2023-01-22 05:00:26,969 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2023-01-22 05:00:27,847 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2023-01-22 05:00:28.786  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Jan 22, 2023 5:00:30 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jan 22, 2023 5:00:30 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jan 22, 2023 5:00:30 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jan 22, 2023 5:00:30 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2023-01-22 05:00:31.285 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2023-01-22 05:00:31.580  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2023-01-22 05:00:31.759  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2023-01-22 05:00:32.565 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2023-01-22 05:00:32.568 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2023-01-22 05:00:32.570 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2023-01-22 05:00:32.573 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2023-01-22 05:00:32.611 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2023-01-22 05:00:32.614 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2023-01-22 05:00:32.731 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2023-01-22 05:00:33.350 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jan 22, 2023 5:00:34 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2023-01-22 05:00:34.299  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 8.076 seconds (JVM running for 9.965) Jan 22, 2023 5:01:04 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2023-01-22 05:01:18.657  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-22 05:01:18.666 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-22 05:01:18.718 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2023-01-22 05:01:18.721 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-22 05:01:18.743  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2023-01-22 05:01:18.746  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-22 05:01:18.747  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-22 05:01:18.749 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-22 05:01:18.749 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-22 05:01:18.754 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-22 05:01:18.764 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-22 05:01:18.768 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-22 05:01:18.828 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-22 05:01:18.834 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-22 05:01:18.835 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-22 05:01:18.839 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-22 05:01:19.403  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-22 05:01:19.407  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-22 05:01:19.408 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-22 05:01:19.409 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-22 05:01:19.420  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-22 05:01:19.422  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-22 05:01:19.422 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-22 05:01:19.423 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-22 05:01:19.423 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-22 05:01:19.441 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-22 05:01:19.441 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-22 05:01:19.442 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-22 05:01:19.450 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-22 05:01:19.451 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-22 05:01:19.451 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-22 05:01:19.453 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-22 05:01:19.504 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 691007299659216531098152160330959923994508174713 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jan 22 04:57:55 UTC 2023 Final Date: Fri Jan 21 04:57:54 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1b:98:ba:c1:31:6c:b2:e0:2d:f8:6c:b7:b6:75:dc:f2:17:62:ae:df],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 86aa967f601009aa880bd05ee2a53f091cb2c25c 04d082efd59abbd3b85d4cba1485c9b1105dcdb2 5bac0685a4b09a167550891d4264d34d5e2b6488 2f6c569495b29b44bac474da1f2b5cebc1d5a554 5da45a6a2a9aec6fb7e5834c9b4dd2c96655b896 62013d0113ee4cecc05c78a9db9cb6ea6e08293f ae9032b4276aa1c348abc735659df896feb681e2 a41b7881ccfb5a89a1e844a6ca888041caf51ea3 f57a50977c2a6dbc1480b97e48601fd9a9606139 35522a6346db12c7a9ff82fa065fc9abe077ef0e caa30f6c2fd92cfcca021f5f491cf4c2a78e0b65 53d390f75caebc844ed83ffb8cf7a2f97fb376ee 17d2eef80b762a90df9a1f4c6ec167bde490a512 883edb9f724e7f6a61bfe7c5e4ed5f0cbdf58209 816a31ad3618e368d0d2dc7ba8f8826fd63d88d6 645d7e229cc06146b634d23b325be35c2334a377 4318dd34295628b3f1ced380cfe6e25523b4e73d 8718df1e1cf0ff801b45c1857fe78b115751a1b2 903b67f31ad5a76992517e7c56ae19db0f449aa0 2797af77 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [26:95:4b:15:3c:d2:7b:ed:54:2d:13:f7:5a:28:e0:c2:2d:a7:99:e6],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-22 06:36:57.725  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-22 06:36:57.729 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-22 06:36:57.732 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-22 06:36:57.734 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-22 06:36:57.735  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-22 06:36:57.736  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-22 06:36:57.737  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-22 06:36:57.738 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-22 06:36:57.738 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-22 06:36:57.739 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-22 06:36:57.745 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-22 06:36:57.746 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-22 06:36:57.747 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-22 06:36:57.747 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-22 06:36:57.938  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-22 06:36:57.939  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-22 06:36:57.940 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-22 06:36:57.941 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-22 06:36:57.945  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-22 06:36:57.946  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-22 06:36:57.946 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-22 06:36:57.947 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-22 06:36:57.947 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-22 06:36:57.948 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-22 06:36:57.949 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-22 06:36:57.949 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-22 06:36:57.950 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-22 06:36:57.951 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-22 06:36:57.951 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-22 06:36:57.952 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-22 06:36:57.958 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 691007299659216531098152160330959923994508174713 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jan 22 04:57:55 UTC 2023 Final Date: Fri Jan 21 04:57:54 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1b:98:ba:c1:31:6c:b2:e0:2d:f8:6c:b7:b6:75:dc:f2:17:62:ae:df],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 86aa967f601009aa880bd05ee2a53f091cb2c25c 04d082efd59abbd3b85d4cba1485c9b1105dcdb2 5bac0685a4b09a167550891d4264d34d5e2b6488 2f6c569495b29b44bac474da1f2b5cebc1d5a554 5da45a6a2a9aec6fb7e5834c9b4dd2c96655b896 62013d0113ee4cecc05c78a9db9cb6ea6e08293f ae9032b4276aa1c348abc735659df896feb681e2 a41b7881ccfb5a89a1e844a6ca888041caf51ea3 f57a50977c2a6dbc1480b97e48601fd9a9606139 35522a6346db12c7a9ff82fa065fc9abe077ef0e caa30f6c2fd92cfcca021f5f491cf4c2a78e0b65 53d390f75caebc844ed83ffb8cf7a2f97fb376ee 17d2eef80b762a90df9a1f4c6ec167bde490a512 883edb9f724e7f6a61bfe7c5e4ed5f0cbdf58209 816a31ad3618e368d0d2dc7ba8f8826fd63d88d6 645d7e229cc06146b634d23b325be35c2334a377 4318dd34295628b3f1ced380cfe6e25523b4e73d 8718df1e1cf0ff801b45c1857fe78b115751a1b2 903b67f31ad5a76992517e7c56ae19db0f449aa0 2797af77 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8a:ed:74:62:93:ad:3c:ac:13:16:91:11:81:c5:06:81:8e:36:40:79],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-22 06:38:41.948  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-22 06:38:41.954 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-22 06:38:41.957 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2023-01-22 06:38:41.959 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-22 06:38:41.959  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2023-01-22 06:38:41.960  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-22 06:38:41.961  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-22 06:38:41.962 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-22 06:38:41.962 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-22 06:38:41.963 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-22 06:38:41.968 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-22 06:38:41.971 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-22 06:38:41.971 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-22 06:38:41.972 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-22 06:38:42.174  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-22 06:38:42.174  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-22 06:38:42.175 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-22 06:38:42.175 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-22 06:38:42.178  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-22 06:38:42.179  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-22 06:38:42.180 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-22 06:38:42.180 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-22 06:38:42.181 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-22 06:38:42.182 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-22 06:38:42.182 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-22 06:38:42.183 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-22 06:38:42.184 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-22 06:38:42.184 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-22 06:38:42.184 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-22 06:38:42.186 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-22 06:38:42.190 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 691007299659216531098152160330959923994508174713 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jan 22 04:57:55 UTC 2023 Final Date: Fri Jan 21 04:57:54 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1b:98:ba:c1:31:6c:b2:e0:2d:f8:6c:b7:b6:75:dc:f2:17:62:ae:df],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 86aa967f601009aa880bd05ee2a53f091cb2c25c 04d082efd59abbd3b85d4cba1485c9b1105dcdb2 5bac0685a4b09a167550891d4264d34d5e2b6488 2f6c569495b29b44bac474da1f2b5cebc1d5a554 5da45a6a2a9aec6fb7e5834c9b4dd2c96655b896 62013d0113ee4cecc05c78a9db9cb6ea6e08293f ae9032b4276aa1c348abc735659df896feb681e2 a41b7881ccfb5a89a1e844a6ca888041caf51ea3 f57a50977c2a6dbc1480b97e48601fd9a9606139 35522a6346db12c7a9ff82fa065fc9abe077ef0e caa30f6c2fd92cfcca021f5f491cf4c2a78e0b65 53d390f75caebc844ed83ffb8cf7a2f97fb376ee 17d2eef80b762a90df9a1f4c6ec167bde490a512 883edb9f724e7f6a61bfe7c5e4ed5f0cbdf58209 816a31ad3618e368d0d2dc7ba8f8826fd63d88d6 645d7e229cc06146b634d23b325be35c2334a377 4318dd34295628b3f1ced380cfe6e25523b4e73d 8718df1e1cf0ff801b45c1857fe78b115751a1b2 903b67f31ad5a76992517e7c56ae19db0f449aa0 2797af77 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b7:e2:3b:21:8f:d1:80:62:d2:85:73:95:71:e4:62:54:d7:ef:01:d8],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-22 06:40:57.880  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-22 06:40:57.882 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-22 06:40:57.899 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2023-01-22 06:40:57.906 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-22 06:40:57.916  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2023-01-22 06:40:57.917  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-22 06:40:57.917  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-22 06:40:57.918 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-22 06:40:57.919 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-22 06:40:57.919 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-22 06:40:57.923 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-22 06:40:57.924 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-22 06:40:57.924 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-22 06:40:57.925 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-22 06:40:58.084  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-22 06:40:58.085  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-22 06:40:58.085 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-22 06:40:58.086 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-22 06:40:58.088  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-22 06:40:58.088  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-22 06:40:58.091 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-22 06:40:58.092 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-22 06:40:58.092 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-22 06:40:58.093 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-22 06:40:58.094 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-22 06:40:58.094 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-22 06:40:58.095 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-22 06:40:58.096 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-22 06:40:58.096 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-22 06:40:58.097 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-22 06:40:58.102 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 691007299659216531098152160330959923994508174713 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jan 22 04:57:55 UTC 2023 Final Date: Fri Jan 21 04:57:54 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1b:98:ba:c1:31:6c:b2:e0:2d:f8:6c:b7:b6:75:dc:f2:17:62:ae:df],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 86aa967f601009aa880bd05ee2a53f091cb2c25c 04d082efd59abbd3b85d4cba1485c9b1105dcdb2 5bac0685a4b09a167550891d4264d34d5e2b6488 2f6c569495b29b44bac474da1f2b5cebc1d5a554 5da45a6a2a9aec6fb7e5834c9b4dd2c96655b896 62013d0113ee4cecc05c78a9db9cb6ea6e08293f ae9032b4276aa1c348abc735659df896feb681e2 a41b7881ccfb5a89a1e844a6ca888041caf51ea3 f57a50977c2a6dbc1480b97e48601fd9a9606139 35522a6346db12c7a9ff82fa065fc9abe077ef0e caa30f6c2fd92cfcca021f5f491cf4c2a78e0b65 53d390f75caebc844ed83ffb8cf7a2f97fb376ee 17d2eef80b762a90df9a1f4c6ec167bde490a512 883edb9f724e7f6a61bfe7c5e4ed5f0cbdf58209 816a31ad3618e368d0d2dc7ba8f8826fd63d88d6 645d7e229cc06146b634d23b325be35c2334a377 4318dd34295628b3f1ced380cfe6e25523b4e73d 8718df1e1cf0ff801b45c1857fe78b115751a1b2 903b67f31ad5a76992517e7c56ae19db0f449aa0 2797af77 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a3:1d:8f:a8:64:bf:9c:0a:85:73:cb:30:e4:4b:7f:48:a0:00:5c:ee],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-22 06:43:38.001  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-22 06:43:38.005 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-22 06:43:38.010 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-22 06:43:38.012 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-22 06:43:38.012  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-22 06:43:38.013  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-22 06:43:38.014  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-22 06:43:38.015 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-22 06:43:38.015 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-22 06:43:38.016 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-22 06:43:38.020 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-22 06:43:38.021 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-22 06:43:38.022 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-22 06:43:38.022 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-22 06:43:38.191  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-22 06:43:38.192  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-22 06:43:38.192 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-22 06:43:38.192 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-22 06:43:38.193  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-22 06:43:38.194  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-22 06:43:38.195 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-22 06:43:38.195 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-22 06:43:38.195 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-22 06:43:38.196 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-22 06:43:38.197 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-22 06:43:38.197 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-22 06:43:38.198 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-22 06:43:38.198 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-22 06:43:38.199 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-22 06:43:38.200 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-22 06:43:38.204 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 691007299659216531098152160330959923994508174713 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jan 22 04:57:55 UTC 2023 Final Date: Fri Jan 21 04:57:54 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1b:98:ba:c1:31:6c:b2:e0:2d:f8:6c:b7:b6:75:dc:f2:17:62:ae:df],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 86aa967f601009aa880bd05ee2a53f091cb2c25c 04d082efd59abbd3b85d4cba1485c9b1105dcdb2 5bac0685a4b09a167550891d4264d34d5e2b6488 2f6c569495b29b44bac474da1f2b5cebc1d5a554 5da45a6a2a9aec6fb7e5834c9b4dd2c96655b896 62013d0113ee4cecc05c78a9db9cb6ea6e08293f ae9032b4276aa1c348abc735659df896feb681e2 a41b7881ccfb5a89a1e844a6ca888041caf51ea3 f57a50977c2a6dbc1480b97e48601fd9a9606139 35522a6346db12c7a9ff82fa065fc9abe077ef0e caa30f6c2fd92cfcca021f5f491cf4c2a78e0b65 53d390f75caebc844ed83ffb8cf7a2f97fb376ee 17d2eef80b762a90df9a1f4c6ec167bde490a512 883edb9f724e7f6a61bfe7c5e4ed5f0cbdf58209 816a31ad3618e368d0d2dc7ba8f8826fd63d88d6 645d7e229cc06146b634d23b325be35c2334a377 4318dd34295628b3f1ced380cfe6e25523b4e73d 8718df1e1cf0ff801b45c1857fe78b115751a1b2 903b67f31ad5a76992517e7c56ae19db0f449aa0 2797af77 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1a:78:92:46:b5:f5:9e:10:1a:a7:45:54:c1:34:99:95:31:ba:d6:ac],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-22 06:51:25.668  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-22 06:51:25.674 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-22 06:51:25.676 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-22 06:51:25.679 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-22 06:51:25.680  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-22 06:51:25.681  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-22 06:51:25.681  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-22 06:51:25.682 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-22 06:51:25.682 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-22 06:51:25.683 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-22 06:51:25.698 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-22 06:51:25.699 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-22 06:51:25.700 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-22 06:51:25.700 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-22 06:51:25.845  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-22 06:51:25.846  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-22 06:51:25.846 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-22 06:51:25.846 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-22 06:51:25.848  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-22 06:51:25.848  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-22 06:51:25.849 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-22 06:51:25.850 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-22 06:51:25.850 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-22 06:51:25.852 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-22 06:51:25.852 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-22 06:51:25.853 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-22 06:51:25.854 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-22 06:51:25.854 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-22 06:51:25.854 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-22 06:51:25.856 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-22 06:51:25.862 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 691007299659216531098152160330959923994508174713 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jan 22 04:57:55 UTC 2023 Final Date: Fri Jan 21 04:57:54 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1b:98:ba:c1:31:6c:b2:e0:2d:f8:6c:b7:b6:75:dc:f2:17:62:ae:df],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 86aa967f601009aa880bd05ee2a53f091cb2c25c 04d082efd59abbd3b85d4cba1485c9b1105dcdb2 5bac0685a4b09a167550891d4264d34d5e2b6488 2f6c569495b29b44bac474da1f2b5cebc1d5a554 5da45a6a2a9aec6fb7e5834c9b4dd2c96655b896 62013d0113ee4cecc05c78a9db9cb6ea6e08293f ae9032b4276aa1c348abc735659df896feb681e2 a41b7881ccfb5a89a1e844a6ca888041caf51ea3 f57a50977c2a6dbc1480b97e48601fd9a9606139 35522a6346db12c7a9ff82fa065fc9abe077ef0e caa30f6c2fd92cfcca021f5f491cf4c2a78e0b65 53d390f75caebc844ed83ffb8cf7a2f97fb376ee 17d2eef80b762a90df9a1f4c6ec167bde490a512 883edb9f724e7f6a61bfe7c5e4ed5f0cbdf58209 816a31ad3618e368d0d2dc7ba8f8826fd63d88d6 645d7e229cc06146b634d23b325be35c2334a377 4318dd34295628b3f1ced380cfe6e25523b4e73d 8718df1e1cf0ff801b45c1857fe78b115751a1b2 903b67f31ad5a76992517e7c56ae19db0f449aa0 2797af77 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e6:8a:58:3f:c9:3e:22:79:cc:46:8c:1c:28:f6:96:59:98:a6:04:6a],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-22 06:56:52.489  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-22 06:56:52.494 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-22 06:56:52.496 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-22 06:56:52.498 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-22 06:56:52.499  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-22 06:56:52.500  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-22 06:56:52.501  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-22 06:56:52.502 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-22 06:56:52.503 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-22 06:56:52.503 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-22 06:56:52.509 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-22 06:56:52.510 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-22 06:56:52.510 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-22 06:56:52.511 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-22 06:56:52.634  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-22 06:56:52.635  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-22 06:56:52.635 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-22 06:56:52.636 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-22 06:56:52.637  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-22 06:56:52.637  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-22 06:56:52.638 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-22 06:56:52.638 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-22 06:56:52.639 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-22 06:56:52.640 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-22 06:56:52.640 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-22 06:56:52.641 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-22 06:56:52.642 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-22 06:56:52.642 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-22 06:56:52.643 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-22 06:56:52.644 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-22 06:56:52.647 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 691007299659216531098152160330959923994508174713 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jan 22 04:57:55 UTC 2023 Final Date: Fri Jan 21 04:57:54 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1b:98:ba:c1:31:6c:b2:e0:2d:f8:6c:b7:b6:75:dc:f2:17:62:ae:df],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 86aa967f601009aa880bd05ee2a53f091cb2c25c 04d082efd59abbd3b85d4cba1485c9b1105dcdb2 5bac0685a4b09a167550891d4264d34d5e2b6488 2f6c569495b29b44bac474da1f2b5cebc1d5a554 5da45a6a2a9aec6fb7e5834c9b4dd2c96655b896 62013d0113ee4cecc05c78a9db9cb6ea6e08293f ae9032b4276aa1c348abc735659df896feb681e2 a41b7881ccfb5a89a1e844a6ca888041caf51ea3 f57a50977c2a6dbc1480b97e48601fd9a9606139 35522a6346db12c7a9ff82fa065fc9abe077ef0e caa30f6c2fd92cfcca021f5f491cf4c2a78e0b65 53d390f75caebc844ed83ffb8cf7a2f97fb376ee 17d2eef80b762a90df9a1f4c6ec167bde490a512 883edb9f724e7f6a61bfe7c5e4ed5f0cbdf58209 816a31ad3618e368d0d2dc7ba8f8826fd63d88d6 645d7e229cc06146b634d23b325be35c2334a377 4318dd34295628b3f1ced380cfe6e25523b4e73d 8718df1e1cf0ff801b45c1857fe78b115751a1b2 903b67f31ad5a76992517e7c56ae19db0f449aa0 2797af77 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [2a:1b:42:5d:c3:f8:ed:75:da:b8:84:5e:d2:62:67:aa:23:50:da:ad],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-22 07:04:48.828  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-22 07:04:48.832 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-22 07:04:48.835 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-22 07:04:48.836 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-22 07:04:48.837  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-22 07:04:48.837  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-22 07:04:48.838  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-22 07:04:48.838 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-22 07:04:48.839 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-22 07:04:48.840 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-22 07:04:48.844 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-22 07:04:48.845 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-22 07:04:48.846 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-22 07:04:48.846 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-22 07:04:49.023  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-22 07:04:49.024  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-22 07:04:49.024 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-22 07:04:49.025 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-22 07:04:49.026  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-22 07:04:49.026  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-22 07:04:49.032 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-22 07:04:49.032 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-22 07:04:49.034 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-22 07:04:49.038 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-22 07:04:49.038 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-22 07:04:49.049 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-22 07:04:49.051 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-22 07:04:49.051 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-22 07:04:49.052 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-22 07:04:49.054 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-22 07:04:49.058 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 691007299659216531098152160330959923994508174713 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jan 22 04:57:55 UTC 2023 Final Date: Fri Jan 21 04:57:54 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1b:98:ba:c1:31:6c:b2:e0:2d:f8:6c:b7:b6:75:dc:f2:17:62:ae:df],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 86aa967f601009aa880bd05ee2a53f091cb2c25c 04d082efd59abbd3b85d4cba1485c9b1105dcdb2 5bac0685a4b09a167550891d4264d34d5e2b6488 2f6c569495b29b44bac474da1f2b5cebc1d5a554 5da45a6a2a9aec6fb7e5834c9b4dd2c96655b896 62013d0113ee4cecc05c78a9db9cb6ea6e08293f ae9032b4276aa1c348abc735659df896feb681e2 a41b7881ccfb5a89a1e844a6ca888041caf51ea3 f57a50977c2a6dbc1480b97e48601fd9a9606139 35522a6346db12c7a9ff82fa065fc9abe077ef0e caa30f6c2fd92cfcca021f5f491cf4c2a78e0b65 53d390f75caebc844ed83ffb8cf7a2f97fb376ee 17d2eef80b762a90df9a1f4c6ec167bde490a512 883edb9f724e7f6a61bfe7c5e4ed5f0cbdf58209 816a31ad3618e368d0d2dc7ba8f8826fd63d88d6 645d7e229cc06146b634d23b325be35c2334a377 4318dd34295628b3f1ced380cfe6e25523b4e73d 8718df1e1cf0ff801b45c1857fe78b115751a1b2 903b67f31ad5a76992517e7c56ae19db0f449aa0 2797af77 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [61:63:fe:56:fb:a6:47:4c:32:af:f5:3b:d4:5e:7d:66:67:0e:a9:02],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-22 07:10:16.427  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-22 07:10:16.431 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-22 07:10:16.439 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-22 07:10:16.440 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-22 07:10:16.441  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-22 07:10:16.442  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-22 07:10:16.442  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-22 07:10:16.443 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-22 07:10:16.443 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-22 07:10:16.444 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-22 07:10:16.448 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-22 07:10:16.450 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-22 07:10:16.450 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-22 07:10:16.451 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-22 07:10:16.604  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-22 07:10:16.605  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-22 07:10:16.606 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-22 07:10:16.607 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-22 07:10:16.613  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-22 07:10:16.616  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-22 07:10:16.618 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-22 07:10:16.619 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-22 07:10:16.620 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-22 07:10:16.623 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-22 07:10:16.624 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-22 07:10:16.624 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-22 07:10:16.625 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-22 07:10:16.626 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-22 07:10:16.626 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-22 07:10:16.627 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-22 07:10:16.633 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 691007299659216531098152160330959923994508174713 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jan 22 04:57:55 UTC 2023 Final Date: Fri Jan 21 04:57:54 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1b:98:ba:c1:31:6c:b2:e0:2d:f8:6c:b7:b6:75:dc:f2:17:62:ae:df],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 86aa967f601009aa880bd05ee2a53f091cb2c25c 04d082efd59abbd3b85d4cba1485c9b1105dcdb2 5bac0685a4b09a167550891d4264d34d5e2b6488 2f6c569495b29b44bac474da1f2b5cebc1d5a554 5da45a6a2a9aec6fb7e5834c9b4dd2c96655b896 62013d0113ee4cecc05c78a9db9cb6ea6e08293f ae9032b4276aa1c348abc735659df896feb681e2 a41b7881ccfb5a89a1e844a6ca888041caf51ea3 f57a50977c2a6dbc1480b97e48601fd9a9606139 35522a6346db12c7a9ff82fa065fc9abe077ef0e caa30f6c2fd92cfcca021f5f491cf4c2a78e0b65 53d390f75caebc844ed83ffb8cf7a2f97fb376ee 17d2eef80b762a90df9a1f4c6ec167bde490a512 883edb9f724e7f6a61bfe7c5e4ed5f0cbdf58209 816a31ad3618e368d0d2dc7ba8f8826fd63d88d6 645d7e229cc06146b634d23b325be35c2334a377 4318dd34295628b3f1ced380cfe6e25523b4e73d 8718df1e1cf0ff801b45c1857fe78b115751a1b2 903b67f31ad5a76992517e7c56ae19db0f449aa0 2797af77 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [45:63:39:1a:22:d6:9e:cc:d9:a1:39:d5:cb:6a:03:75:58:64:37:30],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-22 07:18:06.344  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-22 07:18:06.353 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-22 07:18:06.359 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2023-01-22 07:18:06.361 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-22 07:18:06.362  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2023-01-22 07:18:06.364  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-22 07:18:06.364  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-22 07:18:06.365 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-22 07:18:06.367 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-22 07:18:06.368 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-22 07:18:06.377 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-22 07:18:06.380 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-22 07:18:06.381 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-22 07:18:06.382 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-22 07:18:06.558  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-22 07:18:06.560  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-22 07:18:06.561 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-22 07:18:06.562 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-22 07:18:06.565  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-22 07:18:06.566  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-22 07:18:06.567 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-22 07:18:06.568 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-22 07:18:06.568 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-22 07:18:06.570 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-22 07:18:06.571 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-22 07:18:06.571 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-22 07:18:06.572 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-22 07:18:06.573 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-22 07:18:06.573 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-22 07:18:06.575 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-22 07:18:06.583 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 691007299659216531098152160330959923994508174713 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jan 22 04:57:55 UTC 2023 Final Date: Fri Jan 21 04:57:54 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1b:98:ba:c1:31:6c:b2:e0:2d:f8:6c:b7:b6:75:dc:f2:17:62:ae:df],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 86aa967f601009aa880bd05ee2a53f091cb2c25c 04d082efd59abbd3b85d4cba1485c9b1105dcdb2 5bac0685a4b09a167550891d4264d34d5e2b6488 2f6c569495b29b44bac474da1f2b5cebc1d5a554 5da45a6a2a9aec6fb7e5834c9b4dd2c96655b896 62013d0113ee4cecc05c78a9db9cb6ea6e08293f ae9032b4276aa1c348abc735659df896feb681e2 a41b7881ccfb5a89a1e844a6ca888041caf51ea3 f57a50977c2a6dbc1480b97e48601fd9a9606139 35522a6346db12c7a9ff82fa065fc9abe077ef0e caa30f6c2fd92cfcca021f5f491cf4c2a78e0b65 53d390f75caebc844ed83ffb8cf7a2f97fb376ee 17d2eef80b762a90df9a1f4c6ec167bde490a512 883edb9f724e7f6a61bfe7c5e4ed5f0cbdf58209 816a31ad3618e368d0d2dc7ba8f8826fd63d88d6 645d7e229cc06146b634d23b325be35c2334a377 4318dd34295628b3f1ced380cfe6e25523b4e73d 8718df1e1cf0ff801b45c1857fe78b115751a1b2 903b67f31ad5a76992517e7c56ae19db0f449aa0 2797af77 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ae:5a:1c:f1:7b:72:5e:4f:dc:a5:00:e0:a0:ee:2a:db:02:c9:b6:d4],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-22 07:24:05.843  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-22 07:24:05.847 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-22 07:24:05.849 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-22 07:24:05.850 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-22 07:24:05.851  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-22 07:24:05.851  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-22 07:24:05.852  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-22 07:24:05.852 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-22 07:24:05.853 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-22 07:24:05.853 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-22 07:24:05.857 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-22 07:24:05.858 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-22 07:24:05.859 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-22 07:24:05.859 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-22 07:24:06.026  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-22 07:24:06.027  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-22 07:24:06.027 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-22 07:24:06.028 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-22 07:24:06.029  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-22 07:24:06.029  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-22 07:24:06.030 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-22 07:24:06.030 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-22 07:24:06.030 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-22 07:24:06.031 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-22 07:24:06.032 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-22 07:24:06.032 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-22 07:24:06.033 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-22 07:24:06.033 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-22 07:24:06.033 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-22 07:24:06.034 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-22 07:24:06.037 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 691007299659216531098152160330959923994508174713 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jan 22 04:57:55 UTC 2023 Final Date: Fri Jan 21 04:57:54 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1b:98:ba:c1:31:6c:b2:e0:2d:f8:6c:b7:b6:75:dc:f2:17:62:ae:df],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 86aa967f601009aa880bd05ee2a53f091cb2c25c 04d082efd59abbd3b85d4cba1485c9b1105dcdb2 5bac0685a4b09a167550891d4264d34d5e2b6488 2f6c569495b29b44bac474da1f2b5cebc1d5a554 5da45a6a2a9aec6fb7e5834c9b4dd2c96655b896 62013d0113ee4cecc05c78a9db9cb6ea6e08293f ae9032b4276aa1c348abc735659df896feb681e2 a41b7881ccfb5a89a1e844a6ca888041caf51ea3 f57a50977c2a6dbc1480b97e48601fd9a9606139 35522a6346db12c7a9ff82fa065fc9abe077ef0e caa30f6c2fd92cfcca021f5f491cf4c2a78e0b65 53d390f75caebc844ed83ffb8cf7a2f97fb376ee 17d2eef80b762a90df9a1f4c6ec167bde490a512 883edb9f724e7f6a61bfe7c5e4ed5f0cbdf58209 816a31ad3618e368d0d2dc7ba8f8826fd63d88d6 645d7e229cc06146b634d23b325be35c2334a377 4318dd34295628b3f1ced380cfe6e25523b4e73d 8718df1e1cf0ff801b45c1857fe78b115751a1b2 903b67f31ad5a76992517e7c56ae19db0f449aa0 2797af77 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [fd:d1:55:fc:dd:5b:5b:4e:f0:23:f0:99:6c:c7:a8:2d:c8:96:04:30],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-22 07:24:24.995  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-22 07:24:24.996 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-22 07:24:24.999 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-22 07:24:25.000 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-22 07:24:25.000  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-22 07:24:25.002  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-22 07:24:25.002  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-22 07:24:25.002 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-22 07:24:25.003 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-22 07:24:25.003 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-22 07:24:25.017 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-22 07:24:25.018 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-22 07:24:25.018 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-22 07:24:25.019 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-22 07:24:25.157  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-22 07:24:25.161  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-22 07:24:25.161 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-22 07:24:25.162 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-22 07:24:25.163  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-22 07:24:25.164  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-22 07:24:25.165 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-22 07:24:25.171 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-22 07:24:25.171 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-22 07:24:25.172 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-22 07:24:25.172 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-22 07:24:25.173 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-22 07:24:25.173 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-22 07:24:25.174 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-22 07:24:25.174 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-22 07:24:25.175 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-22 07:24:25.177 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 691007299659216531098152160330959923994508174713 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jan 22 04:57:55 UTC 2023 Final Date: Fri Jan 21 04:57:54 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1b:98:ba:c1:31:6c:b2:e0:2d:f8:6c:b7:b6:75:dc:f2:17:62:ae:df],[56:66:d1:a4] modulus: 916513927a22df9d78d12aa8f6582bb2b7f11faa1ae48c0fd267015abc99ca9094c39468bfacf2d56e84de7c775b77b5823c67869861f0c38e60a3b0fefd65510052012ca90bb16719391c8ac9b39b691bc1202ece9bc8c85fb57936748c2a0f55784d1fc3ec742d8d05d3cd39771ca4a5d129b698c79978fa811f9c449db7dc135fe785e4853c8b19a4a660f3c6f80c53e05309d1d17de5c76729d212a5b30a6434a34789375b45d504d33f1a6c1997530428e7fef0c414f4dd68654afbfa035625a2e09705ddea2778aa858de594bf55187adcff840b365c05cbfb90f1f900f916b6ff0a32585d0d4e31c46290b714b5a33383406854bcec7b462bcc16aa3f938d5671fc2c571f0690cdd15f95e198889be7a6b51162b31a74b990dbbc24a3f6b5dadc654f94e0cb3e3cf3a1bd62f511ece45c26d0af4e942304bc7093bade07336e942d7c1226611d9360111fa3935d5846bb23320723e3cf1a4f52462a8b3168a4dbff60c4ba855d0deb4235d30eaa5866a427a5a6ec17cf106084c9d925 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 86aa967f601009aa880bd05ee2a53f091cb2c25c 04d082efd59abbd3b85d4cba1485c9b1105dcdb2 5bac0685a4b09a167550891d4264d34d5e2b6488 2f6c569495b29b44bac474da1f2b5cebc1d5a554 5da45a6a2a9aec6fb7e5834c9b4dd2c96655b896 62013d0113ee4cecc05c78a9db9cb6ea6e08293f ae9032b4276aa1c348abc735659df896feb681e2 a41b7881ccfb5a89a1e844a6ca888041caf51ea3 f57a50977c2a6dbc1480b97e48601fd9a9606139 35522a6346db12c7a9ff82fa065fc9abe077ef0e caa30f6c2fd92cfcca021f5f491cf4c2a78e0b65 53d390f75caebc844ed83ffb8cf7a2f97fb376ee 17d2eef80b762a90df9a1f4c6ec167bde490a512 883edb9f724e7f6a61bfe7c5e4ed5f0cbdf58209 816a31ad3618e368d0d2dc7ba8f8826fd63d88d6 645d7e229cc06146b634d23b325be35c2334a377 4318dd34295628b3f1ced380cfe6e25523b4e73d 8718df1e1cf0ff801b45c1857fe78b115751a1b2 903b67f31ad5a76992517e7c56ae19db0f449aa0 2797af77 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [fa:72:b8:74:8f:61:30:71:c5:72:87:6b:66:6e:52:c4:79:0a:b9:00],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-22 07:47:09.835  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-22 07:47:09.840 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-22 07:47:09.844 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-22 07:47:09.846 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-22 07:47:09.846  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-22 07:47:09.847  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-22 07:47:09.848  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-22 07:47:09.848 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-22 07:47:09.849 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-22 07:47:09.849 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-22 07:47:09.853 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-22 07:47:09.855 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-22 07:47:09.855 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-22 07:47:09.855 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-22 07:47:10.002  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-22 07:47:10.003  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-22 07:47:10.004 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-22 07:47:10.004 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-22 07:47:10.005  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-22 07:47:10.006  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-22 07:47:10.006 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-22 07:47:10.007 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-22 07:47:10.007 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-22 07:47:10.008 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-22 07:47:10.008 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-22 07:47:10.008 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-22 07:47:10.009 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-22 07:47:10.009 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-22 07:47:10.010 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-22 07:47:10.010 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-22 07:47:10.014 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 691007299659216531098152160330959923994508174713 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jan 22 04:57:55 UTC 2023 Final Date: Fri Jan 21 04:57:54 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1b:98:ba:c1:31:6c:b2:e0:2d:f8:6c:b7:b6:75:dc:f2:17:62:ae:df],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 86aa967f601009aa880bd05ee2a53f091cb2c25c 04d082efd59abbd3b85d4cba1485c9b1105dcdb2 5bac0685a4b09a167550891d4264d34d5e2b6488 2f6c569495b29b44bac474da1f2b5cebc1d5a554 5da45a6a2a9aec6fb7e5834c9b4dd2c96655b896 62013d0113ee4cecc05c78a9db9cb6ea6e08293f ae9032b4276aa1c348abc735659df896feb681e2 a41b7881ccfb5a89a1e844a6ca888041caf51ea3 f57a50977c2a6dbc1480b97e48601fd9a9606139 35522a6346db12c7a9ff82fa065fc9abe077ef0e caa30f6c2fd92cfcca021f5f491cf4c2a78e0b65 53d390f75caebc844ed83ffb8cf7a2f97fb376ee 17d2eef80b762a90df9a1f4c6ec167bde490a512 883edb9f724e7f6a61bfe7c5e4ed5f0cbdf58209 816a31ad3618e368d0d2dc7ba8f8826fd63d88d6 645d7e229cc06146b634d23b325be35c2334a377 4318dd34295628b3f1ced380cfe6e25523b4e73d 8718df1e1cf0ff801b45c1857fe78b115751a1b2 903b67f31ad5a76992517e7c56ae19db0f449aa0 2797af77 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [a7:79:d7:a4:16:ea:4e:12:99:6e:96:eb:fc:a9:0e:79:2f:4f:f2:f4],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-22 07:47:16.936  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-22 07:47:16.937 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-22 07:47:16.939 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-22 07:47:16.939 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-22 07:47:16.940  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-22 07:47:16.940  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-22 07:47:16.940  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-22 07:47:16.941 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-22 07:47:16.941 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-22 07:47:16.941 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-22 07:47:16.948 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-22 07:47:16.948 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-22 07:47:16.948 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-22 07:47:16.949 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-22 07:47:17.056  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-22 07:47:17.057  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-22 07:47:17.057 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-22 07:47:17.057 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-22 07:47:17.058  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-22 07:47:17.059  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-22 07:47:17.059 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-22 07:47:17.059 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-22 07:47:17.060 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-22 07:47:17.060 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-22 07:47:17.060 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-22 07:47:17.061 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-22 07:47:17.061 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-22 07:47:17.062 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-22 07:47:17.062 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-22 07:47:17.063 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-22 07:47:17.068 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 691007299659216531098152160330959923994508174713 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sun Jan 22 04:57:55 UTC 2023 Final Date: Fri Jan 21 04:57:54 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [1b:98:ba:c1:31:6c:b2:e0:2d:f8:6c:b7:b6:75:dc:f2:17:62:ae:df],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 86aa967f601009aa880bd05ee2a53f091cb2c25c 04d082efd59abbd3b85d4cba1485c9b1105dcdb2 5bac0685a4b09a167550891d4264d34d5e2b6488 2f6c569495b29b44bac474da1f2b5cebc1d5a554 5da45a6a2a9aec6fb7e5834c9b4dd2c96655b896 62013d0113ee4cecc05c78a9db9cb6ea6e08293f ae9032b4276aa1c348abc735659df896feb681e2 a41b7881ccfb5a89a1e844a6ca888041caf51ea3 f57a50977c2a6dbc1480b97e48601fd9a9606139 35522a6346db12c7a9ff82fa065fc9abe077ef0e caa30f6c2fd92cfcca021f5f491cf4c2a78e0b65 53d390f75caebc844ed83ffb8cf7a2f97fb376ee 17d2eef80b762a90df9a1f4c6ec167bde490a512 883edb9f724e7f6a61bfe7c5e4ed5f0cbdf58209 816a31ad3618e368d0d2dc7ba8f8826fd63d88d6 645d7e229cc06146b634d23b325be35c2334a377 4318dd34295628b3f1ced380cfe6e25523b4e73d 8718df1e1cf0ff801b45c1857fe78b115751a1b2 903b67f31ad5a76992517e7c56ae19db0f449aa0 2797af77 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ee:02:55:5a:38:32:af:7b:67:64:5b:66:16:d0:36:82:aa:63:86:f0],[56:66:d1:a4] modulus: c20fa82dc1a6c19994d6599ea2a80746389b60f7df68807bde9e21785dc300029e80479015edee710b0963b4d83169d407b85e7a538692c25c3745cc236c89f24043d3d30790fb9f78cec473f63af805bf8f5c1f58cf34cb9beb998cd3ed645c022d7f1822ae1e3bd3ecf650af9d89f640a2f8d39a0c998da02cc5015931e61304f1a5b76a4fcf5c01bec3d87289ff85ca3d7b4b35bea5151d31f0fb8b1aa4c09e8f952eb59ec2b9b9caaa9cb8ef7c71b9844de02503143f03ef74319e0a6c82c56838e9970dc2e0f338813e57e72ca71d9ae1fe885758e4557408465d672bd0bd0db337f1e38e91d2ea85b7e22f2ea420df3d61b36729f51c9f826151639be7 public exponent: 10001 ]