2023-01-27 05:14:01,328 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2023-01-27 05:14:02,676 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2023-01-27 05:14:03.439  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Jan 27, 2023 5:14:05 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Jan 27, 2023 5:14:05 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Jan 27, 2023 5:14:05 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Jan 27, 2023 5:14:05 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2023-01-27 05:14:05.914 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2023-01-27 05:14:06.189  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2023-01-27 05:14:06.348  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2023-01-27 05:14:07.227 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2023-01-27 05:14:07.231 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) 2023-01-27 05:14:07.234 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2023-01-27 05:14:07.239 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2023-01-27 05:14:07.279 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2023-01-27 05:14:07.282 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/docs]}: redirectToUi(HttpServletRequest) {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) 2023-01-27 05:14:07.422 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2023-01-27 05:14:08.161 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Jan 27, 2023 5:14:08 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2023-01-27 05:14:09.106  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 8.684 seconds (JVM running for 10.502) Jan 27, 2023 5:14:32 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2023-01-27 05:14:43.646  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-27 05:14:43.653 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-27 05:14:43.688 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2023-01-27 05:14:43.691 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-27 05:14:43.706  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2023-01-27 05:14:43.708  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-27 05:14:43.708  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-27 05:14:43.710 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-27 05:14:43.710 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-27 05:14:43.713 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-27 05:14:43.721 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-27 05:14:43.724 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-27 05:14:43.774 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-27 05:14:43.780 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-27 05:14:43.780 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-27 05:14:43.783 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-27 05:14:44.453  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-27 05:14:44.455  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-27 05:14:44.456 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-27 05:14:44.457 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-27 05:14:44.466  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-27 05:14:44.467  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-27 05:14:44.467 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-27 05:14:44.468 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-27 05:14:44.468 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-27 05:14:44.483 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-27 05:14:44.483 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-27 05:14:44.484 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-27 05:14:44.489 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-27 05:14:44.490 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-27 05:14:44.490 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-27 05:14:44.492 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-27 05:14:44.522 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 193223772051102006624691795246072871566744300568 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 27 05:10:20 UTC 2023 Final Date: Wed Jan 26 05:10:19 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6b:03:8b:10:69:98:bd:5a:a7:5c:0d:78:98:2d:75:2d:73:5b:d1:a2],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1115b8669a5e4c9a513901a11bf4f769895437cf fef168689e34f59097b7be585fc3a33e2ca656a4 dc6453314d53f693ff88c649f692a0efa58f5673 8eb787799b1f500983eea7dae44868fc42c74edd 08680f4735fc781b118475747eb9a224aa5e5c72 6dfdc0a196904cc6f47f10204641689b323ab2c7 2d29a3ce4c5b5c938fb22ebf0ea98e24b42f5bfc d88df35ff2336c5f62de7e2b0714b15a42570064 3dab373cde1f038367c30414e3c7cebb03b38fae 19d50ec9bf51b5c9e460c1c44ab2b5a698348cff 2e2577451f51ed25c41d38df6bee919701dd535c c9b79af7521f659b365a24e08098b8df38d16321 53ffc1ce6c0ee75cf763d5f94113b6b9e5b3c1c9 edac388c1e55ebfed907b052d35e6b33623da08d 136c0ac6591ed139f077cb86df0f54912c81658d 1fd9407c56748ff248597daf40774d7d92ee5789 a98233a9ff65f411a7a4040c9fb280f606a8fd0e 9789f5e0997278e50c46f06564adce41491e7545 c10f2bf9abc1bc9b788597baa3dceb6a1d9ceeb3 4f74ce95 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ab:98:a6:90:fd:c7:c9:66:19:15:e9:b9:3b:9b:67:12:eb:26:6a:1f],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-27 08:22:41.217  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-27 08:22:41.221 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-27 08:22:41.225 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-27 08:22:41.229 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-27 08:22:41.230  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-27 08:22:41.233  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-27 08:22:41.234  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-27 08:22:41.236 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-27 08:22:41.237 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-27 08:22:41.239 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-27 08:22:41.250 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-27 08:22:41.251 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-27 08:22:41.252 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-27 08:22:41.252 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-27 08:22:41.486  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-27 08:22:41.487  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-27 08:22:41.487 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-27 08:22:41.488 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-27 08:22:41.490  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-27 08:22:41.491  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-27 08:22:41.491 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-27 08:22:41.492 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-27 08:22:41.492 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-27 08:22:41.493 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-27 08:22:41.493 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-27 08:22:41.494 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-27 08:22:41.495 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-27 08:22:41.495 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-27 08:22:41.496 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-27 08:22:41.497 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-27 08:22:41.501 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 193223772051102006624691795246072871566744300568 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 27 05:10:20 UTC 2023 Final Date: Wed Jan 26 05:10:19 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6b:03:8b:10:69:98:bd:5a:a7:5c:0d:78:98:2d:75:2d:73:5b:d1:a2],[56:66:d1:a4] modulus: aeb37fae227057c23787876986d846265abc3c47e710724af35c9da5639906615e34bd4945c104c5b4b99bc58e015650d6f2f848146b51cc07210066bcca798206939f26c34474d2e1ce40d30747f40b350313a008ed3a44551225feb482ad51d1ae9f14af4588fc24ff56b03b2e86529cdfec5359944fc236a5a01ed47edab9a05d9a39f55f9553d3ed1c838044f10af8bc7f15522ef919413a0b7baa3bdb1d84287dc2c0d904a1f62003c74311461680c34a182d14a77b22689d859b1c8d1a578569f433776b188bd1b4b11f3b49ace1855d115a4a56767848ed4bbf2add4db4feb824f6c1014fd6f47a4762cb3a7e1eaa2e2c19b55ca56fd524d0ff2ed2ae38acb9cd5e0314809cb7ab74345f28dfb77931bd6a6fc793ec9abbf7d572c51e5a41bc43e2981af3ae347adbbe2e9b861aeb5675c7dbe6e25324cf42ac3c0f750ced8dcccf15d972c736c9df6cb27cdb4e6b15c41d7153bfcadf9fc30947a3c6ea7845176954358513cb57d0ae9827c6a868f2211043c5d8222c7ad5b2a2c283 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1115b8669a5e4c9a513901a11bf4f769895437cf fef168689e34f59097b7be585fc3a33e2ca656a4 dc6453314d53f693ff88c649f692a0efa58f5673 8eb787799b1f500983eea7dae44868fc42c74edd 08680f4735fc781b118475747eb9a224aa5e5c72 6dfdc0a196904cc6f47f10204641689b323ab2c7 2d29a3ce4c5b5c938fb22ebf0ea98e24b42f5bfc d88df35ff2336c5f62de7e2b0714b15a42570064 3dab373cde1f038367c30414e3c7cebb03b38fae 19d50ec9bf51b5c9e460c1c44ab2b5a698348cff 2e2577451f51ed25c41d38df6bee919701dd535c c9b79af7521f659b365a24e08098b8df38d16321 53ffc1ce6c0ee75cf763d5f94113b6b9e5b3c1c9 edac388c1e55ebfed907b052d35e6b33623da08d 136c0ac6591ed139f077cb86df0f54912c81658d 1fd9407c56748ff248597daf40774d7d92ee5789 a98233a9ff65f411a7a4040c9fb280f606a8fd0e 9789f5e0997278e50c46f06564adce41491e7545 c10f2bf9abc1bc9b788597baa3dceb6a1d9ceeb3 4f74ce95 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [e5:a2:6c:c4:02:3a:fd:44:a9:63:30:b2:32:c8:f7:40:eb:42:bc:22],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-27 08:24:29.589  INFO 1 [nio-8443-exec-9] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-27 08:24:29.594 DEBUG 1 [nio-8443-exec-9] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-27 08:24:29.598 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2023-01-27 08:24:29.599 DEBUG 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-27 08:24:29.599  INFO 1 [nio-8443-exec-9] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2023-01-27 08:24:29.600  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-27 08:24:29.601  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-27 08:24:29.601 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-27 08:24:29.602 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-27 08:24:29.603 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-27 08:24:29.608 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-27 08:24:29.609 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-27 08:24:29.610 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-27 08:24:29.610 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-27 08:24:29.835  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-27 08:24:29.836  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-27 08:24:29.837 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-27 08:24:29.837 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-27 08:24:29.840  INFO 1 [nio-8443-exec-9] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-27 08:24:29.841  INFO 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-27 08:24:29.841 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-27 08:24:29.842 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-27 08:24:29.843 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-27 08:24:29.844 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-27 08:24:29.845 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-27 08:24:29.846 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-27 08:24:29.847 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-27 08:24:29.848 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-27 08:24:29.849 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-27 08:24:29.850 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-27 08:24:29.855 DEBUG 1 [nio-8443-exec-9] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 193223772051102006624691795246072871566744300568 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 27 05:10:20 UTC 2023 Final Date: Wed Jan 26 05:10:19 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6b:03:8b:10:69:98:bd:5a:a7:5c:0d:78:98:2d:75:2d:73:5b:d1:a2],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1115b8669a5e4c9a513901a11bf4f769895437cf fef168689e34f59097b7be585fc3a33e2ca656a4 dc6453314d53f693ff88c649f692a0efa58f5673 8eb787799b1f500983eea7dae44868fc42c74edd 08680f4735fc781b118475747eb9a224aa5e5c72 6dfdc0a196904cc6f47f10204641689b323ab2c7 2d29a3ce4c5b5c938fb22ebf0ea98e24b42f5bfc d88df35ff2336c5f62de7e2b0714b15a42570064 3dab373cde1f038367c30414e3c7cebb03b38fae 19d50ec9bf51b5c9e460c1c44ab2b5a698348cff 2e2577451f51ed25c41d38df6bee919701dd535c c9b79af7521f659b365a24e08098b8df38d16321 53ffc1ce6c0ee75cf763d5f94113b6b9e5b3c1c9 edac388c1e55ebfed907b052d35e6b33623da08d 136c0ac6591ed139f077cb86df0f54912c81658d 1fd9407c56748ff248597daf40774d7d92ee5789 a98233a9ff65f411a7a4040c9fb280f606a8fd0e 9789f5e0997278e50c46f06564adce41491e7545 c10f2bf9abc1bc9b788597baa3dceb6a1d9ceeb3 4f74ce95 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [b3:79:f4:da:b5:a5:38:fb:f6:e8:3c:c6:41:c7:c9:18:4f:a4:25:31],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-27 08:26:29.424  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-27 08:26:29.425 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-27 08:26:29.427 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2023-01-27 08:26:29.427 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-27 08:26:29.428  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2023-01-27 08:26:29.429  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-27 08:26:29.429  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-27 08:26:29.430 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-27 08:26:29.430 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-27 08:26:29.431 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-27 08:26:29.435 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-27 08:26:29.436 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-27 08:26:29.436 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-27 08:26:29.436 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-27 08:26:29.697  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-27 08:26:29.698  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-27 08:26:29.698 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-27 08:26:29.699 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-27 08:26:29.700  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-27 08:26:29.701  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-27 08:26:29.701 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-27 08:26:29.702 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-27 08:26:29.702 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-27 08:26:29.703 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-27 08:26:29.703 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-27 08:26:29.703 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-27 08:26:29.704 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-27 08:26:29.705 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-27 08:26:29.705 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-27 08:26:29.706 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-27 08:26:29.710 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 193223772051102006624691795246072871566744300568 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 27 05:10:20 UTC 2023 Final Date: Wed Jan 26 05:10:19 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6b:03:8b:10:69:98:bd:5a:a7:5c:0d:78:98:2d:75:2d:73:5b:d1:a2],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1115b8669a5e4c9a513901a11bf4f769895437cf fef168689e34f59097b7be585fc3a33e2ca656a4 dc6453314d53f693ff88c649f692a0efa58f5673 8eb787799b1f500983eea7dae44868fc42c74edd 08680f4735fc781b118475747eb9a224aa5e5c72 6dfdc0a196904cc6f47f10204641689b323ab2c7 2d29a3ce4c5b5c938fb22ebf0ea98e24b42f5bfc d88df35ff2336c5f62de7e2b0714b15a42570064 3dab373cde1f038367c30414e3c7cebb03b38fae 19d50ec9bf51b5c9e460c1c44ab2b5a698348cff 2e2577451f51ed25c41d38df6bee919701dd535c c9b79af7521f659b365a24e08098b8df38d16321 53ffc1ce6c0ee75cf763d5f94113b6b9e5b3c1c9 edac388c1e55ebfed907b052d35e6b33623da08d 136c0ac6591ed139f077cb86df0f54912c81658d 1fd9407c56748ff248597daf40774d7d92ee5789 a98233a9ff65f411a7a4040c9fb280f606a8fd0e 9789f5e0997278e50c46f06564adce41491e7545 c10f2bf9abc1bc9b788597baa3dceb6a1d9ceeb3 4f74ce95 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [44:1b:37:1a:71:c6:c6:b9:16:4c:a6:3a:c1:0b:4d:d3:7c:94:03:dd],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-27 08:29:50.359  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-27 08:29:50.360 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-27 08:29:50.362 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-27 08:29:50.363 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-27 08:29:50.363  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-27 08:29:50.364  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-27 08:29:50.364  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-27 08:29:50.365 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-27 08:29:50.365 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-27 08:29:50.365 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-27 08:29:50.369 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-27 08:29:50.370 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-27 08:29:50.370 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-27 08:29:50.370 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-27 08:29:51.244  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-27 08:29:51.245  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-27 08:29:51.245 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-27 08:29:51.245 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-27 08:29:51.246  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-27 08:29:51.247  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-27 08:29:51.247 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-27 08:29:51.248 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-27 08:29:51.248 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-27 08:29:51.249 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-27 08:29:51.249 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-27 08:29:51.249 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-27 08:29:51.250 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-27 08:29:51.250 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-27 08:29:51.251 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-27 08:29:51.253 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-27 08:29:51.255 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 193223772051102006624691795246072871566744300568 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 27 05:10:20 UTC 2023 Final Date: Wed Jan 26 05:10:19 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6b:03:8b:10:69:98:bd:5a:a7:5c:0d:78:98:2d:75:2d:73:5b:d1:a2],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1115b8669a5e4c9a513901a11bf4f769895437cf fef168689e34f59097b7be585fc3a33e2ca656a4 dc6453314d53f693ff88c649f692a0efa58f5673 8eb787799b1f500983eea7dae44868fc42c74edd 08680f4735fc781b118475747eb9a224aa5e5c72 6dfdc0a196904cc6f47f10204641689b323ab2c7 2d29a3ce4c5b5c938fb22ebf0ea98e24b42f5bfc d88df35ff2336c5f62de7e2b0714b15a42570064 3dab373cde1f038367c30414e3c7cebb03b38fae 19d50ec9bf51b5c9e460c1c44ab2b5a698348cff 2e2577451f51ed25c41d38df6bee919701dd535c c9b79af7521f659b365a24e08098b8df38d16321 53ffc1ce6c0ee75cf763d5f94113b6b9e5b3c1c9 edac388c1e55ebfed907b052d35e6b33623da08d 136c0ac6591ed139f077cb86df0f54912c81658d 1fd9407c56748ff248597daf40774d7d92ee5789 a98233a9ff65f411a7a4040c9fb280f606a8fd0e 9789f5e0997278e50c46f06564adce41491e7545 c10f2bf9abc1bc9b788597baa3dceb6a1d9ceeb3 4f74ce95 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [7b:6b:9c:4f:a1:af:43:a2:ab:e2:7e:db:27:99:0c:6e:af:50:1c:9f],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-27 08:37:37.144  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-27 08:37:37.147 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-27 08:37:37.150 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-27 08:37:37.151 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-27 08:37:37.151  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-27 08:37:37.152  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-27 08:37:37.153  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-27 08:37:37.153 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-27 08:37:37.154 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-27 08:37:37.154 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-27 08:37:37.160 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-27 08:37:37.160 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-27 08:37:37.161 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-27 08:37:37.161 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-27 08:37:37.374  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-27 08:37:37.375  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-27 08:37:37.375 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-27 08:37:37.376 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-27 08:37:37.378  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-27 08:37:37.378  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-27 08:37:37.379 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-27 08:37:37.379 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-27 08:37:37.379 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-27 08:37:37.380 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-27 08:37:37.381 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-27 08:37:37.381 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-27 08:37:37.382 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-27 08:37:37.382 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-27 08:37:37.383 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-27 08:37:37.384 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-27 08:37:37.388 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 193223772051102006624691795246072871566744300568 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 27 05:10:20 UTC 2023 Final Date: Wed Jan 26 05:10:19 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6b:03:8b:10:69:98:bd:5a:a7:5c:0d:78:98:2d:75:2d:73:5b:d1:a2],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1115b8669a5e4c9a513901a11bf4f769895437cf fef168689e34f59097b7be585fc3a33e2ca656a4 dc6453314d53f693ff88c649f692a0efa58f5673 8eb787799b1f500983eea7dae44868fc42c74edd 08680f4735fc781b118475747eb9a224aa5e5c72 6dfdc0a196904cc6f47f10204641689b323ab2c7 2d29a3ce4c5b5c938fb22ebf0ea98e24b42f5bfc d88df35ff2336c5f62de7e2b0714b15a42570064 3dab373cde1f038367c30414e3c7cebb03b38fae 19d50ec9bf51b5c9e460c1c44ab2b5a698348cff 2e2577451f51ed25c41d38df6bee919701dd535c c9b79af7521f659b365a24e08098b8df38d16321 53ffc1ce6c0ee75cf763d5f94113b6b9e5b3c1c9 edac388c1e55ebfed907b052d35e6b33623da08d 136c0ac6591ed139f077cb86df0f54912c81658d 1fd9407c56748ff248597daf40774d7d92ee5789 a98233a9ff65f411a7a4040c9fb280f606a8fd0e 9789f5e0997278e50c46f06564adce41491e7545 c10f2bf9abc1bc9b788597baa3dceb6a1d9ceeb3 4f74ce95 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [13:50:5f:66:cf:da:68:c7:6b:7f:18:46:36:f8:bf:1e:1e:05:2b:04],[56:66:d1:a4] modulus: a881b47c087cf34d1aa5d903116c55e2da523b54529be09fa6acd9d13107a5415a4b380ebdc31d60f61bcd9ef69620951788a772d7491853712ce9a2f52a5618f09f2c32a0edb400d2edf28525ee0a750d313b7133e811786a588ff858b4bd3706fdf301c9f1ab5a58bd1200abb1b804b607c70ef7ab8a8c07c0d1be8687a26617d21dcf17480871aa6e51bd80f862de942b4a3df24c717b9c6b0bc439c12dfae97a1f8a6180e83590789aa731a1336c82f50b2fab66f7e13a5a34d8481a8eb3d65caf28201a16f7c24c49acd426ec859c4fcd2b69f50f9211a2428befe8030f67905aa0be94a574db3ccbcc9ded291fd46890481357302d1c72ac7c76a45313 public exponent: 10001 ] 2023-01-27 08:43:12.817  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-27 08:43:12.819 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-27 08:43:12.821 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-27 08:43:12.821 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-27 08:43:12.822  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-27 08:43:12.822  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-27 08:43:12.823  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-27 08:43:12.823 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-27 08:43:12.824 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-27 08:43:12.824 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-27 08:43:12.828 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-27 08:43:12.828 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-27 08:43:12.829 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-27 08:43:12.829 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-27 08:43:12.975  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-27 08:43:12.976  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-27 08:43:12.976 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-27 08:43:12.977 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-27 08:43:12.978  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-27 08:43:12.979  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-27 08:43:12.979 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-27 08:43:12.979 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-27 08:43:12.980 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-27 08:43:12.980 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-27 08:43:12.981 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-27 08:43:12.981 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-27 08:43:12.982 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-27 08:43:12.982 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-27 08:43:12.982 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-27 08:43:12.983 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-27 08:43:12.986 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 193223772051102006624691795246072871566744300568 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 27 05:10:20 UTC 2023 Final Date: Wed Jan 26 05:10:19 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6b:03:8b:10:69:98:bd:5a:a7:5c:0d:78:98:2d:75:2d:73:5b:d1:a2],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1115b8669a5e4c9a513901a11bf4f769895437cf fef168689e34f59097b7be585fc3a33e2ca656a4 dc6453314d53f693ff88c649f692a0efa58f5673 8eb787799b1f500983eea7dae44868fc42c74edd 08680f4735fc781b118475747eb9a224aa5e5c72 6dfdc0a196904cc6f47f10204641689b323ab2c7 2d29a3ce4c5b5c938fb22ebf0ea98e24b42f5bfc d88df35ff2336c5f62de7e2b0714b15a42570064 3dab373cde1f038367c30414e3c7cebb03b38fae 19d50ec9bf51b5c9e460c1c44ab2b5a698348cff 2e2577451f51ed25c41d38df6bee919701dd535c c9b79af7521f659b365a24e08098b8df38d16321 53ffc1ce6c0ee75cf763d5f94113b6b9e5b3c1c9 edac388c1e55ebfed907b052d35e6b33623da08d 136c0ac6591ed139f077cb86df0f54912c81658d 1fd9407c56748ff248597daf40774d7d92ee5789 a98233a9ff65f411a7a4040c9fb280f606a8fd0e 9789f5e0997278e50c46f06564adce41491e7545 c10f2bf9abc1bc9b788597baa3dceb6a1d9ceeb3 4f74ce95 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [61:6c:2d:73:0a:c8:6b:48:73:4c:7e:f6:0d:7d:05:06:1b:a7:cd:b2],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-27 08:50:55.556  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-27 08:50:55.559 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-27 08:50:55.561 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-27 08:50:55.562 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-27 08:50:55.562  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-27 08:50:55.563  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-27 08:50:55.563  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-27 08:50:55.564 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-27 08:50:55.564 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-27 08:50:55.565 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-27 08:50:55.568 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-27 08:50:55.569 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-27 08:50:55.570 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-27 08:50:55.570 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-27 08:50:55.778  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-27 08:50:55.779  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-27 08:50:55.779 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-27 08:50:55.779 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-27 08:50:55.781  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-27 08:50:55.782  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-27 08:50:55.782 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-27 08:50:55.783 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-27 08:50:55.783 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-27 08:50:55.784 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-27 08:50:55.785 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-27 08:50:55.785 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-27 08:50:55.786 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-27 08:50:55.787 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-27 08:50:55.787 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-27 08:50:55.788 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-27 08:50:55.792 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 193223772051102006624691795246072871566744300568 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 27 05:10:20 UTC 2023 Final Date: Wed Jan 26 05:10:19 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6b:03:8b:10:69:98:bd:5a:a7:5c:0d:78:98:2d:75:2d:73:5b:d1:a2],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1115b8669a5e4c9a513901a11bf4f769895437cf fef168689e34f59097b7be585fc3a33e2ca656a4 dc6453314d53f693ff88c649f692a0efa58f5673 8eb787799b1f500983eea7dae44868fc42c74edd 08680f4735fc781b118475747eb9a224aa5e5c72 6dfdc0a196904cc6f47f10204641689b323ab2c7 2d29a3ce4c5b5c938fb22ebf0ea98e24b42f5bfc d88df35ff2336c5f62de7e2b0714b15a42570064 3dab373cde1f038367c30414e3c7cebb03b38fae 19d50ec9bf51b5c9e460c1c44ab2b5a698348cff 2e2577451f51ed25c41d38df6bee919701dd535c c9b79af7521f659b365a24e08098b8df38d16321 53ffc1ce6c0ee75cf763d5f94113b6b9e5b3c1c9 edac388c1e55ebfed907b052d35e6b33623da08d 136c0ac6591ed139f077cb86df0f54912c81658d 1fd9407c56748ff248597daf40774d7d92ee5789 a98233a9ff65f411a7a4040c9fb280f606a8fd0e 9789f5e0997278e50c46f06564adce41491e7545 c10f2bf9abc1bc9b788597baa3dceb6a1d9ceeb3 4f74ce95 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4b:c7:4c:7b:eb:27:34:83:6e:08:b6:d8:fa:b6:d1:59:36:6a:ee:7a],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-27 08:56:41.093  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-27 08:56:41.095 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-27 08:56:41.098 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-27 08:56:41.099 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-27 08:56:41.099  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2023-01-27 08:56:41.100  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-27 08:56:41.100  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-27 08:56:41.100 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-27 08:56:41.101 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-27 08:56:41.101 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-27 08:56:41.106 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-27 08:56:41.108 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-27 08:56:41.108 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-27 08:56:41.108 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-27 08:56:41.260  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-27 08:56:41.260  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-27 08:56:41.261 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-27 08:56:41.261 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-27 08:56:41.262  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-27 08:56:41.263  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-27 08:56:41.263 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-27 08:56:41.263 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-27 08:56:41.264 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-27 08:56:41.264 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-27 08:56:41.265 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-27 08:56:41.265 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-27 08:56:41.265 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-27 08:56:41.266 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-27 08:56:41.266 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-27 08:56:41.267 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-27 08:56:41.270 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 193223772051102006624691795246072871566744300568 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 27 05:10:20 UTC 2023 Final Date: Wed Jan 26 05:10:19 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6b:03:8b:10:69:98:bd:5a:a7:5c:0d:78:98:2d:75:2d:73:5b:d1:a2],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1115b8669a5e4c9a513901a11bf4f769895437cf fef168689e34f59097b7be585fc3a33e2ca656a4 dc6453314d53f693ff88c649f692a0efa58f5673 8eb787799b1f500983eea7dae44868fc42c74edd 08680f4735fc781b118475747eb9a224aa5e5c72 6dfdc0a196904cc6f47f10204641689b323ab2c7 2d29a3ce4c5b5c938fb22ebf0ea98e24b42f5bfc d88df35ff2336c5f62de7e2b0714b15a42570064 3dab373cde1f038367c30414e3c7cebb03b38fae 19d50ec9bf51b5c9e460c1c44ab2b5a698348cff 2e2577451f51ed25c41d38df6bee919701dd535c c9b79af7521f659b365a24e08098b8df38d16321 53ffc1ce6c0ee75cf763d5f94113b6b9e5b3c1c9 edac388c1e55ebfed907b052d35e6b33623da08d 136c0ac6591ed139f077cb86df0f54912c81658d 1fd9407c56748ff248597daf40774d7d92ee5789 a98233a9ff65f411a7a4040c9fb280f606a8fd0e 9789f5e0997278e50c46f06564adce41491e7545 c10f2bf9abc1bc9b788597baa3dceb6a1d9ceeb3 4f74ce95 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [ed:56:c1:9e:9b:9c:a8:84:6f:96:e3:38:3d:a3:25:77:47:0a:5d:c2],[56:66:d1:a4] modulus: b2c82f007ecf8e10283fdf5d10ec636ab09df45a2cf475303c04eddd2d816b28af3cab75d22c118be7c4e8a4ba22b19ffbc738eccf51e51d678468ad572da49e7bb4264fc633bf3751b8d3c533d33b691da28e63294f001c86b1437715352a2e399dec24728439445b99de30fd8ef7f056544928153a683cbb51ca771ab01bb333610629dd9b25bdb4b560f7cf3247e5876d705863998d716305660638538b090b7597d3fd49907fbccd59a33e18237a68552408669c0875ed2d33aa3abda930a0d66ab8dc5598b5e8f09f8644596ce2c9ec61ea34b8b1e0c513ce4f76d469b7a7a33aed0314e8167fae9fc615139b8e29997ccfe518a889cdecc478b90157a5 public exponent: 10001 ] 2023-01-27 09:04:54.446  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-27 09:04:54.448 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-27 09:04:54.449 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2023-01-27 09:04:54.450 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-27 09:04:54.450  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2023-01-27 09:04:54.451  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-27 09:04:54.451  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-27 09:04:54.452 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-27 09:04:54.452 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-27 09:04:54.452 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-27 09:04:54.456 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-27 09:04:54.457 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-27 09:04:54.457 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-27 09:04:54.457 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-27 09:04:54.648  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-27 09:04:54.648  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-27 09:04:54.649 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-27 09:04:54.649 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-27 09:04:54.651  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-27 09:04:54.651  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-27 09:04:54.652 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-27 09:04:54.652 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-27 09:04:54.653 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-27 09:04:54.653 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-27 09:04:54.654 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-27 09:04:54.654 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-27 09:04:54.655 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-27 09:04:54.655 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-27 09:04:54.656 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-27 09:04:54.657 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-27 09:04:54.661 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 193223772051102006624691795246072871566744300568 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 27 05:10:20 UTC 2023 Final Date: Wed Jan 26 05:10:19 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6b:03:8b:10:69:98:bd:5a:a7:5c:0d:78:98:2d:75:2d:73:5b:d1:a2],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1115b8669a5e4c9a513901a11bf4f769895437cf fef168689e34f59097b7be585fc3a33e2ca656a4 dc6453314d53f693ff88c649f692a0efa58f5673 8eb787799b1f500983eea7dae44868fc42c74edd 08680f4735fc781b118475747eb9a224aa5e5c72 6dfdc0a196904cc6f47f10204641689b323ab2c7 2d29a3ce4c5b5c938fb22ebf0ea98e24b42f5bfc d88df35ff2336c5f62de7e2b0714b15a42570064 3dab373cde1f038367c30414e3c7cebb03b38fae 19d50ec9bf51b5c9e460c1c44ab2b5a698348cff 2e2577451f51ed25c41d38df6bee919701dd535c c9b79af7521f659b365a24e08098b8df38d16321 53ffc1ce6c0ee75cf763d5f94113b6b9e5b3c1c9 edac388c1e55ebfed907b052d35e6b33623da08d 136c0ac6591ed139f077cb86df0f54912c81658d 1fd9407c56748ff248597daf40774d7d92ee5789 a98233a9ff65f411a7a4040c9fb280f606a8fd0e 9789f5e0997278e50c46f06564adce41491e7545 c10f2bf9abc1bc9b788597baa3dceb6a1d9ceeb3 4f74ce95 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [13:10:78:81:a6:56:91:b8:ba:fd:ed:53:81:24:02:2f:2d:a4:8f:19],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-27 09:10:42.851  INFO 1 [nio-8443-exec-1] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-27 09:10:42.853 DEBUG 1 [nio-8443-exec-1] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-27 09:10:42.861 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-27 09:10:42.862 DEBUG 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-27 09:10:42.863  INFO 1 [nio-8443-exec-1] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-27 09:10:42.863  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-27 09:10:42.864  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-27 09:10:42.864 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-27 09:10:42.865 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-27 09:10:42.865 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-27 09:10:42.870 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-27 09:10:42.871 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-27 09:10:42.871 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-27 09:10:42.872 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-27 09:10:43.041  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-27 09:10:43.043  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-27 09:10:43.043 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-27 09:10:43.044 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-27 09:10:43.048  INFO 1 [nio-8443-exec-1] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-27 09:10:43.049  INFO 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-27 09:10:43.050 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-27 09:10:43.050 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-27 09:10:43.051 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-27 09:10:43.052 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-27 09:10:43.053 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-27 09:10:43.053 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-27 09:10:43.054 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-27 09:10:43.055 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-27 09:10:43.055 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-27 09:10:43.056 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-27 09:10:43.060 DEBUG 1 [nio-8443-exec-1] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 193223772051102006624691795246072871566744300568 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 27 05:10:20 UTC 2023 Final Date: Wed Jan 26 05:10:19 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6b:03:8b:10:69:98:bd:5a:a7:5c:0d:78:98:2d:75:2d:73:5b:d1:a2],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1115b8669a5e4c9a513901a11bf4f769895437cf fef168689e34f59097b7be585fc3a33e2ca656a4 dc6453314d53f693ff88c649f692a0efa58f5673 8eb787799b1f500983eea7dae44868fc42c74edd 08680f4735fc781b118475747eb9a224aa5e5c72 6dfdc0a196904cc6f47f10204641689b323ab2c7 2d29a3ce4c5b5c938fb22ebf0ea98e24b42f5bfc d88df35ff2336c5f62de7e2b0714b15a42570064 3dab373cde1f038367c30414e3c7cebb03b38fae 19d50ec9bf51b5c9e460c1c44ab2b5a698348cff 2e2577451f51ed25c41d38df6bee919701dd535c c9b79af7521f659b365a24e08098b8df38d16321 53ffc1ce6c0ee75cf763d5f94113b6b9e5b3c1c9 edac388c1e55ebfed907b052d35e6b33623da08d 136c0ac6591ed139f077cb86df0f54912c81658d 1fd9407c56748ff248597daf40774d7d92ee5789 a98233a9ff65f411a7a4040c9fb280f606a8fd0e 9789f5e0997278e50c46f06564adce41491e7545 c10f2bf9abc1bc9b788597baa3dceb6a1d9ceeb3 4f74ce95 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [99:62:c1:0f:f3:63:8d:f9:34:c5:db:cc:ae:4d:44:4c:11:07:63:7b],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-27 09:10:58.295  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-27 09:10:58.296 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-27 09:10:58.297 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-27 09:10:58.298 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-27 09:10:58.298  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-27 09:10:58.299  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-27 09:10:58.299  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-27 09:10:58.300 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-27 09:10:58.300 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-27 09:10:58.300 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-27 09:10:58.314 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-27 09:10:58.315 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-27 09:10:58.315 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-27 09:10:58.316 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-27 09:10:59.109  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-27 09:10:59.110  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-27 09:10:59.110 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-27 09:10:59.111 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-27 09:10:59.112  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-27 09:10:59.112  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-27 09:10:59.113 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-27 09:10:59.113 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-27 09:10:59.113 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-27 09:10:59.114 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-27 09:10:59.114 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-27 09:10:59.114 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-27 09:10:59.115 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-27 09:10:59.115 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-27 09:10:59.115 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-27 09:10:59.116 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-27 09:10:59.118 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 193223772051102006624691795246072871566744300568 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 27 05:10:20 UTC 2023 Final Date: Wed Jan 26 05:10:19 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6b:03:8b:10:69:98:bd:5a:a7:5c:0d:78:98:2d:75:2d:73:5b:d1:a2],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1115b8669a5e4c9a513901a11bf4f769895437cf fef168689e34f59097b7be585fc3a33e2ca656a4 dc6453314d53f693ff88c649f692a0efa58f5673 8eb787799b1f500983eea7dae44868fc42c74edd 08680f4735fc781b118475747eb9a224aa5e5c72 6dfdc0a196904cc6f47f10204641689b323ab2c7 2d29a3ce4c5b5c938fb22ebf0ea98e24b42f5bfc d88df35ff2336c5f62de7e2b0714b15a42570064 3dab373cde1f038367c30414e3c7cebb03b38fae 19d50ec9bf51b5c9e460c1c44ab2b5a698348cff 2e2577451f51ed25c41d38df6bee919701dd535c c9b79af7521f659b365a24e08098b8df38d16321 53ffc1ce6c0ee75cf763d5f94113b6b9e5b3c1c9 edac388c1e55ebfed907b052d35e6b33623da08d 136c0ac6591ed139f077cb86df0f54912c81658d 1fd9407c56748ff248597daf40774d7d92ee5789 a98233a9ff65f411a7a4040c9fb280f606a8fd0e 9789f5e0997278e50c46f06564adce41491e7545 c10f2bf9abc1bc9b788597baa3dceb6a1d9ceeb3 4f74ce95 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [60:c0:ab:40:8d:40:1e:c1:eb:ce:15:77:79:6d:97:a8:02:74:40:1f],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-27 09:37:04.809  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-27 09:37:04.813 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-27 09:37:04.815 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-27 09:37:04.816 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-27 09:37:04.817  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2023-01-27 09:37:04.818  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-27 09:37:04.818  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-27 09:37:04.819 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-27 09:37:04.820 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-27 09:37:04.823 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-27 09:37:04.828 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-27 09:37:04.829 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-27 09:37:04.829 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-27 09:37:04.830 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-27 09:37:05.045  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-27 09:37:05.046  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-27 09:37:05.046 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-27 09:37:05.047 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-27 09:37:05.048  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-27 09:37:05.049  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-27 09:37:05.049 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-27 09:37:05.049 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-27 09:37:05.050 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-27 09:37:05.051 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-27 09:37:05.051 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-27 09:37:05.051 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-27 09:37:05.052 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-27 09:37:05.052 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-27 09:37:05.052 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-27 09:37:05.053 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-27 09:37:05.057 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 193223772051102006624691795246072871566744300568 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 27 05:10:20 UTC 2023 Final Date: Wed Jan 26 05:10:19 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6b:03:8b:10:69:98:bd:5a:a7:5c:0d:78:98:2d:75:2d:73:5b:d1:a2],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1115b8669a5e4c9a513901a11bf4f769895437cf fef168689e34f59097b7be585fc3a33e2ca656a4 dc6453314d53f693ff88c649f692a0efa58f5673 8eb787799b1f500983eea7dae44868fc42c74edd 08680f4735fc781b118475747eb9a224aa5e5c72 6dfdc0a196904cc6f47f10204641689b323ab2c7 2d29a3ce4c5b5c938fb22ebf0ea98e24b42f5bfc d88df35ff2336c5f62de7e2b0714b15a42570064 3dab373cde1f038367c30414e3c7cebb03b38fae 19d50ec9bf51b5c9e460c1c44ab2b5a698348cff 2e2577451f51ed25c41d38df6bee919701dd535c c9b79af7521f659b365a24e08098b8df38d16321 53ffc1ce6c0ee75cf763d5f94113b6b9e5b3c1c9 edac388c1e55ebfed907b052d35e6b33623da08d 136c0ac6591ed139f077cb86df0f54912c81658d 1fd9407c56748ff248597daf40774d7d92ee5789 a98233a9ff65f411a7a4040c9fb280f606a8fd0e 9789f5e0997278e50c46f06564adce41491e7545 c10f2bf9abc1bc9b788597baa3dceb6a1d9ceeb3 4f74ce95 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f8:14:15:97:ef:3a:1e:b6:9a:b1:13:af:28:92:3f:e7:43:d1:b2:88],[56:66:d1:a4] modulus: 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 public exponent: 10001 ] 2023-01-27 09:37:09.650  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2023-01-27 09:37:09.651 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2023-01-27 09:37:09.653 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-27 09:37:09.654 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2023-01-27 09:37:09.654  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2023-01-27 09:37:09.655  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2023-01-27 09:37:09.655  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2023-01-27 09:37:09.656 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2023-01-27 09:37:09.656 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2023-01-27 09:37:09.656 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2023-01-27 09:37:09.659 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2023-01-27 09:37:09.660 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-27 09:37:09.662 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2023-01-27 09:37:09.662 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-27 09:37:09.812  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2023-01-27 09:37:09.813  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2023-01-27 09:37:09.813 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2023-01-27 09:37:09.814 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2023-01-27 09:37:09.815  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2023-01-27 09:37:09.815  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2023-01-27 09:37:09.815 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-27 09:37:09.816 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-27 09:37:09.816 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-27 09:37:09.816 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-27 09:37:09.817 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-27 09:37:09.817 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-27 09:37:09.817 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2023-01-27 09:37:09.818 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2023-01-27 09:37:09.818 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2023-01-27 09:37:09.819 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2023-01-27 09:37:09.821 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 193223772051102006624691795246072871566744300568 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Fri Jan 27 05:10:20 UTC 2023 Final Date: Wed Jan 26 05:10:19 UTC 2033 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [6b:03:8b:10:69:98:bd:5a:a7:5c:0d:78:98:2d:75:2d:73:5b:d1:a2],[56:66:d1:a4] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: 1115b8669a5e4c9a513901a11bf4f769895437cf fef168689e34f59097b7be585fc3a33e2ca656a4 dc6453314d53f693ff88c649f692a0efa58f5673 8eb787799b1f500983eea7dae44868fc42c74edd 08680f4735fc781b118475747eb9a224aa5e5c72 6dfdc0a196904cc6f47f10204641689b323ab2c7 2d29a3ce4c5b5c938fb22ebf0ea98e24b42f5bfc d88df35ff2336c5f62de7e2b0714b15a42570064 3dab373cde1f038367c30414e3c7cebb03b38fae 19d50ec9bf51b5c9e460c1c44ab2b5a698348cff 2e2577451f51ed25c41d38df6bee919701dd535c c9b79af7521f659b365a24e08098b8df38d16321 53ffc1ce6c0ee75cf763d5f94113b6b9e5b3c1c9 edac388c1e55ebfed907b052d35e6b33623da08d 136c0ac6591ed139f077cb86df0f54912c81658d 1fd9407c56748ff248597daf40774d7d92ee5789 a98233a9ff65f411a7a4040c9fb280f606a8fd0e 9789f5e0997278e50c46f06564adce41491e7545 c10f2bf9abc1bc9b788597baa3dceb6a1d9ceeb3 4f74ce95 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [CONTEXT 0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [d9:c8:66:ff:d5:dd:e3:0c:c8:a1:2c:fd:a3:f8:52:f0:7b:af:3a:e4],[56:66:d1:a4] modulus: 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 public exponent: 10001 ]