2022-04-09 01:39:05,181 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. 2022-04-09 01:39:10,271 main INFO Log4j appears to be running in a Servlet environment, but there's no log4j-web module available. If you want better web container support, please add the log4j-web JAR to your web archive or server lib directory. . ____ _ __ _ _ /\\ / ___'_ __ _ _(_)_ __ __ _ \ \ \ \ ( ( )\___ | '_ | '_| | '_ \/ _` | \ \ \ \ \\/ ___)| |_)| | | | | || (_| | ) ) ) ) ' |____| .__|_| |_|_| |_\__, | / / / / =========|_|==============|___/=/_/_/_/ :: Spring Boot :: (v2.5.8) 2022-04-09 01:39:13.595  INFO 1 [ main] o.s.b.SpringApplication  : No active profile set, falling back to default profiles: default Apr 09, 2022 1:39:24 AM org.apache.coyote.AbstractProtocol init INFO: Initializing ProtocolHandler ["https-jsse-nio-8443"] Apr 09, 2022 1:39:24 AM org.apache.catalina.core.StandardService startInternal INFO: Starting service [Tomcat] Apr 09, 2022 1:39:24 AM org.apache.catalina.core.StandardEngine startInternal INFO: Starting Servlet engine: [Apache Tomcat/9.0.56] Apr 09, 2022 1:39:24 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring embedded WebApplicationContext 2022-04-09 01:39:27.083 DEBUG 1 [ main] o.j.l.LoggerProviders  : Logging Provider: org.jboss.logging.Log4j2LoggerProvider 2022-04-09 01:39:28.687  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : Loading initial configuration 2022-04-09 01:39:29.475  INFO 1 [ main] o.o.o.c.c.c.CmpServersConfig  : CMP Servers configuration successfully loaded from file /etc/onap/oom/certservice/cmpServers.json 2022-04-09 01:39:32.577 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReloadConfigController: {GET [/reload], produces [application/json]}: reloadConfiguration() 2022-04-09 01:39:32.580 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.CertificationController: {GET [/v1/certificate-update/{caName}], produces [application/json]}: updateCertificate(String,String,String,String,String) {GET [/v1/certificate/{caName}], produces [application/json]}: signCertificate(String,String,String) 2022-04-09 01:39:32.581 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.o.o.c.a.ReadinessController: {GET [/ready], produces [application/json]}: checkReady() 2022-04-09 01:39:32.585 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.b.a.w.s.e.BasicErrorController: { [/error]}: error(HttpServletRequest) { [/error], produces [text/html]}: errorHtml(HttpServletRequest,HttpServletResponse) 2022-04-09 01:39:32.786 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.a.OpenApiResource: {GET [/v3/api-docs], produces [application/json]}: openapiJson(HttpServletRequest,String) {GET [/v3/api-docs.yaml], produces [application/vnd.oai.openapi]}: openapiYaml(HttpServletRequest,String) 2022-04-09 01:39:32.866 DEBUG 1 [ main] o.s.w.s.h.AbstractHandlerMethodMapping  : o.s.u.SwaggerWelcome: {GET [/v3/api-docs/swagger-config], produces [application/json]}: openapiYaml(HttpServletRequest) {GET [/docs]}: redirectToUi(HttpServletRequest) 2022-04-09 01:39:33.386 DEBUG 1 [ main] w.s.h.AbstractDetectingUrlHandlerMapping : 'beanNameHandlerMapping' {} 2022-04-09 01:39:38.580 DEBUG 1 [ main] o.s.w.s.h.SimpleUrlHandlerMapping  : 'resourceHandlerMapping' {/webjars/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]], /**=ResourceHttpRequestHandler [classpath [META-INF/resources/], classpath [resources/], classpath [static/], classpath [public/], ServletContext [/]], /**/swagger-ui/**=ResourceHttpRequestHandler [classpath [META-INF/resources/webjars/]]} Apr 09, 2022 1:39:41 AM org.apache.coyote.AbstractProtocol start INFO: Starting ProtocolHandler ["https-jsse-nio-8443"] 2022-04-09 01:39:43.279  INFO 1 [ main] o.s.b.StartupInfoLogger  : Started CertServiceApplication in 41.909 seconds (JVM running for 50.544) Apr 09, 2022 1:39:48 AM org.apache.catalina.core.ApplicationContext log INFO: Initializing Spring DispatcherServlet 'dispatcherServlet' 2022-04-09 01:40:28.375  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-09 01:40:28.382 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-09 01:40:28.664 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-04-09 01:40:28.668 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-09 01:40:28.765  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=sdnc.simpledemo.onap.org }, SANs: [sdnc.simpledemo.onap.org] } 2022-04-09 01:40:28.769  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-09 01:40:28.770  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-09 01:40:28.771 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-09 01:40:28.772 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-09 01:40:28.775 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-09 01:40:28.781 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-09 01:40:28.865 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-09 01:40:28.980 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-09 01:40:28.986 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-09 01:40:28.986 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-09 01:40:29.068 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-09 01:40:30.543  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-09 01:40:30.546  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-09 01:40:30.546 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-09 01:40:30.547 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-09 01:40:30.556  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-09 01:40:30.557  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-09 01:40:30.558 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 01:40:30.558 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-09 01:40:30.558 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-09 01:40:30.573 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 01:40:30.573 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-09 01:40:30.573 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-09 01:40:30.579 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 01:40:30.580 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-09 01:40:30.580 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-09 01:40:30.582 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=sdnc.simpledemo.onap.org,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-09 01:40:30.773 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 478396792184796621745948830860369281502746679404 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Apr 09 01:36:10 UTC 2022 Final Date: Thu Apr 08 01:36:09 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [69:d0:35:4d:b7:40:43:3c:55:3d:9b:0c:19:61:55:eb:6b:7d:59:73] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: ac76f76be92979b692527cc524439f4ea467c1ed 23fa462fe763d0ee8eecf2cf4e11055b3bfb4bc9 e9eac29a033f7c05624cd6fd707362dbf8b7f0b0 306459dbac5f1706229367baf4e5117044049ebf 09a12f3a6f4bf8d6d6696deb1ee7b7893e5871e2 2ca97c8ed4078267ae9e99a7a9a4de92ca6c4e7d e8513c43c55e42ae1e75ba7f82d4af1666e712ce ba7f29839d95231c3f1bfc9f130cbc4f9cd7fbaf c35fa4cc7cb540bc34a1ff8fd0ffde0b3e1e1c19 bd75e6dac79d847c5c5f089c86abc652dff28cca ccb78dc9dfb9bf4f7b744b2c1ce6dc40509a1ccc a05fa8a06c0fdf00c76b32e80cb1ab3d74c9dcd9 512ef48c183329145c12ef8d99374eb20f3e4e98 ca5e44b7bb3e590eabea5438a2706fdb34084752 40838fcf4c4b1683284d28abd55418ad4f2dcdf2 194e8d6542a8d9d2b45bc4170cd9b50e9efefc6f b7a3a03d328ff8c12de52343810d5a95499c4161 e507a1bb1ca01a8fa0dda64190a6a0deb21cef96 1b4b1135acf9f0ac8827a3c3763cde1092afb4d3 4cf15a16 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [9b:06:9f:1f:70:3c:65:9b:4b:6e:a9:70:70:5a:d6:bc:bb:f1:d0:d3] modulus: c4e4d6ef47b7c9c2dc7fe0cdf8d534d9b885d7c3de735bf670eaef75c1c4b21c4ac51acc28e176eaf273a3ee53d5f997e7efde9a28d5e28712d82eb3873f190cf3353a4cac64a887655c5e66789e8e3e770fdb217d4c3258c53ee1083baff358197b2de65f0dad88f7759af5fe814edf6629f6aa01aa9906bfd532fb40a2cc6a732b160074facd57765f556af07afd1cd002d5f36c6bbe72c407a31576b5820af8754e57cee2e39bb60bf6d014bf9dfb73b53050db58bb5479098c13d62fa6869492c3918f7c7f4a23d301262a15d8a59ed19d4968890a3a16a65ebe8bb3e1ae269ab4f036f480a5be7520787610bc6b807a474dca52833a5cf1f67ebed560e1 public exponent: 10001 ] 2022-04-09 03:12:24.260  INFO 1 [nio-8443-exec-8] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-09 03:12:24.263 DEBUG 1 [nio-8443-exec-8] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-09 03:12:24.265 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-09 03:12:24.265 DEBUG 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-09 03:12:24.267  INFO 1 [nio-8443-exec-8] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-09 03:12:24.268  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-09 03:12:24.268  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-09 03:12:24.269 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-09 03:12:24.269 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-09 03:12:24.270 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-09 03:12:24.283 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-09 03:12:24.284 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-09 03:12:24.284 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-09 03:12:24.285 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-09 03:12:24.477  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-09 03:12:24.478  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-09 03:12:24.478 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-09 03:12:24.478 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-09 03:12:24.482  INFO 1 [nio-8443-exec-8] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-09 03:12:24.483  INFO 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-09 03:12:24.483 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 03:12:24.484 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-09 03:12:24.484 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-09 03:12:24.485 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 03:12:24.486 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-09 03:12:24.486 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-09 03:12:24.487 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 03:12:24.487 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-09 03:12:24.487 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-09 03:12:24.489 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-09 03:12:24.565 DEBUG 1 [nio-8443-exec-8] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 478396792184796621745948830860369281502746679404 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Apr 09 01:36:10 UTC 2022 Final Date: Thu Apr 08 01:36:09 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [69:d0:35:4d:b7:40:43:3c:55:3d:9b:0c:19:61:55:eb:6b:7d:59:73] modulus: bbaf374ed4fc3f92615d23626464a1154da3447c84716df96cf8208074946911d424d07cc9e667946234d5e4243bb005f85b8f2be214c139645fb84513cf218128355c252f48ba2d1dea6cda7717c83469079248d9ead38914d27da336c11b93f65912ecd00aac5ee1378c11f1964cefefc90e2afbcb82816da956006e860e83f1a194eca360015e148275db387ff866c09c196d56bd87fc17e33b7007874fbc5499902e9e8e0f7b74e567c412b370cd74c9bbe29af734901aaff7092cffd5bf096836052f122f47c96b931cd9a00a67776782c0118b068f37f4cbbb71aade9edecc5f75359495fd470f5813675771c448be9d12f843b6ad0042676f89391fe71591cc53e427e6ce6e1ef35c237d0a0b8e4bfeca26aab0a7dd41e24269d840199688bae35e63ab620da4c21bfa437e09afb3ddc67eddb8281292e6d532a77f578eda933f7216d28565f629a4e655517e0514d5fd48961aaffc5e2bf8def1564f18f53222d7175233633ee43e4e8ad89ad2e0345d0c29c9b740de532f4b7d5a65 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: ac76f76be92979b692527cc524439f4ea467c1ed 23fa462fe763d0ee8eecf2cf4e11055b3bfb4bc9 e9eac29a033f7c05624cd6fd707362dbf8b7f0b0 306459dbac5f1706229367baf4e5117044049ebf 09a12f3a6f4bf8d6d6696deb1ee7b7893e5871e2 2ca97c8ed4078267ae9e99a7a9a4de92ca6c4e7d e8513c43c55e42ae1e75ba7f82d4af1666e712ce ba7f29839d95231c3f1bfc9f130cbc4f9cd7fbaf c35fa4cc7cb540bc34a1ff8fd0ffde0b3e1e1c19 bd75e6dac79d847c5c5f089c86abc652dff28cca ccb78dc9dfb9bf4f7b744b2c1ce6dc40509a1ccc a05fa8a06c0fdf00c76b32e80cb1ab3d74c9dcd9 512ef48c183329145c12ef8d99374eb20f3e4e98 ca5e44b7bb3e590eabea5438a2706fdb34084752 40838fcf4c4b1683284d28abd55418ad4f2dcdf2 194e8d6542a8d9d2b45bc4170cd9b50e9efefc6f b7a3a03d328ff8c12de52343810d5a95499c4161 e507a1bb1ca01a8fa0dda64190a6a0deb21cef96 1b4b1135acf9f0ac8827a3c3763cde1092afb4d3 4cf15a16 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f7:19:ab:a1:cc:e9:73:16:df:bd:8c:aa:1c:6b:74:b6:60:75:e1:f1] modulus: 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 public exponent: 10001 ] 2022-04-09 03:15:43.677  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-09 03:15:43.679 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-09 03:15:43.681 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-09 03:15:43.682 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-09 03:15:43.683  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-09 03:15:43.686  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-09 03:15:43.686  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-09 03:15:43.687 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-09 03:15:43.688 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-09 03:15:43.688 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-09 03:15:43.693 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-09 03:15:43.694 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-09 03:15:43.694 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-09 03:15:43.695 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-09 03:15:44.026  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-09 03:15:44.026  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-09 03:15:44.027 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-09 03:15:44.027 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-09 03:15:44.030  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-09 03:15:44.030  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-09 03:15:44.031 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 03:15:44.031 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-09 03:15:44.032 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-09 03:15:44.033 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 03:15:44.033 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-09 03:15:44.034 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-09 03:15:44.034 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 03:15:44.035 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-09 03:15:44.035 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-09 03:15:44.037 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-09 03:15:44.041 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 478396792184796621745948830860369281502746679404 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Apr 09 01:36:10 UTC 2022 Final Date: Thu Apr 08 01:36:09 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [69:d0:35:4d:b7:40:43:3c:55:3d:9b:0c:19:61:55:eb:6b:7d:59:73] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: ac76f76be92979b692527cc524439f4ea467c1ed 23fa462fe763d0ee8eecf2cf4e11055b3bfb4bc9 e9eac29a033f7c05624cd6fd707362dbf8b7f0b0 306459dbac5f1706229367baf4e5117044049ebf 09a12f3a6f4bf8d6d6696deb1ee7b7893e5871e2 2ca97c8ed4078267ae9e99a7a9a4de92ca6c4e7d e8513c43c55e42ae1e75ba7f82d4af1666e712ce ba7f29839d95231c3f1bfc9f130cbc4f9cd7fbaf c35fa4cc7cb540bc34a1ff8fd0ffde0b3e1e1c19 bd75e6dac79d847c5c5f089c86abc652dff28cca ccb78dc9dfb9bf4f7b744b2c1ce6dc40509a1ccc a05fa8a06c0fdf00c76b32e80cb1ab3d74c9dcd9 512ef48c183329145c12ef8d99374eb20f3e4e98 ca5e44b7bb3e590eabea5438a2706fdb34084752 40838fcf4c4b1683284d28abd55418ad4f2dcdf2 194e8d6542a8d9d2b45bc4170cd9b50e9efefc6f b7a3a03d328ff8c12de52343810d5a95499c4161 e507a1bb1ca01a8fa0dda64190a6a0deb21cef96 1b4b1135acf9f0ac8827a3c3763cde1092afb4d3 4cf15a16 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [de:05:0e:27:65:7c:56:6b:a6:8d:08:15:bf:e6:6d:75:41:4f:cf:fc] modulus: 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 public exponent: 10001 ] 2022-04-09 03:17:51.269  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-09 03:17:51.270 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-09 03:17:51.272 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-04-09 03:17:51.273 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-09 03:17:51.273  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-ves-collector-cmpv2-cert }, SANs: [dcae-ves-collector-cmpv2-cert, ves-cmpv2-cert, ves-collector-cmpv2-cert] } 2022-04-09 03:17:51.274  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-09 03:17:51.275  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-09 03:17:51.275 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-09 03:17:51.275 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-09 03:17:51.276 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-09 03:17:51.280 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-09 03:17:51.281 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-09 03:17:51.281 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-09 03:17:51.281 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-09 03:17:51.459  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-09 03:17:51.463  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-09 03:17:51.463 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-09 03:17:51.464 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-09 03:17:51.466  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-09 03:17:51.466  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-09 03:17:51.467 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 03:17:51.467 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-09 03:17:51.468 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-09 03:17:51.468 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 03:17:51.469 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-09 03:17:51.469 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-09 03:17:51.470 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 03:17:51.471 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-09 03:17:51.471 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-09 03:17:51.473 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-ves-collector-cmpv2-cert,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-09 03:17:51.478 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 478396792184796621745948830860369281502746679404 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Apr 09 01:36:10 UTC 2022 Final Date: Thu Apr 08 01:36:09 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [69:d0:35:4d:b7:40:43:3c:55:3d:9b:0c:19:61:55:eb:6b:7d:59:73] modulus: bbaf374ed4fc3f92615d23626464a1154da3447c84716df96cf8208074946911d424d07cc9e667946234d5e4243bb005f85b8f2be214c139645fb84513cf218128355c252f48ba2d1dea6cda7717c83469079248d9ead38914d27da336c11b93f65912ecd00aac5ee1378c11f1964cefefc90e2afbcb82816da956006e860e83f1a194eca360015e148275db387ff866c09c196d56bd87fc17e33b7007874fbc5499902e9e8e0f7b74e567c412b370cd74c9bbe29af734901aaff7092cffd5bf096836052f122f47c96b931cd9a00a67776782c0118b068f37f4cbbb71aade9edecc5f75359495fd470f5813675771c448be9d12f843b6ad0042676f89391fe71591cc53e427e6ce6e1ef35c237d0a0b8e4bfeca26aab0a7dd41e24269d840199688bae35e63ab620da4c21bfa437e09afb3ddc67eddb8281292e6d532a77f578eda933f7216d28565f629a4e655517e0514d5fd48961aaffc5e2bf8def1564f18f53222d7175233633ee43e4e8ad89ad2e0345d0c29c9b740de532f4b7d5a65 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: ac76f76be92979b692527cc524439f4ea467c1ed 23fa462fe763d0ee8eecf2cf4e11055b3bfb4bc9 e9eac29a033f7c05624cd6fd707362dbf8b7f0b0 306459dbac5f1706229367baf4e5117044049ebf 09a12f3a6f4bf8d6d6696deb1ee7b7893e5871e2 2ca97c8ed4078267ae9e99a7a9a4de92ca6c4e7d e8513c43c55e42ae1e75ba7f82d4af1666e712ce ba7f29839d95231c3f1bfc9f130cbc4f9cd7fbaf c35fa4cc7cb540bc34a1ff8fd0ffde0b3e1e1c19 bd75e6dac79d847c5c5f089c86abc652dff28cca ccb78dc9dfb9bf4f7b744b2c1ce6dc40509a1ccc a05fa8a06c0fdf00c76b32e80cb1ab3d74c9dcd9 512ef48c183329145c12ef8d99374eb20f3e4e98 ca5e44b7bb3e590eabea5438a2706fdb34084752 40838fcf4c4b1683284d28abd55418ad4f2dcdf2 194e8d6542a8d9d2b45bc4170cd9b50e9efefc6f b7a3a03d328ff8c12de52343810d5a95499c4161 e507a1bb1ca01a8fa0dda64190a6a0deb21cef96 1b4b1135acf9f0ac8827a3c3763cde1092afb4d3 4cf15a16 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [1f:a8:b5:71:b3:52:ad:c8:5b:95:a4:d7:8c:9e:32:a2:62:5a:96:31] modulus: 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 public exponent: 10001 ] 2022-04-09 03:19:56.367  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-09 03:19:56.369 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-09 03:19:56.371 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-09 03:19:56.372 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-09 03:19:56.372  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-09 03:19:56.373  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-09 03:19:56.374  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-09 03:19:56.374 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-09 03:19:56.374 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-09 03:19:56.375 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-09 03:19:56.380 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-09 03:19:56.381 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-09 03:19:56.381 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-09 03:19:56.381 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-09 03:19:56.538  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-09 03:19:56.563  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-09 03:19:56.564 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-09 03:19:56.565 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-09 03:19:56.567  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-09 03:19:56.568  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-09 03:19:56.569 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 03:19:56.569 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-09 03:19:56.570 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-09 03:19:56.571 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 03:19:56.571 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-09 03:19:56.571 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-09 03:19:56.572 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 03:19:56.573 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-09 03:19:56.573 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-09 03:19:56.574 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-09 03:19:56.579 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 478396792184796621745948830860369281502746679404 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Apr 09 01:36:10 UTC 2022 Final Date: Thu Apr 08 01:36:09 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [69:d0:35:4d:b7:40:43:3c:55:3d:9b:0c:19:61:55:eb:6b:7d:59:73] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: ac76f76be92979b692527cc524439f4ea467c1ed 23fa462fe763d0ee8eecf2cf4e11055b3bfb4bc9 e9eac29a033f7c05624cd6fd707362dbf8b7f0b0 306459dbac5f1706229367baf4e5117044049ebf 09a12f3a6f4bf8d6d6696deb1ee7b7893e5871e2 2ca97c8ed4078267ae9e99a7a9a4de92ca6c4e7d e8513c43c55e42ae1e75ba7f82d4af1666e712ce ba7f29839d95231c3f1bfc9f130cbc4f9cd7fbaf c35fa4cc7cb540bc34a1ff8fd0ffde0b3e1e1c19 bd75e6dac79d847c5c5f089c86abc652dff28cca ccb78dc9dfb9bf4f7b744b2c1ce6dc40509a1ccc a05fa8a06c0fdf00c76b32e80cb1ab3d74c9dcd9 512ef48c183329145c12ef8d99374eb20f3e4e98 ca5e44b7bb3e590eabea5438a2706fdb34084752 40838fcf4c4b1683284d28abd55418ad4f2dcdf2 194e8d6542a8d9d2b45bc4170cd9b50e9efefc6f b7a3a03d328ff8c12de52343810d5a95499c4161 e507a1bb1ca01a8fa0dda64190a6a0deb21cef96 1b4b1135acf9f0ac8827a3c3763cde1092afb4d3 4cf15a16 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [fb:84:71:02:9c:4b:aa:9a:73:11:48:eb:88:39:f5:b4:9c:c4:e9:16] modulus: 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 public exponent: 10001 ] 2022-04-09 03:24:11.011  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-09 03:24:11.012 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-09 03:24:11.014 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-04-09 03:24:11.014 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-09 03:24:11.015  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans }, SANs: [wrong-sans] } 2022-04-09 03:24:11.015  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-09 03:24:11.016  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-09 03:24:11.016 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-09 03:24:11.016 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-09 03:24:11.017 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-09 03:24:11.024 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-09 03:24:11.024 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-09 03:24:11.025 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-09 03:24:11.025 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-09 03:24:11.155  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-09 03:24:11.156  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-09 03:24:11.157 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-09 03:24:11.157 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-09 03:24:11.160  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-09 03:24:11.160  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-09 03:24:11.161 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 03:24:11.161 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-09 03:24:11.161 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-09 03:24:11.161 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 03:24:11.162 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-09 03:24:11.162 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-09 03:24:11.162 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 03:24:11.162 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-09 03:24:11.163 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-09 03:24:11.163 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-09 03:24:11.166 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 478396792184796621745948830860369281502746679404 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Apr 09 01:36:10 UTC 2022 Final Date: Thu Apr 08 01:36:09 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [69:d0:35:4d:b7:40:43:3c:55:3d:9b:0c:19:61:55:eb:6b:7d:59:73] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: ac76f76be92979b692527cc524439f4ea467c1ed 23fa462fe763d0ee8eecf2cf4e11055b3bfb4bc9 e9eac29a033f7c05624cd6fd707362dbf8b7f0b0 306459dbac5f1706229367baf4e5117044049ebf 09a12f3a6f4bf8d6d6696deb1ee7b7893e5871e2 2ca97c8ed4078267ae9e99a7a9a4de92ca6c4e7d e8513c43c55e42ae1e75ba7f82d4af1666e712ce ba7f29839d95231c3f1bfc9f130cbc4f9cd7fbaf c35fa4cc7cb540bc34a1ff8fd0ffde0b3e1e1c19 bd75e6dac79d847c5c5f089c86abc652dff28cca ccb78dc9dfb9bf4f7b744b2c1ce6dc40509a1ccc a05fa8a06c0fdf00c76b32e80cb1ab3d74c9dcd9 512ef48c183329145c12ef8d99374eb20f3e4e98 ca5e44b7bb3e590eabea5438a2706fdb34084752 40838fcf4c4b1683284d28abd55418ad4f2dcdf2 194e8d6542a8d9d2b45bc4170cd9b50e9efefc6f b7a3a03d328ff8c12de52343810d5a95499c4161 e507a1bb1ca01a8fa0dda64190a6a0deb21cef96 1b4b1135acf9f0ac8827a3c3763cde1092afb4d3 4cf15a16 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f5:0e:99:ac:02:6c:97:6e:59:9f:d1:c7:ea:78:94:14:05:04:17:81] modulus: bc8c1380502e46e3a48f1379864cd06e83c417e0f93fff607a9041d93f1e641bceff932e479af6b551e30aafba5b592784a7deacd1b3b83f89821d8256fb88182190451b9ef28c96553fb96328b2e6998564faad8906796bedcedf46aa0932bdcd260b27f5955bcdf4e2c2a04240f7dc5f4cc28de8baa5e336e913c129e2c7b8e21925b4a93cd0241e76e56ed18d0ecd69c6ec1c4bde4cff8a707c8a0cbcea4d7e86d38bc68df89ce46f1c40db3286431f31719cbc4e92a3a916e055ab9065572cd560b8bce7a9767aeaf873b3918f57f49fd17870a31a4f988d48348a0d1a5ff18be56888b2bbc5e7a4b3469bafc82a2bc637b17de2235ddf6fc4f9048851fb public exponent: 10001 ] 2022-04-09 03:27:17.650  INFO 1 [nio-8443-exec-2] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-09 03:27:17.651 DEBUG 1 [nio-8443-exec-2] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-09 03:27:17.653 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-09 03:27:17.653 DEBUG 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-09 03:27:17.654  INFO 1 [nio-8443-exec-2] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-ves-client-cmpv2 }, SANs: [ves-client] } 2022-04-09 03:27:17.654  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-09 03:27:17.655  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-09 03:27:17.655 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-09 03:27:17.655 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-09 03:27:17.656 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-09 03:27:17.661 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-09 03:27:17.661 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-09 03:27:17.661 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-09 03:27:17.662 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-09 03:27:17.769  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-09 03:27:17.769  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-09 03:27:17.770 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-09 03:27:17.770 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-09 03:27:17.771  INFO 1 [nio-8443-exec-2] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-09 03:27:17.772  INFO 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-09 03:27:17.772 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 03:27:17.772 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-09 03:27:17.772 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-09 03:27:17.773 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 03:27:17.773 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-09 03:27:17.774 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-09 03:27:17.774 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 03:27:17.774 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-09 03:27:17.775 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-09 03:27:17.775 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-ves-client-cmpv2,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-09 03:27:17.778 DEBUG 1 [nio-8443-exec-2] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 478396792184796621745948830860369281502746679404 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Apr 09 01:36:10 UTC 2022 Final Date: Thu Apr 08 01:36:09 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [69:d0:35:4d:b7:40:43:3c:55:3d:9b:0c:19:61:55:eb:6b:7d:59:73] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: ac76f76be92979b692527cc524439f4ea467c1ed 23fa462fe763d0ee8eecf2cf4e11055b3bfb4bc9 e9eac29a033f7c05624cd6fd707362dbf8b7f0b0 306459dbac5f1706229367baf4e5117044049ebf 09a12f3a6f4bf8d6d6696deb1ee7b7893e5871e2 2ca97c8ed4078267ae9e99a7a9a4de92ca6c4e7d e8513c43c55e42ae1e75ba7f82d4af1666e712ce ba7f29839d95231c3f1bfc9f130cbc4f9cd7fbaf c35fa4cc7cb540bc34a1ff8fd0ffde0b3e1e1c19 bd75e6dac79d847c5c5f089c86abc652dff28cca ccb78dc9dfb9bf4f7b744b2c1ce6dc40509a1ccc a05fa8a06c0fdf00c76b32e80cb1ab3d74c9dcd9 512ef48c183329145c12ef8d99374eb20f3e4e98 ca5e44b7bb3e590eabea5438a2706fdb34084752 40838fcf4c4b1683284d28abd55418ad4f2dcdf2 194e8d6542a8d9d2b45bc4170cd9b50e9efefc6f b7a3a03d328ff8c12de52343810d5a95499c4161 e507a1bb1ca01a8fa0dda64190a6a0deb21cef96 1b4b1135acf9f0ac8827a3c3763cde1092afb4d3 4cf15a16 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [72:9a:07:28:d0:4a:91:61:a6:00:f1:7f:04:e4:dc:f7:6d:20:3a:22] modulus: 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 public exponent: 10001 ] 2022-04-09 03:30:00.184  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-09 03:30:00.185 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-09 03:30:00.187 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-04-09 03:30:00.187 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-09 03:30:00.188  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=dcae-datafile-collector }, SANs: [datafile, datafile-collector, dcae-datafile-collector] } 2022-04-09 03:30:00.188  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-09 03:30:00.188  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-09 03:30:00.189 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-09 03:30:00.189 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-09 03:30:00.189 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-09 03:30:00.193 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-09 03:30:00.194 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-09 03:30:00.194 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-09 03:30:00.194 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-09 03:30:00.269  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-09 03:30:00.270  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-09 03:30:00.270 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-09 03:30:00.270 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-09 03:30:00.273  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-09 03:30:00.273  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-09 03:30:00.273 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 03:30:00.273 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-09 03:30:00.273 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-09 03:30:00.274 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 03:30:00.274 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-09 03:30:00.275 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-09 03:30:00.275 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 03:30:00.275 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-09 03:30:00.275 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-09 03:30:00.276 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=dcae-datafile-collector,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-09 03:30:00.279 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 478396792184796621745948830860369281502746679404 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Apr 09 01:36:10 UTC 2022 Final Date: Thu Apr 08 01:36:09 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [69:d0:35:4d:b7:40:43:3c:55:3d:9b:0c:19:61:55:eb:6b:7d:59:73] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: ac76f76be92979b692527cc524439f4ea467c1ed 23fa462fe763d0ee8eecf2cf4e11055b3bfb4bc9 e9eac29a033f7c05624cd6fd707362dbf8b7f0b0 306459dbac5f1706229367baf4e5117044049ebf 09a12f3a6f4bf8d6d6696deb1ee7b7893e5871e2 2ca97c8ed4078267ae9e99a7a9a4de92ca6c4e7d e8513c43c55e42ae1e75ba7f82d4af1666e712ce ba7f29839d95231c3f1bfc9f130cbc4f9cd7fbaf c35fa4cc7cb540bc34a1ff8fd0ffde0b3e1e1c19 bd75e6dac79d847c5c5f089c86abc652dff28cca ccb78dc9dfb9bf4f7b744b2c1ce6dc40509a1ccc a05fa8a06c0fdf00c76b32e80cb1ab3d74c9dcd9 512ef48c183329145c12ef8d99374eb20f3e4e98 ca5e44b7bb3e590eabea5438a2706fdb34084752 40838fcf4c4b1683284d28abd55418ad4f2dcdf2 194e8d6542a8d9d2b45bc4170cd9b50e9efefc6f b7a3a03d328ff8c12de52343810d5a95499c4161 e507a1bb1ca01a8fa0dda64190a6a0deb21cef96 1b4b1135acf9f0ac8827a3c3763cde1092afb4d3 4cf15a16 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [4f:17:4f:1e:dc:50:93:fa:dd:37:31:2b:a9:05:a7:98:b6:dc:ad:9f] modulus: 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 public exponent: 10001 ] 2022-04-09 03:37:01.899  INFO 1 [nio-8443-exec-3] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-09 03:37:01.900 DEBUG 1 [nio-8443-exec-3] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-09 03:37:01.902 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-04-09 03:37:01.902 DEBUG 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-09 03:37:01.903  INFO 1 [nio-8443-exec-3] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-04-09 03:37:01.903  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-09 03:37:01.903  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-09 03:37:01.904 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-09 03:37:01.904 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-09 03:37:01.904 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-09 03:37:01.908 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-09 03:37:01.908 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-09 03:37:01.909 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-09 03:37:01.909 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-09 03:37:01.996  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-09 03:37:01.997  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-09 03:37:01.997 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-09 03:37:01.997 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-09 03:37:01.999  INFO 1 [nio-8443-exec-3] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-09 03:37:01.999  INFO 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-09 03:37:02.000 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 03:37:02.000 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-09 03:37:02.000 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-09 03:37:02.001 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 03:37:02.001 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-09 03:37:02.001 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-09 03:37:02.002 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 03:37:02.002 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-09 03:37:02.002 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-09 03:37:02.003 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-09 03:37:02.006 DEBUG 1 [nio-8443-exec-3] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 478396792184796621745948830860369281502746679404 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Apr 09 01:36:10 UTC 2022 Final Date: Thu Apr 08 01:36:09 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [69:d0:35:4d:b7:40:43:3c:55:3d:9b:0c:19:61:55:eb:6b:7d:59:73] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: ac76f76be92979b692527cc524439f4ea467c1ed 23fa462fe763d0ee8eecf2cf4e11055b3bfb4bc9 e9eac29a033f7c05624cd6fd707362dbf8b7f0b0 306459dbac5f1706229367baf4e5117044049ebf 09a12f3a6f4bf8d6d6696deb1ee7b7893e5871e2 2ca97c8ed4078267ae9e99a7a9a4de92ca6c4e7d e8513c43c55e42ae1e75ba7f82d4af1666e712ce ba7f29839d95231c3f1bfc9f130cbc4f9cd7fbaf c35fa4cc7cb540bc34a1ff8fd0ffde0b3e1e1c19 bd75e6dac79d847c5c5f089c86abc652dff28cca ccb78dc9dfb9bf4f7b744b2c1ce6dc40509a1ccc a05fa8a06c0fdf00c76b32e80cb1ab3d74c9dcd9 512ef48c183329145c12ef8d99374eb20f3e4e98 ca5e44b7bb3e590eabea5438a2706fdb34084752 40838fcf4c4b1683284d28abd55418ad4f2dcdf2 194e8d6542a8d9d2b45bc4170cd9b50e9efefc6f b7a3a03d328ff8c12de52343810d5a95499c4161 e507a1bb1ca01a8fa0dda64190a6a0deb21cef96 1b4b1135acf9f0ac8827a3c3763cde1092afb4d3 4cf15a16 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [73:a1:16:2a:ef:f0:54:8d:df:66:02:c9:51:a5:db:1b:8d:23:56:6a] modulus: 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 public exponent: 10001 ] 2022-04-09 03:38:09.925  INFO 1 [nio-8443-exec-7] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-09 03:38:09.926 DEBUG 1 [nio-8443-exec-7] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-09 03:38:09.927 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-04-09 03:38:09.927 DEBUG 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-09 03:38:09.927  INFO 1 [nio-8443-exec-7] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-04-09 03:38:09.928  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-09 03:38:09.928  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-09 03:38:09.928 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-09 03:38:09.928 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-09 03:38:09.929 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-09 03:38:09.933 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-09 03:38:09.933 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-09 03:38:09.933 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-09 03:38:09.933 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-09 03:38:10.014  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-09 03:38:10.014  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-09 03:38:10.015 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-09 03:38:10.015 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-09 03:38:10.017  INFO 1 [nio-8443-exec-7] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-09 03:38:10.017  INFO 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-09 03:38:10.017 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 03:38:10.017 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-09 03:38:10.018 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-09 03:38:10.018 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 03:38:10.018 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-09 03:38:10.018 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-09 03:38:10.019 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 03:38:10.019 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-09 03:38:10.019 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-09 03:38:10.020 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-09 03:38:10.023 DEBUG 1 [nio-8443-exec-7] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 478396792184796621745948830860369281502746679404 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Apr 09 01:36:10 UTC 2022 Final Date: Thu Apr 08 01:36:09 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [69:d0:35:4d:b7:40:43:3c:55:3d:9b:0c:19:61:55:eb:6b:7d:59:73] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: ac76f76be92979b692527cc524439f4ea467c1ed 23fa462fe763d0ee8eecf2cf4e11055b3bfb4bc9 e9eac29a033f7c05624cd6fd707362dbf8b7f0b0 306459dbac5f1706229367baf4e5117044049ebf 09a12f3a6f4bf8d6d6696deb1ee7b7893e5871e2 2ca97c8ed4078267ae9e99a7a9a4de92ca6c4e7d e8513c43c55e42ae1e75ba7f82d4af1666e712ce ba7f29839d95231c3f1bfc9f130cbc4f9cd7fbaf c35fa4cc7cb540bc34a1ff8fd0ffde0b3e1e1c19 bd75e6dac79d847c5c5f089c86abc652dff28cca ccb78dc9dfb9bf4f7b744b2c1ce6dc40509a1ccc a05fa8a06c0fdf00c76b32e80cb1ab3d74c9dcd9 512ef48c183329145c12ef8d99374eb20f3e4e98 ca5e44b7bb3e590eabea5438a2706fdb34084752 40838fcf4c4b1683284d28abd55418ad4f2dcdf2 194e8d6542a8d9d2b45bc4170cd9b50e9efefc6f b7a3a03d328ff8c12de52343810d5a95499c4161 e507a1bb1ca01a8fa0dda64190a6a0deb21cef96 1b4b1135acf9f0ac8827a3c3763cde1092afb4d3 4cf15a16 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c9:f7:84:00:b1:bb:9d:bc:b4:e7:3a:53:f2:6d:b5:58:e7:94:ba:70] modulus: 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 public exponent: 10001 ] 2022-04-09 04:07:02.110  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-09 04:07:02.111 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-09 04:07:02.113 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-04-09 04:07:02.114 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-09 04:07:02.114  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-04-09 04:07:02.114  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-09 04:07:02.115  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-09 04:07:02.115 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-09 04:07:02.115 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-09 04:07:02.116 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-09 04:07:02.120 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-09 04:07:02.120 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-09 04:07:02.120 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-09 04:07:02.121 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-09 04:07:02.226  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-09 04:07:02.227  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-09 04:07:02.227 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-09 04:07:02.228 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-09 04:07:02.229  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-09 04:07:02.230  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-09 04:07:02.231 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 04:07:02.231 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-09 04:07:02.231 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-09 04:07:02.232 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 04:07:02.233 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-09 04:07:02.233 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-09 04:07:02.234 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 04:07:02.234 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-09 04:07:02.235 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-09 04:07:02.236 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-09 04:07:02.240 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 478396792184796621745948830860369281502746679404 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Apr 09 01:36:10 UTC 2022 Final Date: Thu Apr 08 01:36:09 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [69:d0:35:4d:b7:40:43:3c:55:3d:9b:0c:19:61:55:eb:6b:7d:59:73] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: ac76f76be92979b692527cc524439f4ea467c1ed 23fa462fe763d0ee8eecf2cf4e11055b3bfb4bc9 e9eac29a033f7c05624cd6fd707362dbf8b7f0b0 306459dbac5f1706229367baf4e5117044049ebf 09a12f3a6f4bf8d6d6696deb1ee7b7893e5871e2 2ca97c8ed4078267ae9e99a7a9a4de92ca6c4e7d e8513c43c55e42ae1e75ba7f82d4af1666e712ce ba7f29839d95231c3f1bfc9f130cbc4f9cd7fbaf c35fa4cc7cb540bc34a1ff8fd0ffde0b3e1e1c19 bd75e6dac79d847c5c5f089c86abc652dff28cca ccb78dc9dfb9bf4f7b744b2c1ce6dc40509a1ccc a05fa8a06c0fdf00c76b32e80cb1ab3d74c9dcd9 512ef48c183329145c12ef8d99374eb20f3e4e98 ca5e44b7bb3e590eabea5438a2706fdb34084752 40838fcf4c4b1683284d28abd55418ad4f2dcdf2 194e8d6542a8d9d2b45bc4170cd9b50e9efefc6f b7a3a03d328ff8c12de52343810d5a95499c4161 e507a1bb1ca01a8fa0dda64190a6a0deb21cef96 1b4b1135acf9f0ac8827a3c3763cde1092afb4d3 4cf15a16 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [36:f0:61:bc:7f:91:0b:a3:84:60:88:e5:9a:38:79:df:99:7c:87:49] modulus: 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 public exponent: 10001 ] 2022-04-09 04:07:25.884  INFO 1 [io-8443-exec-10] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-09 04:07:25.885 DEBUG 1 [io-8443-exec-10] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-09 04:07:25.887 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-04-09 04:07:25.887 DEBUG 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-09 04:07:25.888  INFO 1 [io-8443-exec-10] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-04-09 04:07:25.888  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-09 04:07:25.889  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-09 04:07:25.889 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-09 04:07:25.890 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-09 04:07:25.890 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-09 04:07:25.895 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-09 04:07:25.896 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-09 04:07:25.896 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-09 04:07:25.896 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-09 04:07:26.063  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-09 04:07:26.064  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-09 04:07:26.064 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-09 04:07:26.065 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-09 04:07:26.067  INFO 1 [io-8443-exec-10] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-09 04:07:26.067  INFO 1 [io-8443-exec-10] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-09 04:07:26.068 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 04:07:26.068 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-09 04:07:26.068 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-09 04:07:26.069 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 04:07:26.069 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-09 04:07:26.069 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-09 04:07:26.070 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 04:07:26.070 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-09 04:07:26.070 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-09 04:07:26.071 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-09 04:07:26.074 DEBUG 1 [io-8443-exec-10] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 478396792184796621745948830860369281502746679404 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Apr 09 01:36:10 UTC 2022 Final Date: Thu Apr 08 01:36:09 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [69:d0:35:4d:b7:40:43:3c:55:3d:9b:0c:19:61:55:eb:6b:7d:59:73] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: ac76f76be92979b692527cc524439f4ea467c1ed 23fa462fe763d0ee8eecf2cf4e11055b3bfb4bc9 e9eac29a033f7c05624cd6fd707362dbf8b7f0b0 306459dbac5f1706229367baf4e5117044049ebf 09a12f3a6f4bf8d6d6696deb1ee7b7893e5871e2 2ca97c8ed4078267ae9e99a7a9a4de92ca6c4e7d e8513c43c55e42ae1e75ba7f82d4af1666e712ce ba7f29839d95231c3f1bfc9f130cbc4f9cd7fbaf c35fa4cc7cb540bc34a1ff8fd0ffde0b3e1e1c19 bd75e6dac79d847c5c5f089c86abc652dff28cca ccb78dc9dfb9bf4f7b744b2c1ce6dc40509a1ccc a05fa8a06c0fdf00c76b32e80cb1ab3d74c9dcd9 512ef48c183329145c12ef8d99374eb20f3e4e98 ca5e44b7bb3e590eabea5438a2706fdb34084752 40838fcf4c4b1683284d28abd55418ad4f2dcdf2 194e8d6542a8d9d2b45bc4170cd9b50e9efefc6f b7a3a03d328ff8c12de52343810d5a95499c4161 e507a1bb1ca01a8fa0dda64190a6a0deb21cef96 1b4b1135acf9f0ac8827a3c3763cde1092afb4d3 4cf15a16 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [52:a1:5d:f6:35:45:0a:96:9c:14:05:44:68:07:e2:22:46:89:1a:0d] modulus: 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 public exponent: 10001 ] 2022-04-09 04:34:36.151  INFO 1 [nio-8443-exec-4] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-09 04:34:36.153 DEBUG 1 [nio-8443-exec-4] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-09 04:34:36.155 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-04-09 04:34:36.156 DEBUG 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-09 04:34:36.156  INFO 1 [nio-8443-exec-4] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-04-09 04:34:36.157  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-09 04:34:36.157  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-09 04:34:36.158 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-09 04:34:36.158 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-09 04:34:36.158 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-09 04:34:36.163 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-09 04:34:36.164 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-09 04:34:36.164 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-09 04:34:36.165 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-09 04:34:36.245  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-09 04:34:36.245  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-09 04:34:36.245 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-09 04:34:36.245 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-09 04:34:36.247  INFO 1 [nio-8443-exec-4] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-09 04:34:36.247  INFO 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-09 04:34:36.247 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 04:34:36.248 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-09 04:34:36.248 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-09 04:34:36.248 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 04:34:36.248 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-09 04:34:36.248 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-09 04:34:36.249 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 04:34:36.249 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-09 04:34:36.249 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-09 04:34:36.250 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-09 04:34:36.253 DEBUG 1 [nio-8443-exec-4] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 478396792184796621745948830860369281502746679404 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Apr 09 01:36:10 UTC 2022 Final Date: Thu Apr 08 01:36:09 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [69:d0:35:4d:b7:40:43:3c:55:3d:9b:0c:19:61:55:eb:6b:7d:59:73] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: ac76f76be92979b692527cc524439f4ea467c1ed 23fa462fe763d0ee8eecf2cf4e11055b3bfb4bc9 e9eac29a033f7c05624cd6fd707362dbf8b7f0b0 306459dbac5f1706229367baf4e5117044049ebf 09a12f3a6f4bf8d6d6696deb1ee7b7893e5871e2 2ca97c8ed4078267ae9e99a7a9a4de92ca6c4e7d e8513c43c55e42ae1e75ba7f82d4af1666e712ce ba7f29839d95231c3f1bfc9f130cbc4f9cd7fbaf c35fa4cc7cb540bc34a1ff8fd0ffde0b3e1e1c19 bd75e6dac79d847c5c5f089c86abc652dff28cca ccb78dc9dfb9bf4f7b744b2c1ce6dc40509a1ccc a05fa8a06c0fdf00c76b32e80cb1ab3d74c9dcd9 512ef48c183329145c12ef8d99374eb20f3e4e98 ca5e44b7bb3e590eabea5438a2706fdb34084752 40838fcf4c4b1683284d28abd55418ad4f2dcdf2 194e8d6542a8d9d2b45bc4170cd9b50e9efefc6f b7a3a03d328ff8c12de52343810d5a95499c4161 e507a1bb1ca01a8fa0dda64190a6a0deb21cef96 1b4b1135acf9f0ac8827a3c3763cde1092afb4d3 4cf15a16 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [c3:e8:e6:27:55:f0:58:3f:87:c8:c0:a4:7a:03:e5:54:55:d9:67:42] modulus: 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 public exponent: 10001 ] 2022-04-09 04:34:36.513  INFO 1 [nio-8443-exec-6] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-09 04:34:36.514 DEBUG 1 [nio-8443-exec-6] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-09 04:34:36.515 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-04-09 04:34:36.516 DEBUG 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-09 04:34:36.516  INFO 1 [nio-8443-exec-6] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=onap-pm-https-server-correct-sans }, SANs: [onap-pm-https-server-correct-sans] } 2022-04-09 04:34:36.517  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-09 04:34:36.517  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-09 04:34:36.517 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-09 04:34:36.518 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-09 04:34:36.518 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-09 04:34:36.524 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-09 04:34:36.524 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-09 04:34:36.525 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-09 04:34:36.525 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-09 04:34:36.580  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-09 04:34:36.580  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-09 04:34:36.581 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-09 04:34:36.581 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-09 04:34:36.582  INFO 1 [nio-8443-exec-6] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-09 04:34:36.582  INFO 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-09 04:34:36.583 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 04:34:36.583 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-09 04:34:36.583 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-09 04:34:36.583 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 04:34:36.584 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-09 04:34:36.584 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-09 04:34:36.584 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 04:34:36.585 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-09 04:34:36.585 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-09 04:34:36.585 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=onap-pm-https-server-correct-sans,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-09 04:34:36.589 DEBUG 1 [nio-8443-exec-6] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 478396792184796621745948830860369281502746679404 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Apr 09 01:36:10 UTC 2022 Final Date: Thu Apr 08 01:36:09 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [69:d0:35:4d:b7:40:43:3c:55:3d:9b:0c:19:61:55:eb:6b:7d:59:73] modulus: bbaf374ed4fc3f92615d23626464a1154da3447c84716df96cf8208074946911d424d07cc9e667946234d5e4243bb005f85b8f2be214c139645fb84513cf218128355c252f48ba2d1dea6cda7717c83469079248d9ead38914d27da336c11b93f65912ecd00aac5ee1378c11f1964cefefc90e2afbcb82816da956006e860e83f1a194eca360015e148275db387ff866c09c196d56bd87fc17e33b7007874fbc5499902e9e8e0f7b74e567c412b370cd74c9bbe29af734901aaff7092cffd5bf096836052f122f47c96b931cd9a00a67776782c0118b068f37f4cbbb71aade9edecc5f75359495fd470f5813675771c448be9d12f843b6ad0042676f89391fe71591cc53e427e6ce6e1ef35c237d0a0b8e4bfeca26aab0a7dd41e24269d840199688bae35e63ab620da4c21bfa437e09afb3ddc67eddb8281292e6d532a77f578eda933f7216d28565f629a4e655517e0514d5fd48961aaffc5e2bf8def1564f18f53222d7175233633ee43e4e8ad89ad2e0345d0c29c9b740de532f4b7d5a65 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: ac76f76be92979b692527cc524439f4ea467c1ed 23fa462fe763d0ee8eecf2cf4e11055b3bfb4bc9 e9eac29a033f7c05624cd6fd707362dbf8b7f0b0 306459dbac5f1706229367baf4e5117044049ebf 09a12f3a6f4bf8d6d6696deb1ee7b7893e5871e2 2ca97c8ed4078267ae9e99a7a9a4de92ca6c4e7d e8513c43c55e42ae1e75ba7f82d4af1666e712ce ba7f29839d95231c3f1bfc9f130cbc4f9cd7fbaf c35fa4cc7cb540bc34a1ff8fd0ffde0b3e1e1c19 bd75e6dac79d847c5c5f089c86abc652dff28cca ccb78dc9dfb9bf4f7b744b2c1ce6dc40509a1ccc a05fa8a06c0fdf00c76b32e80cb1ab3d74c9dcd9 512ef48c183329145c12ef8d99374eb20f3e4e98 ca5e44b7bb3e590eabea5438a2706fdb34084752 40838fcf4c4b1683284d28abd55418ad4f2dcdf2 194e8d6542a8d9d2b45bc4170cd9b50e9efefc6f b7a3a03d328ff8c12de52343810d5a95499c4161 e507a1bb1ca01a8fa0dda64190a6a0deb21cef96 1b4b1135acf9f0ac8827a3c3763cde1092afb4d3 4cf15a16 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [8b:bd:b6:60:97:0e:7b:bc:dd:27:48:d4:49:d4:9f:84:f9:be:cb:64] modulus: 94fd435766f80a1ec32d394a274209d7bccd556453115cc67cfac035737ec7dbf02852fa2327c72926f878eaa4f7515a17efe0e5a62a654c47df083620c3bbd26fbf1868dc80ccc1c87d2858b3c4e8197860a4bdd64923cc0ae2f3f1fcd060d8b47a89a7c93aebdef50d205cf7e7a2621c69874b12ab37445bf17da441274757b8aee996b494f2c15044b6f60d26971fd1e8db9cf52ae8ef70f23205dd3577f333b8328226cd952d910e4345a6b056422e87e7ac70ca8f65d3d6429795c6b17d216fdf2aff9084a1dd324e594beda433143bf6d53f5b276f17ced4ce932531e360ed6379685a57a262d34fd69c4ab7699f1f6c215659eb083c6a45e8752b9e65 public exponent: 10001 ] 2022-04-09 04:34:51.694  INFO 1 [nio-8443-exec-5] o.o.o.c.a.CertificationController  : Received certificate initialization request for CA named: RA 2022-04-09 04:34:51.696 DEBUG 1 [nio-8443-exec-5] .c.c.c.Pkcs10CertificationRequestFactory : Creating certification request from pem object 2022-04-09 04:34:51.697 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Received CSR meta data: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-04-09 04:34:51.697 DEBUG 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Found server for given CA name: Cmpv2Server{authentication=Authentication{ iak=*****, rv=*****}, caName='RA', issuerDN='O=EJBCA Container Quickstart,CN=ManagementCA,UID=12345', url='http://ejbca:8080/ejbca/publicweb/cmp/cmpRA'} 2022-04-09 04:34:51.697  INFO 1 [nio-8443-exec-5] .o.c.c.CertificationResponseModelFactory : Sending initialization request for certification model for CA named: RA, and certificate signing request: CSR: { Subject: { C=US,ST=California,L=San-Francisco,O=Linux-Foundation,OU=ONAP,CN=wrong-sans-1 }, SANs: [wrong-sans-2] } 2022-04-09 04:34:51.698  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validate before creating Certificate Request for CA: RA 2022-04-09 04:34:51.698  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Validation completed successfully. 2022-04-09 04:34:51.698 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random integer 2022-04-09 04:34:51.698 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Extensions from Subject Alternative Names 2022-04-09 04:34:51.699 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpMessageHelper  : Generating Optional Validity from Date objects 2022-04-09 04:34:51.704 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating a Pki Header Builder 2022-04-09 04:34:51.704 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-09 04:34:51.704 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating random array of bytes 2022-04-09 04:34:51.704 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-09 04:34:51.772  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Received response from Server 2022-04-09 04:34:51.772  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Response type is: INIT_REP 2022-04-09 04:34:51.772 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Verifying signature of the response. 2022-04-09 04:34:51.772 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpUtil  : Generating array of bytes representing PkiHeader and PkiBody 2022-04-09 04:34:51.773  INFO 1 [nio-8443-exec-5] o.o.o.c.c.v.CmpCertificationValidator  : Response status code: 0 2022-04-09 04:34:51.773  INFO 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpClientImpl  : Verifying certificates returned as part of CertResponse. 2022-04-09 04:34:51.774 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 04:34:51.774 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-09 04:34:51.774 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-09 04:34:51.774 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 04:34:51.775 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-09 04:34:51.775 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-09 04:34:51.775 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Retrieving certificate of type class java.security.cert.X509Certificate from byte array. 2022-04-09 04:34:51.775 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Parsing X509Certificate from bytes with provider BC 2022-04-09 04:34:51.776 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Creating certificate Factory to generate certificate using provider BC 2022-04-09 04:34:51.776 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Verifying certificate CN=wrong-sans-1,OU=ONAP,O=Linux-Foundation,L=San-Francisco,ST=California,C=US as part of cert chain with certificate UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart 2022-04-09 04:34:51.779 DEBUG 1 [nio-8443-exec-5] o.o.o.c.c.i.CmpResponseHelper  : Certificate verify result:PKIXCertPathValidatorResult: [ Trust Anchor: [ Trusted CA cert: [0] Version: 3 SerialNumber: 478396792184796621745948830860369281502746679404 IssuerDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Start Date: Sat Apr 09 01:36:10 UTC 2022 Final Date: Thu Apr 08 01:36:09 UTC 2032 SubjectDN: UID=12345,CN=ManagementCA,O=EJBCA Container Quickstart Public Key: RSA Public Key [69:d0:35:4d:b7:40:43:3c:55:3d:9b:0c:19:61:55:eb:6b:7d:59:73] modulus: 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 public exponent: 10001 Signature Algorithm: SHA256WITHRSA Signature: ac76f76be92979b692527cc524439f4ea467c1ed 23fa462fe763d0ee8eecf2cf4e11055b3bfb4bc9 e9eac29a033f7c05624cd6fd707362dbf8b7f0b0 306459dbac5f1706229367baf4e5117044049ebf 09a12f3a6f4bf8d6d6696deb1ee7b7893e5871e2 2ca97c8ed4078267ae9e99a7a9a4de92ca6c4e7d e8513c43c55e42ae1e75ba7f82d4af1666e712ce ba7f29839d95231c3f1bfc9f130cbc4f9cd7fbaf c35fa4cc7cb540bc34a1ff8fd0ffde0b3e1e1c19 bd75e6dac79d847c5c5f089c86abc652dff28cca ccb78dc9dfb9bf4f7b744b2c1ce6dc40509a1ccc a05fa8a06c0fdf00c76b32e80cb1ab3d74c9dcd9 512ef48c183329145c12ef8d99374eb20f3e4e98 ca5e44b7bb3e590eabea5438a2706fdb34084752 40838fcf4c4b1683284d28abd55418ad4f2dcdf2 194e8d6542a8d9d2b45bc4170cd9b50e9efefc6f b7a3a03d328ff8c12de52343810d5a95499c4161 e507a1bb1ca01a8fa0dda64190a6a0deb21cef96 1b4b1135acf9f0ac8827a3c3763cde1092afb4d3 4cf15a16 Extensions: critical(true) BasicConstraints: isCa(true) critical(false) 2.5.29.35 value = Sequence Tagged [0] IMPLICIT DER Octet String[20] critical(false) 2.5.29.14 value = DER Octet String[20] critical(true) KeyUsage: 0x86 Policy Tree: null Subject Public Key: RSA Public Key [f3:16:90:d6:22:dc:24:fd:85:9a:f5:31:6d:41:1f:06:60:99:9d:87] modulus: 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 public exponent: 10001 ]