399812b86b4bd5beff3c0c915176b5e2f8cbebbe192dfe65c80cfab586d57d5f6ac3c9c141ff6e6010a8f95271156721e24414c476086d535485fe84e58766f191f7e84c3b2b5ed02db4227d52a025c51c1db6880e6678dd37102ea08d75961877ca37c17b4187f91904435cfc646af47809caa5301781ff85e38c9a27fb85b19931fd9bca2feee56610cf5c502e3411f3eada9ff49ad56f3bfe2af4032e8fb283d36cf6139161df277bb1ace08045ec43cd68e35624422246b698a639c8973f5e8dd893e93f6a1374dfa16c5316e080e10f7e3a7c83beebd7616c5467040c8a41f17a1fbff6bfdd7a6f22ae9e4a16703d2aac0d4de82c5 public exponent: 10001 ] 2023-01-18 06:49:57.594  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-18 06:49:57.598 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-18 06:49:57.600 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-18 06:49:57.602 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-18 06:49:57.602  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-18 06:49:57.603  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-18 06:49:57.605  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-18 06:49:57.606 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-18 06:49:57.607 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-18 06:49:57.609 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-18 06:49:57.616 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-18 06:49:57.618 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-18 06:49:57.618 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-18 06:49:57.618 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-18 06:49:57.825  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-18 06:49:57.827  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-18 06:49:57.827 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-18 06:49:57.827 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-18 06:49:57.829  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-18 06:49:57.830  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-18 06:49:57.831 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 06:49:57.832 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-18 06:49:57.832 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-18 06:49:57.833 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 06:49:57.834 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-18 06:49:57.834 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-18 06:49:57.835 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 06:49:57.836 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-18 06:49:57.836 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-18 06:49:57.837 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-18 06:49:57.843 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 31851559814539754315733953952512460585595732365 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jan 18 04:56:47 UTC 2023 Final Date: Mon Jan 17 04:56:46 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ae:12:4f:31:0a:ac:81:a0:25:13:cf:3d:42:de:6b:4a:61:09:7c:33],[56:66:d1:a4] modulus: b129fa36d1eeaf76152fe3c1705dafb73c4c6d0c32eb8fc001c12abae5a5250afe8fbd3ead5a19eed2d950678f051d6933e6198b5af608a7514f176e3ad9c42c996e9642825f86e29a7d47c34c303235451ed2f283ab3d168fa2cda705583ff0f232c8107db896afd630bb71e030c065fb20ae69d4f1cdbb0ae7e11dc034c71299633d0e13d90b847ba0fb8b013de48f0ce5a17c5dcb1904413930fefc645139fb0f7808b271c6a16cb8bcb0fe40f9586cc83faf9a1e554ce46917e167f0d777b22dd220ac32651f794423117bbdccb6ee6b93b840236259be9d05c720445b7743d518ec0cc451125f9e765276426627e9607fc1a0ebb357163852adabf2a8446d88ad8a982d36aa0717057b6955a6dfe56049b0e4c7fa98b9cd4f8abcf8a76fcd75d5bb10e859a7aca7d78ec62d5d8d7cdffb21828bea8f0c6ffd7803181b2d7c93dfe50521f140f60bbddc59ef3158add833327afebaa41e7ba805d8ac0305d5de6af7e97242d0cf62ebd9484c101e47ac838945d74522be458d8136d5123d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 58e9e471c152cdae8254c31523ef68f4cae656ba dbd3bb40d719326e7817b71febfb2772956f8bfd 449bfae055e68958c0a1da88bb58192c2e4e093c 0be5ab52ca4d4e2f59d6d0a384b0aae749fc0505 eec3a46a9c64cf1ead10acb3ad3f360259a0ca7a 29530f2c551f73d2090737046d6df7314c44161e 74fca06344d47e2b802770de36878e524f0a2947 5c82a145921b7e9090923c80175e29db630e0bd5 832e8c70714d20c74f8ac604e4cdbc6bef1f5ae2 2658391b5d27deffe0b61869a480dcf5b16171c5 3c8f6a3f9e6cc26bd12e44805c6d03fc49f90811 1e5230a9fad5ffc52e864b2737f9e56f83aed4b6 707c90c5ff907ff96b68192c772803684e448a56 1c33ef88bf169f22a72270a15f790bafd8c25539 e6632704280a0db114e58219cd215e039cb28fd9 f11f4af964bd3a9773a221456a78af4a3f5c290f d547ef5b71be3deadbdbf43100a96ab6cc0cd3e7 b04d4536e90e504dd1c335ad2b558ae59424007d f9236399e57647662a7a26e8e26ad4a5f0ba82cd c741add8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a0:af:fe:aa:f5:3c:34:ff:74:00:23:59:d8:b1:2a:c8:5e:9a:4e:77],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-18 06:56:23.487  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-18 06:56:23.505 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-18 06:56:23.510 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-18 06:56:23.513 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-18 06:56:23.514  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-18 06:56:23.515  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-18 06:56:23.515  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-18 06:56:23.516 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-18 06:56:23.517 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-18 06:56:23.517 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-18 06:56:23.524 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-18 06:56:23.526 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-18 06:56:23.526 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-18 06:56:23.527 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-18 06:56:23.708  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-18 06:56:23.709  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-18 06:56:23.709 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-18 06:56:23.711 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-18 06:56:23.712  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-18 06:56:23.713  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-18 06:56:23.714 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 06:56:23.714 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-18 06:56:23.714 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-18 06:56:23.715 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 06:56:23.716 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-18 06:56:23.716 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-18 06:56:23.717 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 06:56:23.717 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-18 06:56:23.718 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-18 06:56:23.719 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-18 06:56:23.724 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 31851559814539754315733953952512460585595732365 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jan 18 04:56:47 UTC 2023 Final Date: Mon Jan 17 04:56:46 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ae:12:4f:31:0a:ac:81:a0:25:13:cf:3d:42:de:6b:4a:61:09:7c:33],[56:66:d1:a4] modulus: b129fa36d1eeaf76152fe3c1705dafb73c4c6d0c32eb8fc001c12abae5a5250afe8fbd3ead5a19eed2d950678f051d6933e6198b5af608a7514f176e3ad9c42c996e9642825f86e29a7d47c34c303235451ed2f283ab3d168fa2cda705583ff0f232c8107db896afd630bb71e030c065fb20ae69d4f1cdbb0ae7e11dc034c71299633d0e13d90b847ba0fb8b013de48f0ce5a17c5dcb1904413930fefc645139fb0f7808b271c6a16cb8bcb0fe40f9586cc83faf9a1e554ce46917e167f0d777b22dd220ac32651f794423117bbdccb6ee6b93b840236259be9d05c720445b7743d518ec0cc451125f9e765276426627e9607fc1a0ebb357163852adabf2a8446d88ad8a982d36aa0717057b6955a6dfe56049b0e4c7fa98b9cd4f8abcf8a76fcd75d5bb10e859a7aca7d78ec62d5d8d7cdffb21828bea8f0c6ffd7803181b2d7c93dfe50521f140f60bbddc59ef3158add833327afebaa41e7ba805d8ac0305d5de6af7e97242d0cf62ebd9484c101e47ac838945d74522be458d8136d5123d public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 58e9e471c152cdae8254c31523ef68f4cae656ba dbd3bb40d719326e7817b71febfb2772956f8bfd 449bfae055e68958c0a1da88bb58192c2e4e093c 0be5ab52ca4d4e2f59d6d0a384b0aae749fc0505 eec3a46a9c64cf1ead10acb3ad3f360259a0ca7a 29530f2c551f73d2090737046d6df7314c44161e 74fca06344d47e2b802770de36878e524f0a2947 5c82a145921b7e9090923c80175e29db630e0bd5 832e8c70714d20c74f8ac604e4cdbc6bef1f5ae2 2658391b5d27deffe0b61869a480dcf5b16171c5 3c8f6a3f9e6cc26bd12e44805c6d03fc49f90811 1e5230a9fad5ffc52e864b2737f9e56f83aed4b6 707c90c5ff907ff96b68192c772803684e448a56 1c33ef88bf169f22a72270a15f790bafd8c25539 e6632704280a0db114e58219cd215e039cb28fd9 f11f4af964bd3a9773a221456a78af4a3f5c290f d547ef5b71be3deadbdbf43100a96ab6cc0cd3e7 b04d4536e90e504dd1c335ad2b558ae59424007d f9236399e57647662a7a26e8e26ad4a5f0ba82cd c741add8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [14:55:6f:c6:c8:5c:c4:37:70:0e:92:7f:65:41:1e:23:ef:d6:d7:52],[56:66:d1:a4] modulus: b53a883a1cd0b758bf9c3c7ab75ce8b3d77232a3e1de344b435aa9b733bd130dd9137c98cd58b94bd329fa73cee61d301f7ac65c896aae6b8bca784dbcd011755b5212b13789bd459eaa66433579408e022636e946e450fb067d9edda5ff03ef209ec860c705c231aaa70db0456de5a8aca08d36cbb752971625f022d917314dfc5f7e6992670f43b126327af4b9a9fea2951ff6d0a175faa8ce9a61f6c1bb75453230e5cba8a43f54bedac56a41f31734473b08fedfe62a375c7392a8a0e3ee9a8f0180caa07213bd85c0c57fb4cd2d66c9a72df1fee374531680a46763e096518307dfdb0959cbae6fc6777175e522ec9dd275b86fd2598e41d18f1f70351b public exponent: 10001 ] 2023-01-18 07:05:32.633  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-18 07:05:32.637 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-18 07:05:32.639 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-18 07:05:32.641 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-18 07:05:32.641  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-18 07:05:32.642  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-18 07:05:32.642  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-18 07:05:32.643 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-18 07:05:32.643 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-18 07:05:32.644 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-18 07:05:32.649 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-18 07:05:32.650 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-18 07:05:32.651 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-18 07:05:32.651 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-18 07:05:32.842  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-18 07:05:32.843  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-18 07:05:32.843 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-18 07:05:32.844 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-18 07:05:32.845  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-18 07:05:32.846  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-18 07:05:32.846 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 07:05:32.847 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-18 07:05:32.847 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-18 07:05:32.848 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 07:05:32.849 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-18 07:05:32.849 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-18 07:05:32.850 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 07:05:32.851 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-18 07:05:32.851 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-18 07:05:32.852 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-18 07:05:32.864 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 31851559814539754315733953952512460585595732365 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jan 18 04:56:47 UTC 2023 Final Date: Mon Jan 17 04:56:46 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ae:12:4f:31:0a:ac:81:a0:25:13:cf:3d:42:de:6b:4a:61:09:7c:33],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 58e9e471c152cdae8254c31523ef68f4cae656ba dbd3bb40d719326e7817b71febfb2772956f8bfd 449bfae055e68958c0a1da88bb58192c2e4e093c 0be5ab52ca4d4e2f59d6d0a384b0aae749fc0505 eec3a46a9c64cf1ead10acb3ad3f360259a0ca7a 29530f2c551f73d2090737046d6df7314c44161e 74fca06344d47e2b802770de36878e524f0a2947 5c82a145921b7e9090923c80175e29db630e0bd5 832e8c70714d20c74f8ac604e4cdbc6bef1f5ae2 2658391b5d27deffe0b61869a480dcf5b16171c5 3c8f6a3f9e6cc26bd12e44805c6d03fc49f90811 1e5230a9fad5ffc52e864b2737f9e56f83aed4b6 707c90c5ff907ff96b68192c772803684e448a56 1c33ef88bf169f22a72270a15f790bafd8c25539 e6632704280a0db114e58219cd215e039cb28fd9 f11f4af964bd3a9773a221456a78af4a3f5c290f d547ef5b71be3deadbdbf43100a96ab6cc0cd3e7 b04d4536e90e504dd1c335ad2b558ae59424007d f9236399e57647662a7a26e8e26ad4a5f0ba82cd c741add8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9e:8f:f7:f7:d4:eb:8f:93:08:57:aa:6c:2a:2d:fa:18:cf:d3:bd:d2],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-18 07:11:23.034  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-18 07:11:23.035 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-18 07:11:23.045 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-18 07:11:23.046 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-18 07:11:23.047  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-18 07:11:23.047  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-18 07:11:23.048  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-18 07:11:23.048 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-18 07:11:23.048 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-18 07:11:23.049 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-18 07:11:23.053 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-18 07:11:23.054 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-18 07:11:23.054 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-18 07:11:23.054 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-18 07:11:23.199  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-18 07:11:23.200  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-18 07:11:23.200 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-18 07:11:23.200 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-18 07:11:23.202  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-18 07:11:23.202  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-18 07:11:23.202 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 07:11:23.203 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-18 07:11:23.203 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-18 07:11:23.204 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 07:11:23.204 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-18 07:11:23.204 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-18 07:11:23.205 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 07:11:23.205 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-18 07:11:23.205 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-18 07:11:23.206 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-18 07:11:23.210 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 31851559814539754315733953952512460585595732365 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jan 18 04:56:47 UTC 2023 Final Date: Mon Jan 17 04:56:46 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ae:12:4f:31:0a:ac:81:a0:25:13:cf:3d:42:de:6b:4a:61:09:7c:33],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 58e9e471c152cdae8254c31523ef68f4cae656ba dbd3bb40d719326e7817b71febfb2772956f8bfd 449bfae055e68958c0a1da88bb58192c2e4e093c 0be5ab52ca4d4e2f59d6d0a384b0aae749fc0505 eec3a46a9c64cf1ead10acb3ad3f360259a0ca7a 29530f2c551f73d2090737046d6df7314c44161e 74fca06344d47e2b802770de36878e524f0a2947 5c82a145921b7e9090923c80175e29db630e0bd5 832e8c70714d20c74f8ac604e4cdbc6bef1f5ae2 2658391b5d27deffe0b61869a480dcf5b16171c5 3c8f6a3f9e6cc26bd12e44805c6d03fc49f90811 1e5230a9fad5ffc52e864b2737f9e56f83aed4b6 707c90c5ff907ff96b68192c772803684e448a56 1c33ef88bf169f22a72270a15f790bafd8c25539 e6632704280a0db114e58219cd215e039cb28fd9 f11f4af964bd3a9773a221456a78af4a3f5c290f d547ef5b71be3deadbdbf43100a96ab6cc0cd3e7 b04d4536e90e504dd1c335ad2b558ae59424007d f9236399e57647662a7a26e8e26ad4a5f0ba82cd c741add8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ba:ad:c5:34:1f:70:be:9c:57:3a:4a:ac:94:b1:85:9e:ad:89:fc:05],[56:66:d1:a4] modulus: d9c7e221fb34c2a7f5d8ac4008f81855caf4dfb35dc1a4fa676334240c57c82c65bc3e4c95b60261bbcc75fa25a48038beca03d88cd24bdf18847346b40effec6e0dba2d253c9c7c0c2c3819b6fcdd8dfe61fd6ac5e78711705e3092149e848fd00e15c7854b9f9a09f4c619d1abe4b3779dba2adf6c51a973cf228f390f66094a0f9fb9063ab0d19046ee76923c0b1ed85d7bedd62075dd0b8558686998a91bdcd61e74f9f5c43accff523ac2a8a3101eb7e01c1abc9400c0cb703cb19919b391ecc1476d4d9f2b2fae43c5e8b278c4ec0d26cbf177f3312646932f918b1601eb6df27fecb540bf4fbbeb3897adf2642ab70df0e6999e49051735f50220fe21 public exponent: 10001 ] 2023-01-18 07:18:43.751  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-18 07:18:43.755 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-18 07:18:43.758 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2023-01-18 07:18:43.759 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-18 07:18:43.759  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2023-01-18 07:18:43.760  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-18 07:18:43.761  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-18 07:18:43.761 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-18 07:18:43.762 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-18 07:18:43.763 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-18 07:18:43.768 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-18 07:18:43.769 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-18 07:18:43.770 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-18 07:18:43.770 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-18 07:18:43.937  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-18 07:18:43.938  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-18 07:18:43.939 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-18 07:18:43.939 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-18 07:18:43.940  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-18 07:18:43.941  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-18 07:18:43.941 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 07:18:43.942 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-18 07:18:43.943 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-18 07:18:43.944 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 07:18:43.944 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-18 07:18:43.945 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-18 07:18:43.947 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 07:18:43.947 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-18 07:18:43.947 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-18 07:18:43.949 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-18 07:18:43.955 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 31851559814539754315733953952512460585595732365 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jan 18 04:56:47 UTC 2023 Final Date: Mon Jan 17 04:56:46 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ae:12:4f:31:0a:ac:81:a0:25:13:cf:3d:42:de:6b:4a:61:09:7c:33],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 58e9e471c152cdae8254c31523ef68f4cae656ba dbd3bb40d719326e7817b71febfb2772956f8bfd 449bfae055e68958c0a1da88bb58192c2e4e093c 0be5ab52ca4d4e2f59d6d0a384b0aae749fc0505 eec3a46a9c64cf1ead10acb3ad3f360259a0ca7a 29530f2c551f73d2090737046d6df7314c44161e 74fca06344d47e2b802770de36878e524f0a2947 5c82a145921b7e9090923c80175e29db630e0bd5 832e8c70714d20c74f8ac604e4cdbc6bef1f5ae2 2658391b5d27deffe0b61869a480dcf5b16171c5 3c8f6a3f9e6cc26bd12e44805c6d03fc49f90811 1e5230a9fad5ffc52e864b2737f9e56f83aed4b6 707c90c5ff907ff96b68192c772803684e448a56 1c33ef88bf169f22a72270a15f790bafd8c25539 e6632704280a0db114e58219cd215e039cb28fd9 f11f4af964bd3a9773a221456a78af4a3f5c290f d547ef5b71be3deadbdbf43100a96ab6cc0cd3e7 b04d4536e90e504dd1c335ad2b558ae59424007d f9236399e57647662a7a26e8e26ad4a5f0ba82cd c741add8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [19:ba:25:ae:18:c0:78:1e:f0:ed:a5:7a:af:9e:83:21:6e:cf:35:e4],[56:66:d1:a4] modulus: bf38e99c3b88b9150ae29ed3674d3c818509263bf125c571f1909caa30f0a4e21455dc9e501c442f56649d06364e06501e4d667c88703fd29802768a5e2b93a6b136336e748d18de462fa6bf192c17d254c18b6cd8c7c1b94465fdc7e605878cc889016f36406e4bd7787fa1f4de8e4a325eae2fa811db990366cc5a4340ab9c2c229b082d3ba10705dbbd11a64933fbfd44c07bb6b058c6a46b0de18cfe6793b4d4b050415c6105e26c3209275c6d3a1c527c8aeb964f19e1cdc289013c901292ba5ea6199133ebeb914b4979c814e8791a063d95aae4980e86fa48ce05b20a2f12f8f96e58649609bf5a803d78fc8fe072e5c5a1c84c707f6d9c490826ce89 public exponent: 10001 ] 2023-01-18 07:45:17.109  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-18 07:45:17.116 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-18 07:45:17.119 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-18 07:45:17.120 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-18 07:45:17.121  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-18 07:45:17.122  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-18 07:45:17.123  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-18 07:45:17.123 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-18 07:45:17.124 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-18 07:45:17.124 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-18 07:45:17.130 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-18 07:45:17.132 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-18 07:45:17.132 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-18 07:45:17.133 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-18 07:45:17.278  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-18 07:45:17.279  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-18 07:45:17.279 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-18 07:45:17.280 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-18 07:45:17.281  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-18 07:45:17.282  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-18 07:45:17.282 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 07:45:17.283 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-18 07:45:17.283 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-18 07:45:17.284 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 07:45:17.285 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-18 07:45:17.285 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-18 07:45:17.286 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 07:45:17.287 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-18 07:45:17.287 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-18 07:45:17.288 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-18 07:45:17.292 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 31851559814539754315733953952512460585595732365 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jan 18 04:56:47 UTC 2023 Final Date: Mon Jan 17 04:56:46 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ae:12:4f:31:0a:ac:81:a0:25:13:cf:3d:42:de:6b:4a:61:09:7c:33],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 58e9e471c152cdae8254c31523ef68f4cae656ba dbd3bb40d719326e7817b71febfb2772956f8bfd 449bfae055e68958c0a1da88bb58192c2e4e093c 0be5ab52ca4d4e2f59d6d0a384b0aae749fc0505 eec3a46a9c64cf1ead10acb3ad3f360259a0ca7a 29530f2c551f73d2090737046d6df7314c44161e 74fca06344d47e2b802770de36878e524f0a2947 5c82a145921b7e9090923c80175e29db630e0bd5 832e8c70714d20c74f8ac604e4cdbc6bef1f5ae2 2658391b5d27deffe0b61869a480dcf5b16171c5 3c8f6a3f9e6cc26bd12e44805c6d03fc49f90811 1e5230a9fad5ffc52e864b2737f9e56f83aed4b6 707c90c5ff907ff96b68192c772803684e448a56 1c33ef88bf169f22a72270a15f790bafd8c25539 e6632704280a0db114e58219cd215e039cb28fd9 f11f4af964bd3a9773a221456a78af4a3f5c290f d547ef5b71be3deadbdbf43100a96ab6cc0cd3e7 b04d4536e90e504dd1c335ad2b558ae59424007d f9236399e57647662a7a26e8e26ad4a5f0ba82cd c741add8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1f:bd:46:08:06:01:43:38:01:44:90:98:62:4b:90:d6:01:78:f2:78],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-18 07:45:35.941  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-18 07:45:35.942 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-18 07:45:35.943 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-18 07:45:35.944 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-18 07:45:35.944  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-18 07:45:35.945  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-18 07:45:35.945  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-18 07:45:35.946 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-18 07:45:35.946 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-18 07:45:35.947 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-18 07:45:35.951 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-18 07:45:35.951 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-18 07:45:35.952 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-18 07:45:35.952 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-18 07:45:36.121  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-18 07:45:36.121  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-18 07:45:36.122 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-18 07:45:36.122 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-18 07:45:36.124  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-18 07:45:36.124  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-18 07:45:36.125 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 07:45:36.125 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-18 07:45:36.126 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-18 07:45:36.127 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 07:45:36.127 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-18 07:45:36.127 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-18 07:45:36.128 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 07:45:36.129 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-18 07:45:36.129 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-18 07:45:36.130 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-18 07:45:36.134 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 31851559814539754315733953952512460585595732365 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jan 18 04:56:47 UTC 2023 Final Date: Mon Jan 17 04:56:46 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ae:12:4f:31:0a:ac:81:a0:25:13:cf:3d:42:de:6b:4a:61:09:7c:33],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 58e9e471c152cdae8254c31523ef68f4cae656ba dbd3bb40d719326e7817b71febfb2772956f8bfd 449bfae055e68958c0a1da88bb58192c2e4e093c 0be5ab52ca4d4e2f59d6d0a384b0aae749fc0505 eec3a46a9c64cf1ead10acb3ad3f360259a0ca7a 29530f2c551f73d2090737046d6df7314c44161e 74fca06344d47e2b802770de36878e524f0a2947 5c82a145921b7e9090923c80175e29db630e0bd5 832e8c70714d20c74f8ac604e4cdbc6bef1f5ae2 2658391b5d27deffe0b61869a480dcf5b16171c5 3c8f6a3f9e6cc26bd12e44805c6d03fc49f90811 1e5230a9fad5ffc52e864b2737f9e56f83aed4b6 707c90c5ff907ff96b68192c772803684e448a56 1c33ef88bf169f22a72270a15f790bafd8c25539 e6632704280a0db114e58219cd215e039cb28fd9 f11f4af964bd3a9773a221456a78af4a3f5c290f d547ef5b71be3deadbdbf43100a96ab6cc0cd3e7 b04d4536e90e504dd1c335ad2b558ae59424007d f9236399e57647662a7a26e8e26ad4a5f0ba82cd c741add8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [43:3a:03:f1:bb:55:01:02:84:60:17:a3:f6:12:4a:f5:e0:f0:cb:2d],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-18 08:09:54.069  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-18 08:09:54.073 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-18 08:09:54.075 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-18 08:09:54.076 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-18 08:09:54.076  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-18 08:09:54.077  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-18 08:09:54.077  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-18 08:09:54.078 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-18 08:09:54.078 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-18 08:09:54.079 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-18 08:09:54.083 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-18 08:09:54.084 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-18 08:09:54.085 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-18 08:09:54.085 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-18 08:09:54.231  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-18 08:09:54.232  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-18 08:09:54.233 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-18 08:09:54.233 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-18 08:09:54.240  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-18 08:09:54.241  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-18 08:09:54.241 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 08:09:54.241 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-18 08:09:54.246 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-18 08:09:54.247 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 08:09:54.247 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-18 08:09:54.247 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-18 08:09:54.248 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 08:09:54.248 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-18 08:09:54.248 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-18 08:09:54.249 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-18 08:09:54.253 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 31851559814539754315733953952512460585595732365 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jan 18 04:56:47 UTC 2023 Final Date: Mon Jan 17 04:56:46 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ae:12:4f:31:0a:ac:81:a0:25:13:cf:3d:42:de:6b:4a:61:09:7c:33],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 58e9e471c152cdae8254c31523ef68f4cae656ba dbd3bb40d719326e7817b71febfb2772956f8bfd 449bfae055e68958c0a1da88bb58192c2e4e093c 0be5ab52ca4d4e2f59d6d0a384b0aae749fc0505 eec3a46a9c64cf1ead10acb3ad3f360259a0ca7a 29530f2c551f73d2090737046d6df7314c44161e 74fca06344d47e2b802770de36878e524f0a2947 5c82a145921b7e9090923c80175e29db630e0bd5 832e8c70714d20c74f8ac604e4cdbc6bef1f5ae2 2658391b5d27deffe0b61869a480dcf5b16171c5 3c8f6a3f9e6cc26bd12e44805c6d03fc49f90811 1e5230a9fad5ffc52e864b2737f9e56f83aed4b6 707c90c5ff907ff96b68192c772803684e448a56 1c33ef88bf169f22a72270a15f790bafd8c25539 e6632704280a0db114e58219cd215e039cb28fd9 f11f4af964bd3a9773a221456a78af4a3f5c290f d547ef5b71be3deadbdbf43100a96ab6cc0cd3e7 b04d4536e90e504dd1c335ad2b558ae59424007d f9236399e57647662a7a26e8e26ad4a5f0ba82cd c741add8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [29:fb:61:2c:bb:e8:e4:87:a5:4d:0f:f6:99:6b:e5:bd:b3:6d:68:af],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-18 08:10:00.839  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-18 08:10:00.841 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-18 08:10:00.842 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-18 08:10:00.843 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-18 08:10:00.844  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-18 08:10:00.845  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-18 08:10:00.846  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-18 08:10:00.846 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-18 08:10:00.847 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-18 08:10:00.847 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-18 08:10:00.856 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-18 08:10:00.857 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-18 08:10:00.858 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-18 08:10:00.858 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-18 08:10:00.961  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-18 08:10:00.966  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-18 08:10:00.967 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-18 08:10:00.967 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-18 08:10:00.969  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-18 08:10:00.969  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-18 08:10:00.970 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 08:10:00.971 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-18 08:10:00.971 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-18 08:10:00.974 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 08:10:00.975 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-18 08:10:00.975 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-18 08:10:00.977 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-18 08:10:00.977 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-18 08:10:00.979 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-18 08:10:00.980 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-18 08:10:00.988 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 31851559814539754315733953952512460585595732365 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Wed Jan 18 04:56:47 UTC 2023 Final Date: Mon Jan 17 04:56:46 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [ae:12:4f:31:0a:ac:81:a0:25:13:cf:3d:42:de:6b:4a:61:09:7c:33],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 58e9e471c152cdae8254c31523ef68f4cae656ba dbd3bb40d719326e7817b71febfb2772956f8bfd 449bfae055e68958c0a1da88bb58192c2e4e093c 0be5ab52ca4d4e2f59d6d0a384b0aae749fc0505 eec3a46a9c64cf1ead10acb3ad3f360259a0ca7a 29530f2c551f73d2090737046d6df7314c44161e 74fca06344d47e2b802770de36878e524f0a2947 5c82a145921b7e9090923c80175e29db630e0bd5 832e8c70714d20c74f8ac604e4cdbc6bef1f5ae2 2658391b5d27deffe0b61869a480dcf5b16171c5 3c8f6a3f9e6cc26bd12e44805c6d03fc49f90811 1e5230a9fad5ffc52e864b2737f9e56f83aed4b6 707c90c5ff907ff96b68192c772803684e448a56 1c33ef88bf169f22a72270a15f790bafd8c25539 e6632704280a0db114e58219cd215e039cb28fd9 f11f4af964bd3a9773a221456a78af4a3f5c290f d547ef5b71be3deadbdbf43100a96ab6cc0cd3e7 b04d4536e90e504dd1c335ad2b558ae59424007d f9236399e57647662a7a26e8e26ad4a5f0ba82cd c741add8 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c5:bb:ad:fb:a9:e6:af:9a:f4:91:63:36:33:50:6c:7d:ec:ba:8a:dc],[56:66:d1:a4] modulus: bd4e2c1baba6f2e3634588553c91e0ddfb61c849ba8546d25634ab1f7ed6185a43d2c37f635ea5cd25f54827cc9087282722f591ffa150bea55a09dfda34d8f58d1dc540a95831aec05272e1287bf33a2a9cffdeb3d6cc532d3b800271e57666bbfffee8503d53ac4ae1a2dd85d3d517bb3fc6cf221077d7342339e4963e418dd116d548ae2cf258c5c228810de51c754a0ba262ed304d2441efa48a1da71552b8fe1d7c64d5a6fb5cb421067f4e47bcc302eac02737f4edbf0d234ad120d0861a7350b7be2cc7ada9b1046b203275d2843305e707ee8ab1cd23caf543c7e53bf804e0f51de70d7518023d1809ee906d0768f528fdd0f4e399e022eb2d5cc22b public exponent: 10001 ]